mciwave: MCI Capability returns number of wave devices.
[wine] / dlls / advapi32 / security.c
1 /*
2  * Copyright 1999, 2000 Juergen Schmied <juergen.schmied@debitel.net>
3  * Copyright 2003 CodeWeavers Inc. (Ulrich Czekalla)
4  * Copyright 2006 Robert Reif
5  *
6  * This library is free software; you can redistribute it and/or
7  * modify it under the terms of the GNU Lesser General Public
8  * License as published by the Free Software Foundation; either
9  * version 2.1 of the License, or (at your option) any later version.
10  *
11  * This library is distributed in the hope that it will be useful,
12  * but WITHOUT ANY WARRANTY; without even the implied warranty of
13  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
14  * Lesser General Public License for more details.
15  *
16  * You should have received a copy of the GNU Lesser General Public
17  * License along with this library; if not, write to the Free Software
18  * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
19  *
20  */
21
22 #include <stdarg.h>
23 #include <string.h>
24
25 #include "ntstatus.h"
26 #define WIN32_NO_STATUS
27 #include "windef.h"
28 #include "winbase.h"
29 #include "winerror.h"
30 #include "winreg.h"
31 #include "winsafer.h"
32 #include "winternl.h"
33 #include "winioctl.h"
34 #include "ntsecapi.h"
35 #include "accctrl.h"
36 #include "sddl.h"
37 #include "winsvc.h"
38 #include "aclapi.h"
39 #include "objbase.h"
40 #include "iads.h"
41 #include "advapi32_misc.h"
42 #include "lmcons.h"
43
44 #include "wine/debug.h"
45 #include "wine/unicode.h"
46
47 WINE_DEFAULT_DEBUG_CHANNEL(advapi);
48
49 static BOOL ParseStringSidToSid(LPCWSTR StringSid, PSID pSid, LPDWORD cBytes);
50 static BOOL ParseStringAclToAcl(LPCWSTR StringAcl, LPDWORD lpdwFlags, 
51     PACL pAcl, LPDWORD cBytes);
52 static BYTE ParseAceStringFlags(LPCWSTR* StringAcl);
53 static BYTE ParseAceStringType(LPCWSTR* StringAcl);
54 static DWORD ParseAceStringRights(LPCWSTR* StringAcl);
55 static BOOL ParseStringSecurityDescriptorToSecurityDescriptor(
56     LPCWSTR StringSecurityDescriptor,
57     SECURITY_DESCRIPTOR_RELATIVE* SecurityDescriptor,
58     LPDWORD cBytes);
59 static DWORD ParseAclStringFlags(LPCWSTR* StringAcl);
60
61 typedef struct _ACEFLAG
62 {
63    LPCWSTR wstr;
64    DWORD value;
65 } ACEFLAG, *LPACEFLAG;
66
67 typedef struct _MAX_SID
68 {
69     /* same fields as struct _SID */
70     BYTE Revision;
71     BYTE SubAuthorityCount;
72     SID_IDENTIFIER_AUTHORITY IdentifierAuthority;
73     DWORD SubAuthority[SID_MAX_SUB_AUTHORITIES];
74 } MAX_SID;
75
76 typedef struct WELLKNOWNSID
77 {
78     WCHAR wstr[2];
79     WELL_KNOWN_SID_TYPE Type;
80     MAX_SID Sid;
81 } WELLKNOWNSID;
82
83 static const WELLKNOWNSID WellKnownSids[] =
84 {
85     { {0,0}, WinNullSid, { SID_REVISION, 1, { SECURITY_NULL_SID_AUTHORITY }, { SECURITY_NULL_RID } } },
86     { {'W','D'}, WinWorldSid, { SID_REVISION, 1, { SECURITY_WORLD_SID_AUTHORITY }, { SECURITY_WORLD_RID } } },
87     { {0,0}, WinLocalSid, { SID_REVISION, 1, { SECURITY_LOCAL_SID_AUTHORITY }, { SECURITY_LOCAL_RID } } },
88     { {'C','O'}, WinCreatorOwnerSid, { SID_REVISION, 1, { SECURITY_CREATOR_SID_AUTHORITY }, { SECURITY_CREATOR_OWNER_RID } } },
89     { {'C','G'}, WinCreatorGroupSid, { SID_REVISION, 1, { SECURITY_CREATOR_SID_AUTHORITY }, { SECURITY_CREATOR_GROUP_RID } } },
90     { {0,0}, WinCreatorOwnerServerSid, { SID_REVISION, 1, { SECURITY_CREATOR_SID_AUTHORITY }, { SECURITY_CREATOR_OWNER_SERVER_RID } } },
91     { {0,0}, WinCreatorGroupServerSid, { SID_REVISION, 1, { SECURITY_CREATOR_SID_AUTHORITY }, { SECURITY_CREATOR_GROUP_SERVER_RID } } },
92     { {0,0}, WinNtAuthoritySid, { SID_REVISION, 0, { SECURITY_NT_AUTHORITY }, { SECURITY_NULL_RID } } },
93     { {0,0}, WinDialupSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_DIALUP_RID } } },
94     { {'N','U'}, WinNetworkSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_NETWORK_RID } } },
95     { {0,0}, WinBatchSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_BATCH_RID } } },
96     { {'I','U'}, WinInteractiveSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_INTERACTIVE_RID } } },
97     { {'S','U'}, WinServiceSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_SERVICE_RID } } },
98     { {'A','N'}, WinAnonymousSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_ANONYMOUS_LOGON_RID } } },
99     { {0,0}, WinProxySid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_PROXY_RID } } },
100     { {'E','D'}, WinEnterpriseControllersSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_ENTERPRISE_CONTROLLERS_RID } } },
101     { {'P','S'}, WinSelfSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_PRINCIPAL_SELF_RID } } },
102     { {'A','U'}, WinAuthenticatedUserSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_AUTHENTICATED_USER_RID } } },
103     { {'R','C'}, WinRestrictedCodeSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_RESTRICTED_CODE_RID } } },
104     { {0,0}, WinTerminalServerSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_TERMINAL_SERVER_RID } } },
105     { {0,0}, WinRemoteLogonIdSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_REMOTE_LOGON_RID } } },
106     { {'S','Y'}, WinLocalSystemSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_LOCAL_SYSTEM_RID } } },
107     { {'L','S'}, WinLocalServiceSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_LOCAL_SERVICE_RID } } },
108     { {'N','S'}, WinNetworkServiceSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_NETWORK_SERVICE_RID } } },
109     { {0,0}, WinBuiltinDomainSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID } } },
110     { {'B','A'}, WinBuiltinAdministratorsSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_ADMINS } } },
111     { {'B','U'}, WinBuiltinUsersSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_USERS } } },
112     { {'B','G'}, WinBuiltinGuestsSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_GUESTS } } },
113     { {'P','U'}, WinBuiltinPowerUsersSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_POWER_USERS } } },
114     { {'A','O'}, WinBuiltinAccountOperatorsSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_ACCOUNT_OPS } } },
115     { {'S','O'}, WinBuiltinSystemOperatorsSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_SYSTEM_OPS } } },
116     { {'P','O'}, WinBuiltinPrintOperatorsSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_PRINT_OPS } } },
117     { {'B','O'}, WinBuiltinBackupOperatorsSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_BACKUP_OPS } } },
118     { {'R','E'}, WinBuiltinReplicatorSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_REPLICATOR } } },
119     { {'R','U'}, WinBuiltinPreWindows2000CompatibleAccessSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_PREW2KCOMPACCESS } } },
120     { {'R','D'}, WinBuiltinRemoteDesktopUsersSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_REMOTE_DESKTOP_USERS } } },
121     { {'N','O'}, WinBuiltinNetworkConfigurationOperatorsSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_NETWORK_CONFIGURATION_OPS } } },
122     { {0,0}, WinNTLMAuthenticationSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_PACKAGE_BASE_RID, SECURITY_PACKAGE_NTLM_RID } } },
123     { {0,0}, WinDigestAuthenticationSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_PACKAGE_BASE_RID, SECURITY_PACKAGE_DIGEST_RID } } },
124     { {0,0}, WinSChannelAuthenticationSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_PACKAGE_BASE_RID, SECURITY_PACKAGE_SCHANNEL_RID } } },
125     { {0,0}, WinThisOrganizationSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_THIS_ORGANIZATION_RID } } },
126     { {0,0}, WinOtherOrganizationSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_OTHER_ORGANIZATION_RID } } },
127     { {0,0}, WinBuiltinIncomingForestTrustBuildersSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_INCOMING_FOREST_TRUST_BUILDERS  } } },
128     { {0,0}, WinBuiltinPerfMonitoringUsersSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_MONITORING_USERS } } },
129     { {0,0}, WinBuiltinPerfLoggingUsersSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_LOGGING_USERS } } },
130     { {0,0}, WinBuiltinAuthorizationAccessSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_AUTHORIZATIONACCESS } } },
131     { {0,0}, WinBuiltinTerminalServerLicenseServersSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_TS_LICENSE_SERVERS } } },
132     { {0,0}, WinBuiltinDCOMUsersSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_DCOM_USERS } } },
133     { {'L','W'}, WinLowLabelSid, { SID_REVISION, 1, { SECURITY_MANDATORY_LABEL_AUTHORITY}, { SECURITY_MANDATORY_LOW_RID} } },
134     { {'M','E'}, WinMediumLabelSid, { SID_REVISION, 1, { SECURITY_MANDATORY_LABEL_AUTHORITY}, { SECURITY_MANDATORY_MEDIUM_RID } } },
135     { {'H','I'}, WinHighLabelSid, { SID_REVISION, 1, { SECURITY_MANDATORY_LABEL_AUTHORITY}, { SECURITY_MANDATORY_HIGH_RID } } },
136     { {'S','I'}, WinSystemLabelSid, { SID_REVISION, 1, { SECURITY_MANDATORY_LABEL_AUTHORITY}, { SECURITY_MANDATORY_SYSTEM_RID } } },
137 };
138
139 /* these SIDs must be constructed as relative to some domain - only the RID is well-known */
140 typedef struct WELLKNOWNRID
141 {
142     WELL_KNOWN_SID_TYPE Type;
143     DWORD Rid;
144 } WELLKNOWNRID;
145
146 static const WELLKNOWNRID WellKnownRids[] = {
147     { WinAccountAdministratorSid,    DOMAIN_USER_RID_ADMIN },
148     { WinAccountGuestSid,            DOMAIN_USER_RID_GUEST },
149     { WinAccountKrbtgtSid,           DOMAIN_USER_RID_KRBTGT },
150     { WinAccountDomainAdminsSid,     DOMAIN_GROUP_RID_ADMINS },
151     { WinAccountDomainUsersSid,      DOMAIN_GROUP_RID_USERS },
152     { WinAccountDomainGuestsSid,     DOMAIN_GROUP_RID_GUESTS },
153     { WinAccountComputersSid,        DOMAIN_GROUP_RID_COMPUTERS },
154     { WinAccountControllersSid,      DOMAIN_GROUP_RID_CONTROLLERS },
155     { WinAccountCertAdminsSid,       DOMAIN_GROUP_RID_CERT_ADMINS },
156     { WinAccountSchemaAdminsSid,     DOMAIN_GROUP_RID_SCHEMA_ADMINS },
157     { WinAccountEnterpriseAdminsSid, DOMAIN_GROUP_RID_ENTERPRISE_ADMINS },
158     { WinAccountPolicyAdminsSid,     DOMAIN_GROUP_RID_POLICY_ADMINS },
159     { WinAccountRasAndIasServersSid, DOMAIN_ALIAS_RID_RAS_SERVERS },
160 };
161
162
163 static SID const sidWorld = { SID_REVISION, 1, { SECURITY_WORLD_SID_AUTHORITY} , { SECURITY_WORLD_RID } };
164
165 typedef struct _AccountSid {
166     WELL_KNOWN_SID_TYPE type;
167     LPCWSTR account;
168     LPCWSTR domain;
169     SID_NAME_USE name_use;
170     LPCWSTR alias;
171 } AccountSid;
172
173 static const WCHAR Account_Operators[] = { 'A','c','c','o','u','n','t',' ','O','p','e','r','a','t','o','r','s',0 };
174 static const WCHAR Administrator[] = {'A','d','m','i','n','i','s','t','r','a','t','o','r',0 };
175 static const WCHAR Administrators[] = { 'A','d','m','i','n','i','s','t','r','a','t','o','r','s',0 };
176 static const WCHAR ANONYMOUS_LOGON[] = { 'A','N','O','N','Y','M','O','U','S',' ','L','O','G','O','N',0 };
177 static const WCHAR Authenticated_Users[] = { 'A','u','t','h','e','n','t','i','c','a','t','e','d',' ','U','s','e','r','s',0 };
178 static const WCHAR Backup_Operators[] = { 'B','a','c','k','u','p',' ','O','p','e','r','a','t','o','r','s',0 };
179 static const WCHAR BATCH[] = { 'B','A','T','C','H',0 };
180 static const WCHAR Blank[] = { 0 };
181 static const WCHAR BUILTIN[] = { 'B','U','I','L','T','I','N',0 };
182 static const WCHAR Cert_Publishers[] = { 'C','e','r','t',' ','P','u','b','l','i','s','h','e','r','s',0 };
183 static const WCHAR CREATOR_GROUP[] = { 'C','R','E','A','T','O','R',' ','G','R','O','U','P',0 };
184 static const WCHAR CREATOR_GROUP_SERVER[] = { 'C','R','E','A','T','O','R',' ','G','R','O','U','P',' ','S','E','R','V','E','R',0 };
185 static const WCHAR CREATOR_OWNER[] = { 'C','R','E','A','T','O','R',' ','O','W','N','E','R',0 };
186 static const WCHAR CREATOR_OWNER_SERVER[] = { 'C','R','E','A','T','O','R',' ','O','W','N','E','R',' ','S','E','R','V','E','R',0 };
187 static const WCHAR CURRENT_USER[] = { 'C','U','R','R','E','N','T','_','U','S','E','R',0 };
188 static const WCHAR DIALUP[] = { 'D','I','A','L','U','P',0 };
189 static const WCHAR Digest_Authentication[] = { 'D','i','g','e','s','t',' ','A','u','t','h','e','n','t','i','c','a','t','i','o','n',0 };
190 static const WCHAR DOMAIN[] = {'D','O','M','A','I','N',0};
191 static const WCHAR Domain_Admins[] = { 'D','o','m','a','i','n',' ','A','d','m','i','n','s',0 };
192 static const WCHAR Domain_Computers[] = { 'D','o','m','a','i','n',' ','C','o','m','p','u','t','e','r','s',0 };
193 static const WCHAR Domain_Controllers[] = { 'D','o','m','a','i','n',' ','C','o','n','t','r','o','l','l','e','r','s',0 };
194 static const WCHAR Domain_Guests[] = { 'D','o','m','a','i','n',' ','G','u','e','s','t','s',0 };
195 static const WCHAR Domain_Users[] = { 'D','o','m','a','i','n',' ','U','s','e','r','s',0 };
196 static const WCHAR Enterprise_Admins[] = { 'E','n','t','e','r','p','r','i','s','e',' ','A','d','m','i','n','s',0 };
197 static const WCHAR ENTERPRISE_DOMAIN_CONTROLLERS[] = { 'E','N','T','E','R','P','R','I','S','E',' ','D','O','M','A','I','N',' ','C','O','N','T','R','O','L','L','E','R','S',0 };
198 static const WCHAR Everyone[] = { 'E','v','e','r','y','o','n','e',0 };
199 static const WCHAR Group_Policy_Creator_Owners[] = { 'G','r','o','u','p',' ','P','o','l','i','c','y',' ','C','r','e','a','t','o','r',' ','O','w','n','e','r','s',0 };
200 static const WCHAR Guest[] = { 'G','u','e','s','t',0 };
201 static const WCHAR Guests[] = { 'G','u','e','s','t','s',0 };
202 static const WCHAR INTERACTIVE[] = { 'I','N','T','E','R','A','C','T','I','V','E',0 };
203 static const WCHAR LOCAL[] = { 'L','O','C','A','L',0 };
204 static const WCHAR LOCAL_SERVICE[] = { 'L','O','C','A','L',' ','S','E','R','V','I','C','E',0 };
205 static const WCHAR LOCAL_SERVICE2[] = { 'L','O','C','A','L','S','E','R','V','I','C','E',0 };
206 static const WCHAR NETWORK[] = { 'N','E','T','W','O','R','K',0 };
207 static const WCHAR Network_Configuration_Operators[] = { 'N','e','t','w','o','r','k',' ','C','o','n','f','i','g','u','r','a','t','i','o','n',' ','O','p','e','r','a','t','o','r','s',0 };
208 static const WCHAR NETWORK_SERVICE[] = { 'N','E','T','W','O','R','K',' ','S','E','R','V','I','C','E',0 };
209 static const WCHAR NETWORK_SERVICE2[] = { 'N','E','T','W','O','R','K','S','E','R','V','I','C','E',0 };
210 static const WCHAR NT_AUTHORITY[] = { 'N','T',' ','A','U','T','H','O','R','I','T','Y',0 };
211 static const WCHAR NT_Pseudo_Domain[] = { 'N','T',' ','P','s','e','u','d','o',' ','D','o','m','a','i','n',0 };
212 static const WCHAR NTML_Authentication[] = { 'N','T','M','L',' ','A','u','t','h','e','n','t','i','c','a','t','i','o','n',0 };
213 static const WCHAR NULL_SID[] = { 'N','U','L','L',' ','S','I','D',0 };
214 static const WCHAR Other_Organization[] = { 'O','t','h','e','r',' ','O','r','g','a','n','i','z','a','t','i','o','n',0 };
215 static const WCHAR Performance_Log_Users[] = { 'P','e','r','f','o','r','m','a','n','c','e',' ','L','o','g',' ','U','s','e','r','s',0 };
216 static const WCHAR Performance_Monitor_Users[] = { 'P','e','r','f','o','r','m','a','n','c','e',' ','M','o','n','i','t','o','r',' ','U','s','e','r','s',0 };
217 static const WCHAR Power_Users[] = { 'P','o','w','e','r',' ','U','s','e','r','s',0 };
218 static const WCHAR Pre_Windows_2000_Compatible_Access[] = { 'P','r','e','-','W','i','n','d','o','w','s',' ','2','0','0','0',' ','C','o','m','p','a','t','i','b','l','e',' ','A','c','c','e','s','s',0 };
219 static const WCHAR Print_Operators[] = { 'P','r','i','n','t',' ','O','p','e','r','a','t','o','r','s',0 };
220 static const WCHAR PROXY[] = { 'P','R','O','X','Y',0 };
221 static const WCHAR RAS_and_IAS_Servers[] = { 'R','A','S',' ','a','n','d',' ','I','A','S',' ','S','e','r','v','e','r','s',0 };
222 static const WCHAR Remote_Desktop_Users[] = { 'R','e','m','o','t','e',' ','D','e','s','k','t','o','p',' ','U','s','e','r','s',0 };
223 static const WCHAR REMOTE_INTERACTIVE_LOGON[] = { 'R','E','M','O','T','E',' ','I','N','T','E','R','A','C','T','I','V','E',' ','L','O','G','O','N',0 };
224 static const WCHAR Replicators[] = { 'R','e','p','l','i','c','a','t','o','r','s',0 };
225 static const WCHAR RESTRICTED[] = { 'R','E','S','T','R','I','C','T','E','D',0 };
226 static const WCHAR SChannel_Authentication[] = { 'S','C','h','a','n','n','e','l',' ','A','u','t','h','e','n','t','i','c','a','t','i','o','n',0 };
227 static const WCHAR Schema_Admins[] = { 'S','c','h','e','m','a',' ','A','d','m','i','n','s',0 };
228 static const WCHAR SELF[] = { 'S','E','L','F',0 };
229 static const WCHAR Server_Operators[] = { 'S','e','r','v','e','r',' ','O','p','e','r','a','t','o','r','s',0 };
230 static const WCHAR SERVICE[] = { 'S','E','R','V','I','C','E',0 };
231 static const WCHAR SYSTEM[] = { 'S','Y','S','T','E','M',0 };
232 static const WCHAR TERMINAL_SERVER_USER[] = { 'T','E','R','M','I','N','A','L',' ','S','E','R','V','E','R',' ','U','S','E','R',0 };
233 static const WCHAR This_Organization[] = { 'T','h','i','s',' ','O','r','g','a','n','i','z','a','t','i','o','n',0 };
234 static const WCHAR Users[] = { 'U','s','e','r','s',0 };
235
236 static const AccountSid ACCOUNT_SIDS[] = {
237     { WinNullSid, NULL_SID, Blank, SidTypeWellKnownGroup },
238     { WinWorldSid, Everyone, Blank, SidTypeWellKnownGroup },
239     { WinLocalSid, LOCAL, Blank, SidTypeWellKnownGroup },
240     { WinCreatorOwnerSid, CREATOR_OWNER, Blank, SidTypeWellKnownGroup },
241     { WinCreatorGroupSid, CREATOR_GROUP, Blank, SidTypeWellKnownGroup },
242     { WinCreatorOwnerServerSid, CREATOR_OWNER_SERVER, Blank, SidTypeWellKnownGroup },
243     { WinCreatorGroupServerSid, CREATOR_GROUP_SERVER, Blank, SidTypeWellKnownGroup },
244     { WinNtAuthoritySid, NT_Pseudo_Domain, NT_Pseudo_Domain, SidTypeDomain },
245     { WinDialupSid, DIALUP, NT_AUTHORITY, SidTypeWellKnownGroup },
246     { WinNetworkSid, NETWORK, NT_AUTHORITY, SidTypeWellKnownGroup },
247     { WinBatchSid, BATCH, NT_AUTHORITY, SidTypeWellKnownGroup },
248     { WinInteractiveSid, INTERACTIVE, NT_AUTHORITY, SidTypeWellKnownGroup },
249     { WinServiceSid, SERVICE, NT_AUTHORITY, SidTypeWellKnownGroup },
250     { WinAnonymousSid, ANONYMOUS_LOGON, NT_AUTHORITY, SidTypeWellKnownGroup },
251     { WinProxySid, PROXY, NT_AUTHORITY, SidTypeWellKnownGroup },
252     { WinEnterpriseControllersSid, ENTERPRISE_DOMAIN_CONTROLLERS, NT_AUTHORITY, SidTypeWellKnownGroup },
253     { WinSelfSid, SELF, NT_AUTHORITY, SidTypeWellKnownGroup },
254     { WinAuthenticatedUserSid, Authenticated_Users, NT_AUTHORITY, SidTypeWellKnownGroup },
255     { WinRestrictedCodeSid, RESTRICTED, NT_AUTHORITY, SidTypeWellKnownGroup },
256     { WinTerminalServerSid, TERMINAL_SERVER_USER, NT_AUTHORITY, SidTypeWellKnownGroup },
257     { WinRemoteLogonIdSid, REMOTE_INTERACTIVE_LOGON, NT_AUTHORITY, SidTypeWellKnownGroup },
258     { WinLocalSystemSid, SYSTEM, NT_AUTHORITY, SidTypeWellKnownGroup },
259     { WinLocalServiceSid, LOCAL_SERVICE, NT_AUTHORITY, SidTypeWellKnownGroup, LOCAL_SERVICE2 },
260     { WinNetworkServiceSid, NETWORK_SERVICE, NT_AUTHORITY, SidTypeWellKnownGroup , NETWORK_SERVICE2},
261     { WinBuiltinDomainSid, BUILTIN, BUILTIN, SidTypeDomain },
262     { WinBuiltinAdministratorsSid, Administrators, BUILTIN, SidTypeAlias },
263     { WinBuiltinUsersSid, Users, BUILTIN, SidTypeAlias },
264     { WinBuiltinGuestsSid, Guests, BUILTIN, SidTypeAlias },
265     { WinBuiltinPowerUsersSid, Power_Users, BUILTIN, SidTypeAlias },
266     { WinBuiltinAccountOperatorsSid, Account_Operators, BUILTIN, SidTypeAlias },
267     { WinBuiltinSystemOperatorsSid, Server_Operators, BUILTIN, SidTypeAlias },
268     { WinBuiltinPrintOperatorsSid, Print_Operators, BUILTIN, SidTypeAlias },
269     { WinBuiltinBackupOperatorsSid, Backup_Operators, BUILTIN, SidTypeAlias },
270     { WinBuiltinReplicatorSid, Replicators, BUILTIN, SidTypeAlias },
271     { WinBuiltinPreWindows2000CompatibleAccessSid, Pre_Windows_2000_Compatible_Access, BUILTIN, SidTypeAlias },
272     { WinBuiltinRemoteDesktopUsersSid, Remote_Desktop_Users, BUILTIN, SidTypeAlias },
273     { WinBuiltinNetworkConfigurationOperatorsSid, Network_Configuration_Operators, BUILTIN, SidTypeAlias },
274     { WinNTLMAuthenticationSid, NTML_Authentication, NT_AUTHORITY, SidTypeWellKnownGroup },
275     { WinDigestAuthenticationSid, Digest_Authentication, NT_AUTHORITY, SidTypeWellKnownGroup },
276     { WinSChannelAuthenticationSid, SChannel_Authentication, NT_AUTHORITY, SidTypeWellKnownGroup },
277     { WinThisOrganizationSid, This_Organization, NT_AUTHORITY, SidTypeWellKnownGroup },
278     { WinOtherOrganizationSid, Other_Organization, NT_AUTHORITY, SidTypeWellKnownGroup },
279     { WinBuiltinPerfMonitoringUsersSid, Performance_Monitor_Users, BUILTIN, SidTypeAlias },
280     { WinBuiltinPerfLoggingUsersSid, Performance_Log_Users, BUILTIN, SidTypeAlias },
281 };
282 /*
283  * ACE access rights
284  */
285 static const WCHAR SDDL_READ_CONTROL[]     = {'R','C',0};
286 static const WCHAR SDDL_WRITE_DAC[]        = {'W','D',0};
287 static const WCHAR SDDL_WRITE_OWNER[]      = {'W','O',0};
288 static const WCHAR SDDL_STANDARD_DELETE[]  = {'S','D',0};
289
290 static const WCHAR SDDL_READ_PROPERTY[]    = {'R','P',0};
291 static const WCHAR SDDL_WRITE_PROPERTY[]   = {'W','P',0};
292 static const WCHAR SDDL_CREATE_CHILD[]     = {'C','C',0};
293 static const WCHAR SDDL_DELETE_CHILD[]     = {'D','C',0};
294 static const WCHAR SDDL_LIST_CHILDREN[]    = {'L','C',0};
295 static const WCHAR SDDL_SELF_WRITE[]       = {'S','W',0};
296 static const WCHAR SDDL_LIST_OBJECT[]      = {'L','O',0};
297 static const WCHAR SDDL_DELETE_TREE[]      = {'D','T',0};
298 static const WCHAR SDDL_CONTROL_ACCESS[]   = {'C','R',0};
299
300 static const WCHAR SDDL_FILE_ALL[]         = {'F','A',0};
301 static const WCHAR SDDL_FILE_READ[]        = {'F','R',0};
302 static const WCHAR SDDL_FILE_WRITE[]       = {'F','W',0};
303 static const WCHAR SDDL_FILE_EXECUTE[]     = {'F','X',0};
304
305 static const WCHAR SDDL_KEY_ALL[]          = {'K','A',0};
306 static const WCHAR SDDL_KEY_READ[]         = {'K','R',0};
307 static const WCHAR SDDL_KEY_WRITE[]        = {'K','W',0};
308 static const WCHAR SDDL_KEY_EXECUTE[]      = {'K','X',0};
309
310 static const WCHAR SDDL_GENERIC_ALL[]      = {'G','A',0};
311 static const WCHAR SDDL_GENERIC_READ[]     = {'G','R',0};
312 static const WCHAR SDDL_GENERIC_WRITE[]    = {'G','W',0};
313 static const WCHAR SDDL_GENERIC_EXECUTE[]  = {'G','X',0};
314
315 /*
316  * ACL flags
317  */
318 static const WCHAR SDDL_PROTECTED[]             = {'P',0};
319 static const WCHAR SDDL_AUTO_INHERIT_REQ[]      = {'A','R',0};
320 static const WCHAR SDDL_AUTO_INHERITED[]        = {'A','I',0};
321
322 /*
323  * ACE types
324  */
325 static const WCHAR SDDL_ACCESS_ALLOWED[]        = {'A',0};
326 static const WCHAR SDDL_ACCESS_DENIED[]         = {'D',0};
327 static const WCHAR SDDL_OBJECT_ACCESS_ALLOWED[] = {'O','A',0};
328 static const WCHAR SDDL_OBJECT_ACCESS_DENIED[]  = {'O','D',0};
329 static const WCHAR SDDL_AUDIT[]                 = {'A','U',0};
330 static const WCHAR SDDL_ALARM[]                 = {'A','L',0};
331 static const WCHAR SDDL_OBJECT_AUDIT[]          = {'O','U',0};
332 static const WCHAR SDDL_OBJECT_ALARMp[]         = {'O','L',0};
333
334 /*
335  * ACE flags
336  */
337 static const WCHAR SDDL_CONTAINER_INHERIT[]  = {'C','I',0};
338 static const WCHAR SDDL_OBJECT_INHERIT[]     = {'O','I',0};
339 static const WCHAR SDDL_NO_PROPAGATE[]       = {'N','P',0};
340 static const WCHAR SDDL_INHERIT_ONLY[]       = {'I','O',0};
341 static const WCHAR SDDL_INHERITED[]          = {'I','D',0};
342 static const WCHAR SDDL_AUDIT_SUCCESS[]      = {'S','A',0};
343 static const WCHAR SDDL_AUDIT_FAILURE[]      = {'F','A',0};
344
345 const char * debugstr_sid(PSID sid)
346 {
347     int auth = 0;
348     SID * psid = sid;
349
350     if (psid == NULL)
351         return "(null)";
352
353     auth = psid->IdentifierAuthority.Value[5] +
354            (psid->IdentifierAuthority.Value[4] << 8) +
355            (psid->IdentifierAuthority.Value[3] << 16) +
356            (psid->IdentifierAuthority.Value[2] << 24);
357
358     switch (psid->SubAuthorityCount) {
359     case 0:
360         return wine_dbg_sprintf("S-%d-%d", psid->Revision, auth);
361     case 1:
362         return wine_dbg_sprintf("S-%d-%d-%u", psid->Revision, auth,
363             psid->SubAuthority[0]);
364     case 2:
365         return wine_dbg_sprintf("S-%d-%d-%u-%u", psid->Revision, auth,
366             psid->SubAuthority[0], psid->SubAuthority[1]);
367     case 3:
368         return wine_dbg_sprintf("S-%d-%d-%u-%u-%u", psid->Revision, auth,
369             psid->SubAuthority[0], psid->SubAuthority[1], psid->SubAuthority[2]);
370     case 4:
371         return wine_dbg_sprintf("S-%d-%d-%u-%u-%u-%u", psid->Revision, auth,
372             psid->SubAuthority[0], psid->SubAuthority[1], psid->SubAuthority[2],
373             psid->SubAuthority[3]);
374     case 5:
375         return wine_dbg_sprintf("S-%d-%d-%u-%u-%u-%u-%u", psid->Revision, auth,
376             psid->SubAuthority[0], psid->SubAuthority[1], psid->SubAuthority[2],
377             psid->SubAuthority[3], psid->SubAuthority[4]);
378     case 6:
379         return wine_dbg_sprintf("S-%d-%d-%u-%u-%u-%u-%u-%u", psid->Revision, auth,
380             psid->SubAuthority[3], psid->SubAuthority[1], psid->SubAuthority[2],
381             psid->SubAuthority[0], psid->SubAuthority[4], psid->SubAuthority[5]);
382     case 7:
383         return wine_dbg_sprintf("S-%d-%d-%u-%u-%u-%u-%u-%u-%u", psid->Revision, auth,
384             psid->SubAuthority[0], psid->SubAuthority[1], psid->SubAuthority[2],
385             psid->SubAuthority[3], psid->SubAuthority[4], psid->SubAuthority[5],
386             psid->SubAuthority[6]);
387     case 8:
388         return wine_dbg_sprintf("S-%d-%d-%u-%u-%u-%u-%u-%u-%u-%u", psid->Revision, auth,
389             psid->SubAuthority[0], psid->SubAuthority[1], psid->SubAuthority[2],
390             psid->SubAuthority[3], psid->SubAuthority[4], psid->SubAuthority[5],
391             psid->SubAuthority[6], psid->SubAuthority[7]);
392     }
393     return "(too-big)";
394 }
395
396 /* set last error code from NT status and get the proper boolean return value */
397 /* used for functions that are a simple wrapper around the corresponding ntdll API */
398 static inline BOOL set_ntstatus( NTSTATUS status )
399 {
400     if (status) SetLastError( RtlNtStatusToDosError( status ));
401     return !status;
402 }
403
404 #define WINE_SIZE_OF_WORLD_ACCESS_ACL   (sizeof(ACL) + sizeof(ACCESS_ALLOWED_ACE) + sizeof(sidWorld) - sizeof(DWORD))
405
406 static void GetWorldAccessACL(PACL pACL)
407 {
408     PACCESS_ALLOWED_ACE pACE = (PACCESS_ALLOWED_ACE) (pACL + 1);
409
410     pACL->AclRevision = ACL_REVISION;
411     pACL->Sbz1 = 0;
412     pACL->AclSize = WINE_SIZE_OF_WORLD_ACCESS_ACL;
413     pACL->AceCount = 1;
414     pACL->Sbz2 = 0;
415
416     pACE->Header.AceType = ACCESS_ALLOWED_ACE_TYPE;
417     pACE->Header.AceFlags = CONTAINER_INHERIT_ACE;
418     pACE->Header.AceSize = sizeof(ACCESS_ALLOWED_ACE) + sizeof(sidWorld) - sizeof(DWORD);
419     pACE->Mask = 0xf3ffffff; /* Everything except reserved bits */
420     memcpy(&pACE->SidStart, &sidWorld, sizeof(sidWorld));
421 }
422
423 /************************************************************
424  *                ADVAPI_IsLocalComputer
425  *
426  * Checks whether the server name indicates local machine.
427  */
428 BOOL ADVAPI_IsLocalComputer(LPCWSTR ServerName)
429 {
430     DWORD dwSize = MAX_COMPUTERNAME_LENGTH + 1;
431     BOOL Result;
432     LPWSTR buf;
433
434     if (!ServerName || !ServerName[0])
435         return TRUE;
436
437     buf = HeapAlloc(GetProcessHeap(), 0, dwSize * sizeof(WCHAR));
438     Result = GetComputerNameW(buf,  &dwSize);
439     if (Result && (ServerName[0] == '\\') && (ServerName[1] == '\\'))
440         ServerName += 2;
441     Result = Result && !lstrcmpW(ServerName, buf);
442     HeapFree(GetProcessHeap(), 0, buf);
443
444     return Result;
445 }
446
447 /************************************************************
448  *                ADVAPI_GetComputerSid
449  *
450  * Reads the computer SID from the registry.
451  */
452 BOOL ADVAPI_GetComputerSid(PSID sid)
453 {
454     HKEY key;
455     LONG ret;
456     BOOL retval = FALSE;
457     static const WCHAR Account[] = { 'S','E','C','U','R','I','T','Y','\\','S','A','M','\\','D','o','m','a','i','n','s','\\','A','c','c','o','u','n','t',0 };
458     static const WCHAR V[] = { 'V',0 };
459
460     if ((ret = RegOpenKeyExW(HKEY_LOCAL_MACHINE, Account, 0,
461         KEY_READ, &key)) == ERROR_SUCCESS)
462     {
463         DWORD size = 0;
464         ret = RegQueryValueExW(key, V, NULL, NULL, NULL, &size);
465         if (ret == ERROR_MORE_DATA || ret == ERROR_SUCCESS)
466         {
467             BYTE * data = HeapAlloc(GetProcessHeap(), 0, size);
468             if (data)
469             {
470                 if ((ret = RegQueryValueExW(key, V, NULL, NULL,
471                      data, &size)) == ERROR_SUCCESS)
472                 {
473                     /* the SID is in the last 24 bytes of the binary data */
474                     CopyMemory(sid, &data[size-24], 24);
475                     retval = TRUE;
476                 }
477                 HeapFree(GetProcessHeap(), 0, data);
478             }
479         }
480         RegCloseKey(key);
481     }
482
483     if(retval == TRUE) return retval;
484
485     /* create a new random SID */
486     if (RegCreateKeyExW(HKEY_LOCAL_MACHINE, Account,
487         0, NULL, 0, KEY_ALL_ACCESS, NULL, &key, NULL) == ERROR_SUCCESS)
488     {
489         PSID new_sid;
490         SID_IDENTIFIER_AUTHORITY identifierAuthority = {SECURITY_NT_AUTHORITY};
491         DWORD id[3];
492
493         if (RtlGenRandom(id, sizeof(id)))
494         {
495             if (AllocateAndInitializeSid(&identifierAuthority, 4, SECURITY_NT_NON_UNIQUE, id[0], id[1], id[2], 0, 0, 0, 0, &new_sid))
496             {
497                 if (RegSetValueExW(key, V, 0, REG_BINARY, new_sid, GetLengthSid(new_sid)) == ERROR_SUCCESS)
498                     retval = CopySid(GetLengthSid(new_sid), sid, new_sid);
499
500                 FreeSid(new_sid);
501             }
502         }
503         RegCloseKey(key);
504     }
505
506     return retval;
507 }
508
509 /*      ##############################
510         ######  TOKEN FUNCTIONS ######
511         ##############################
512 */
513
514 /******************************************************************************
515  * OpenProcessToken                     [ADVAPI32.@]
516  * Opens the access token associated with a process handle.
517  *
518  * PARAMS
519  *   ProcessHandle [I] Handle to process
520  *   DesiredAccess [I] Desired access to process
521  *   TokenHandle   [O] Pointer to handle of open access token
522  *
523  * RETURNS
524  *  Success: TRUE. TokenHandle contains the access token.
525  *  Failure: FALSE.
526  *
527  * NOTES
528  *  See NtOpenProcessToken.
529  */
530 BOOL WINAPI
531 OpenProcessToken( HANDLE ProcessHandle, DWORD DesiredAccess,
532                   HANDLE *TokenHandle )
533 {
534         return set_ntstatus(NtOpenProcessToken( ProcessHandle, DesiredAccess, TokenHandle ));
535 }
536
537 /******************************************************************************
538  * OpenThreadToken [ADVAPI32.@]
539  *
540  * Opens the access token associated with a thread handle.
541  *
542  * PARAMS
543  *   ThreadHandle  [I] Handle to process
544  *   DesiredAccess [I] Desired access to the thread
545  *   OpenAsSelf    [I] ???
546  *   TokenHandle   [O] Destination for the token handle
547  *
548  * RETURNS
549  *  Success: TRUE. TokenHandle contains the access token.
550  *  Failure: FALSE.
551  *
552  * NOTES
553  *  See NtOpenThreadToken.
554  */
555 BOOL WINAPI
556 OpenThreadToken( HANDLE ThreadHandle, DWORD DesiredAccess,
557                  BOOL OpenAsSelf, HANDLE *TokenHandle)
558 {
559         return set_ntstatus( NtOpenThreadToken(ThreadHandle, DesiredAccess, OpenAsSelf, TokenHandle));
560 }
561
562 BOOL WINAPI
563 AdjustTokenGroups( HANDLE TokenHandle, BOOL ResetToDefault, PTOKEN_GROUPS NewState,
564                    DWORD BufferLength, PTOKEN_GROUPS PreviousState, PDWORD ReturnLength )
565 {
566     return set_ntstatus( NtAdjustGroupsToken(TokenHandle, ResetToDefault, NewState, BufferLength,
567                                              PreviousState, ReturnLength));
568 }
569
570 /******************************************************************************
571  * AdjustTokenPrivileges [ADVAPI32.@]
572  *
573  * Adjust the privileges of an open token handle.
574  * 
575  * PARAMS
576  *  TokenHandle          [I]   Handle from OpenProcessToken() or OpenThreadToken() 
577  *  DisableAllPrivileges [I]   TRUE=Remove all privileges, FALSE=Use NewState
578  *  NewState             [I]   Desired new privileges of the token
579  *  BufferLength         [I]   Length of NewState
580  *  PreviousState        [O]   Destination for the previous state
581  *  ReturnLength         [I/O] Size of PreviousState
582  *
583  *
584  * RETURNS
585  *  Success: TRUE. Privileges are set to NewState and PreviousState is updated.
586  *  Failure: FALSE.
587  *
588  * NOTES
589  *  See NtAdjustPrivilegesToken.
590  */
591 BOOL WINAPI
592 AdjustTokenPrivileges( HANDLE TokenHandle, BOOL DisableAllPrivileges,
593                        PTOKEN_PRIVILEGES NewState, DWORD BufferLength,
594                        PTOKEN_PRIVILEGES PreviousState, PDWORD ReturnLength )
595 {
596     NTSTATUS status;
597
598     TRACE("\n");
599     
600     status = NtAdjustPrivilegesToken(TokenHandle, DisableAllPrivileges,
601                                                      NewState, BufferLength, PreviousState,
602                                                      ReturnLength);
603     SetLastError( RtlNtStatusToDosError( status ));
604     if ((status == STATUS_SUCCESS) || (status == STATUS_NOT_ALL_ASSIGNED))
605         return TRUE;
606     else
607         return FALSE;
608 }
609
610 /******************************************************************************
611  * CheckTokenMembership [ADVAPI32.@]
612  *
613  * Determine if an access token is a member of a SID.
614  * 
615  * PARAMS
616  *   TokenHandle [I] Handle from OpenProcessToken() or OpenThreadToken()
617  *   SidToCheck  [I] SID that possibly contains the token
618  *   IsMember    [O] Destination for result.
619  *
620  * RETURNS
621  *  Success: TRUE. IsMember is TRUE if TokenHandle is a member, FALSE otherwise.
622  *  Failure: FALSE.
623  */
624 BOOL WINAPI
625 CheckTokenMembership( HANDLE token, PSID sid_to_check,
626                       PBOOL is_member )
627 {
628     PTOKEN_GROUPS token_groups = NULL;
629     HANDLE thread_token = NULL;
630     DWORD size, i;
631     BOOL ret;
632
633     TRACE("(%p %s %p)\n", token, debugstr_sid(sid_to_check), is_member);
634
635     *is_member = FALSE;
636
637     if (!token)
638     {
639         if (!OpenThreadToken(GetCurrentThread(), TOKEN_QUERY, TRUE, &thread_token))
640         {
641             HANDLE process_token;
642             ret = OpenProcessToken(GetCurrentProcess(), TOKEN_DUPLICATE, &process_token);
643             if (!ret)
644                 goto exit;
645             ret = DuplicateTokenEx(process_token, TOKEN_QUERY,
646                 NULL, SecurityImpersonation, TokenImpersonation,
647                 &thread_token);
648             CloseHandle(process_token);
649             if (!ret)
650                 goto exit;
651         }
652         token = thread_token;
653     }
654
655     ret = GetTokenInformation(token, TokenGroups, NULL, 0, &size);
656     if (!ret && GetLastError() != ERROR_INSUFFICIENT_BUFFER)
657         goto exit;
658
659     token_groups = HeapAlloc(GetProcessHeap(), 0, size);
660     if (!token_groups)
661     {
662         ret = FALSE;
663         goto exit;
664     }
665
666     ret = GetTokenInformation(token, TokenGroups, token_groups, size, &size);
667     if (!ret)
668         goto exit;
669
670     for (i = 0; i < token_groups->GroupCount; i++)
671     {
672         TRACE("Groups[%d]: {0x%x, %s}\n", i,
673             token_groups->Groups[i].Attributes,
674             debugstr_sid(token_groups->Groups[i].Sid));
675         if ((token_groups->Groups[i].Attributes & SE_GROUP_ENABLED) &&
676             EqualSid(sid_to_check, token_groups->Groups[i].Sid))
677         {
678             *is_member = TRUE;
679             TRACE("sid enabled and found in token\n");
680             break;
681         }
682     }
683
684 exit:
685     HeapFree(GetProcessHeap(), 0, token_groups);
686     if (thread_token != NULL) CloseHandle(thread_token);
687
688     return ret;
689 }
690
691 /******************************************************************************
692  * GetTokenInformation [ADVAPI32.@]
693  *
694  * Get a type of information about an access token.
695  *
696  * PARAMS
697  *   token           [I] Handle from OpenProcessToken() or OpenThreadToken()
698  *   tokeninfoclass  [I] A TOKEN_INFORMATION_CLASS from "winnt.h"
699  *   tokeninfo       [O] Destination for token information
700  *   tokeninfolength [I] Length of tokeninfo
701  *   retlen          [O] Destination for returned token information length
702  *
703  * RETURNS
704  *  Success: TRUE. tokeninfo contains retlen bytes of token information
705  *  Failure: FALSE.
706  *
707  * NOTES
708  *  See NtQueryInformationToken.
709  */
710 BOOL WINAPI
711 GetTokenInformation( HANDLE token, TOKEN_INFORMATION_CLASS tokeninfoclass,
712                      LPVOID tokeninfo, DWORD tokeninfolength, LPDWORD retlen )
713 {
714     TRACE("(%p, %s, %p, %d, %p):\n",
715           token,
716           (tokeninfoclass == TokenUser) ? "TokenUser" :
717           (tokeninfoclass == TokenGroups) ? "TokenGroups" :
718           (tokeninfoclass == TokenPrivileges) ? "TokenPrivileges" :
719           (tokeninfoclass == TokenOwner) ? "TokenOwner" :
720           (tokeninfoclass == TokenPrimaryGroup) ? "TokenPrimaryGroup" :
721           (tokeninfoclass == TokenDefaultDacl) ? "TokenDefaultDacl" :
722           (tokeninfoclass == TokenSource) ? "TokenSource" :
723           (tokeninfoclass == TokenType) ? "TokenType" :
724           (tokeninfoclass == TokenImpersonationLevel) ? "TokenImpersonationLevel" :
725           (tokeninfoclass == TokenStatistics) ? "TokenStatistics" :
726           (tokeninfoclass == TokenRestrictedSids) ? "TokenRestrictedSids" :
727           (tokeninfoclass == TokenSessionId) ? "TokenSessionId" :
728           (tokeninfoclass == TokenGroupsAndPrivileges) ? "TokenGroupsAndPrivileges" :
729           (tokeninfoclass == TokenSessionReference) ? "TokenSessionReference" :
730           (tokeninfoclass == TokenSandBoxInert) ? "TokenSandBoxInert" :
731           "Unknown",
732           tokeninfo, tokeninfolength, retlen);
733     return set_ntstatus( NtQueryInformationToken( token, tokeninfoclass, tokeninfo,
734                                                   tokeninfolength, retlen));
735 }
736
737 /******************************************************************************
738  * SetTokenInformation [ADVAPI32.@]
739  *
740  * Set information for an access token.
741  *
742  * PARAMS
743  *   token           [I] Handle from OpenProcessToken() or OpenThreadToken()
744  *   tokeninfoclass  [I] A TOKEN_INFORMATION_CLASS from "winnt.h"
745  *   tokeninfo       [I] Token information to set
746  *   tokeninfolength [I] Length of tokeninfo
747  *
748  * RETURNS
749  *  Success: TRUE. The information for the token is set to tokeninfo.
750  *  Failure: FALSE.
751  */
752 BOOL WINAPI
753 SetTokenInformation( HANDLE token, TOKEN_INFORMATION_CLASS tokeninfoclass,
754                      LPVOID tokeninfo, DWORD tokeninfolength )
755 {
756     TRACE("(%p, %s, %p, %d): stub\n",
757           token,
758           (tokeninfoclass == TokenUser) ? "TokenUser" :
759           (tokeninfoclass == TokenGroups) ? "TokenGroups" :
760           (tokeninfoclass == TokenPrivileges) ? "TokenPrivileges" :
761           (tokeninfoclass == TokenOwner) ? "TokenOwner" :
762           (tokeninfoclass == TokenPrimaryGroup) ? "TokenPrimaryGroup" :
763           (tokeninfoclass == TokenDefaultDacl) ? "TokenDefaultDacl" :
764           (tokeninfoclass == TokenSource) ? "TokenSource" :
765           (tokeninfoclass == TokenType) ? "TokenType" :
766           (tokeninfoclass == TokenImpersonationLevel) ? "TokenImpersonationLevel" :
767           (tokeninfoclass == TokenStatistics) ? "TokenStatistics" :
768           (tokeninfoclass == TokenRestrictedSids) ? "TokenRestrictedSids" :
769           (tokeninfoclass == TokenSessionId) ? "TokenSessionId" :
770           (tokeninfoclass == TokenGroupsAndPrivileges) ? "TokenGroupsAndPrivileges" :
771           (tokeninfoclass == TokenSessionReference) ? "TokenSessionReference" :
772           (tokeninfoclass == TokenSandBoxInert) ? "TokenSandBoxInert" :
773           "Unknown",
774           tokeninfo, tokeninfolength);
775
776     return set_ntstatus( NtSetInformationToken( token, tokeninfoclass, tokeninfo, tokeninfolength ));
777 }
778
779 /*************************************************************************
780  * SetThreadToken [ADVAPI32.@]
781  *
782  * Assigns an 'impersonation token' to a thread so it can assume the
783  * security privileges of another thread or process.  Can also remove
784  * a previously assigned token. 
785  *
786  * PARAMS
787  *   thread          [O] Handle to thread to set the token for
788  *   token           [I] Token to set
789  *
790  * RETURNS
791  *  Success: TRUE. The threads access token is set to token
792  *  Failure: FALSE.
793  *
794  * NOTES
795  *  Only supported on NT or higher. On Win9X this function does nothing.
796  *  See SetTokenInformation.
797  */
798 BOOL WINAPI SetThreadToken(PHANDLE thread, HANDLE token)
799 {
800     return set_ntstatus( NtSetInformationThread( thread ? *thread : GetCurrentThread(),
801                                                  ThreadImpersonationToken, &token, sizeof token ));
802 }
803
804 /*************************************************************************
805  * CreateRestrictedToken [ADVAPI32.@]
806  *
807  * Create a new more restricted token from an existing token.
808  *
809  * PARAMS
810  *   baseToken       [I] Token to base the new restricted token on
811  *   flags           [I] Options
812  *   nDisableSids    [I] Length of disableSids array
813  *   disableSids     [I] Array of SIDs to disable in the new token
814  *   nDeletePrivs    [I] Length of deletePrivs array
815  *   deletePrivs     [I] Array of privileges to delete in the new token
816  *   nRestrictSids   [I] Length of restrictSids array
817  *   restrictSids    [I] Array of SIDs to restrict in the new token
818  *   newToken        [O] Address where the new token is stored
819  *
820  * RETURNS
821  *  Success: TRUE
822  *  Failure: FALSE
823  */
824 BOOL WINAPI CreateRestrictedToken(
825     HANDLE baseToken,
826     DWORD flags,
827     DWORD nDisableSids,
828     PSID_AND_ATTRIBUTES disableSids,
829     DWORD nDeletePrivs,
830     PLUID_AND_ATTRIBUTES deletePrivs,
831     DWORD nRestrictSids,
832     PSID_AND_ATTRIBUTES restrictSids,
833     PHANDLE newToken)
834 {
835     FIXME("(%p, 0x%x, %u, %p, %u, %p, %u, %p, %p): stub\n",
836           baseToken, flags, nDisableSids, disableSids,
837           nDeletePrivs, deletePrivs,
838           nRestrictSids, restrictSids,
839           newToken);
840     SetLastError(ERROR_CALL_NOT_IMPLEMENTED);
841     return FALSE;
842 }
843
844 /*      ##############################
845         ######  SID FUNCTIONS   ######
846         ##############################
847 */
848
849 /******************************************************************************
850  * AllocateAndInitializeSid [ADVAPI32.@]
851  *
852  * PARAMS
853  *   pIdentifierAuthority []
854  *   nSubAuthorityCount   []
855  *   nSubAuthority0       []
856  *   nSubAuthority1       []
857  *   nSubAuthority2       []
858  *   nSubAuthority3       []
859  *   nSubAuthority4       []
860  *   nSubAuthority5       []
861  *   nSubAuthority6       []
862  *   nSubAuthority7       []
863  *   pSid                 []
864  */
865 BOOL WINAPI
866 AllocateAndInitializeSid( PSID_IDENTIFIER_AUTHORITY pIdentifierAuthority,
867                           BYTE nSubAuthorityCount,
868                           DWORD nSubAuthority0, DWORD nSubAuthority1,
869                           DWORD nSubAuthority2, DWORD nSubAuthority3,
870                           DWORD nSubAuthority4, DWORD nSubAuthority5,
871                           DWORD nSubAuthority6, DWORD nSubAuthority7,
872                           PSID *pSid )
873 {
874     return set_ntstatus( RtlAllocateAndInitializeSid(
875                              pIdentifierAuthority, nSubAuthorityCount,
876                              nSubAuthority0, nSubAuthority1, nSubAuthority2, nSubAuthority3,
877                              nSubAuthority4, nSubAuthority5, nSubAuthority6, nSubAuthority7,
878                              pSid ));
879 }
880
881 /******************************************************************************
882  * FreeSid [ADVAPI32.@]
883  *
884  * PARAMS
885  *   pSid []
886  */
887 PVOID WINAPI
888 FreeSid( PSID pSid )
889 {
890         RtlFreeSid(pSid);
891         return NULL; /* is documented like this */
892 }
893
894 /******************************************************************************
895  * CopySid [ADVAPI32.@]
896  *
897  * PARAMS
898  *   nDestinationSidLength []
899  *   pDestinationSid       []
900  *   pSourceSid            []
901  */
902 BOOL WINAPI
903 CopySid( DWORD nDestinationSidLength, PSID pDestinationSid, PSID pSourceSid )
904 {
905         return RtlCopySid(nDestinationSidLength, pDestinationSid, pSourceSid);
906 }
907
908 /******************************************************************************
909  * CreateWellKnownSid [ADVAPI32.@]
910  */
911 BOOL WINAPI
912 CreateWellKnownSid( WELL_KNOWN_SID_TYPE WellKnownSidType,
913                     PSID DomainSid,
914                     PSID pSid,
915                     DWORD* cbSid)
916 {
917     unsigned int i;
918     TRACE("(%d, %s, %p, %p)\n", WellKnownSidType, debugstr_sid(DomainSid), pSid, cbSid);
919
920     if (cbSid == NULL || (DomainSid && !IsValidSid(DomainSid)))
921     {
922         SetLastError(ERROR_INVALID_PARAMETER);
923         return FALSE;
924     }
925
926     for (i = 0; i < sizeof(WellKnownSids)/sizeof(WellKnownSids[0]); i++) {
927         if (WellKnownSids[i].Type == WellKnownSidType) {
928             DWORD length = GetSidLengthRequired(WellKnownSids[i].Sid.SubAuthorityCount);
929
930             if (*cbSid < length)
931             {
932                 *cbSid = length;
933                 SetLastError(ERROR_INSUFFICIENT_BUFFER);
934                 return FALSE;
935             }
936             if (!pSid)
937             {
938                 SetLastError(ERROR_INVALID_PARAMETER);
939                 return FALSE;
940             }
941             CopyMemory(pSid, &WellKnownSids[i].Sid.Revision, length);
942             *cbSid = length;
943             return TRUE;
944         }
945     }
946
947     if (DomainSid == NULL || *GetSidSubAuthorityCount(DomainSid) == SID_MAX_SUB_AUTHORITIES)
948     {
949         SetLastError(ERROR_INVALID_PARAMETER);
950         return FALSE;
951     }
952
953     for (i = 0; i < sizeof(WellKnownRids)/sizeof(WellKnownRids[0]); i++)
954         if (WellKnownRids[i].Type == WellKnownSidType) {
955             UCHAR domain_subauth = *GetSidSubAuthorityCount(DomainSid);
956             DWORD domain_sid_length = GetSidLengthRequired(domain_subauth);
957             DWORD output_sid_length = GetSidLengthRequired(domain_subauth + 1);
958
959             if (*cbSid < output_sid_length)
960             {
961                 *cbSid = output_sid_length;
962                 SetLastError(ERROR_INSUFFICIENT_BUFFER);
963                 return FALSE;
964             }
965             if (!pSid)
966             {
967                 SetLastError(ERROR_INVALID_PARAMETER);
968                 return FALSE;
969             }
970             CopyMemory(pSid, DomainSid, domain_sid_length);
971             (*GetSidSubAuthorityCount(pSid))++;
972             (*GetSidSubAuthority(pSid, domain_subauth)) = WellKnownRids[i].Rid;
973             *cbSid = output_sid_length;
974             return TRUE;
975         }
976
977     SetLastError(ERROR_INVALID_PARAMETER);
978     return FALSE;
979 }
980
981 /******************************************************************************
982  * IsWellKnownSid [ADVAPI32.@]
983  */
984 BOOL WINAPI
985 IsWellKnownSid( PSID pSid, WELL_KNOWN_SID_TYPE WellKnownSidType )
986 {
987     unsigned int i;
988     TRACE("(%s, %d)\n", debugstr_sid(pSid), WellKnownSidType);
989
990     for (i = 0; i < sizeof(WellKnownSids)/sizeof(WellKnownSids[0]); i++)
991         if (WellKnownSids[i].Type == WellKnownSidType)
992             if (EqualSid(pSid, (PSID)&(WellKnownSids[i].Sid.Revision)))
993                 return TRUE;
994
995     return FALSE;
996 }
997
998 BOOL WINAPI
999 IsTokenRestricted( HANDLE TokenHandle )
1000 {
1001     TOKEN_GROUPS *groups;
1002     DWORD size;
1003     NTSTATUS status;
1004     BOOL restricted;
1005
1006     TRACE("(%p)\n", TokenHandle);
1007  
1008     status = NtQueryInformationToken(TokenHandle, TokenRestrictedSids, NULL, 0, &size);
1009     if (status != STATUS_BUFFER_TOO_SMALL)
1010         return FALSE;
1011  
1012     groups = HeapAlloc(GetProcessHeap(), 0, size);
1013     if (!groups)
1014     {
1015         SetLastError(ERROR_OUTOFMEMORY);
1016         return FALSE;
1017     }
1018  
1019     status = NtQueryInformationToken(TokenHandle, TokenRestrictedSids, groups, size, &size);
1020     if (status != STATUS_SUCCESS)
1021     {
1022         HeapFree(GetProcessHeap(), 0, groups);
1023         return set_ntstatus(status);
1024     }
1025  
1026     if (groups->GroupCount)
1027         restricted = TRUE;
1028     else
1029         restricted = FALSE;
1030      
1031     HeapFree(GetProcessHeap(), 0, groups);
1032  
1033     return restricted;
1034 }
1035
1036 /******************************************************************************
1037  * IsValidSid [ADVAPI32.@]
1038  *
1039  * PARAMS
1040  *   pSid []
1041  */
1042 BOOL WINAPI
1043 IsValidSid( PSID pSid )
1044 {
1045         return RtlValidSid( pSid );
1046 }
1047
1048 /******************************************************************************
1049  * EqualSid [ADVAPI32.@]
1050  *
1051  * PARAMS
1052  *   pSid1 []
1053  *   pSid2 []
1054  */
1055 BOOL WINAPI
1056 EqualSid( PSID pSid1, PSID pSid2 )
1057 {
1058         BOOL ret = RtlEqualSid( pSid1, pSid2 );
1059         SetLastError(ERROR_SUCCESS);
1060         return ret;
1061 }
1062
1063 /******************************************************************************
1064  * EqualPrefixSid [ADVAPI32.@]
1065  */
1066 BOOL WINAPI EqualPrefixSid (PSID pSid1, PSID pSid2)
1067 {
1068         return RtlEqualPrefixSid(pSid1, pSid2);
1069 }
1070
1071 /******************************************************************************
1072  * GetSidLengthRequired [ADVAPI32.@]
1073  *
1074  * PARAMS
1075  *   nSubAuthorityCount []
1076  */
1077 DWORD WINAPI
1078 GetSidLengthRequired( BYTE nSubAuthorityCount )
1079 {
1080         return RtlLengthRequiredSid(nSubAuthorityCount);
1081 }
1082
1083 /******************************************************************************
1084  * InitializeSid [ADVAPI32.@]
1085  *
1086  * PARAMS
1087  *   pIdentifierAuthority []
1088  */
1089 BOOL WINAPI
1090 InitializeSid (
1091         PSID pSid,
1092         PSID_IDENTIFIER_AUTHORITY pIdentifierAuthority,
1093         BYTE nSubAuthorityCount)
1094 {
1095         return RtlInitializeSid(pSid, pIdentifierAuthority, nSubAuthorityCount);
1096 }
1097
1098 DWORD WINAPI
1099 GetEffectiveRightsFromAclA( PACL pacl, PTRUSTEEA pTrustee, PACCESS_MASK pAccessRights )
1100 {
1101     FIXME("%p %p %p - stub\n", pacl, pTrustee, pAccessRights);
1102
1103     *pAccessRights = STANDARD_RIGHTS_ALL | SPECIFIC_RIGHTS_ALL;
1104     return 0;
1105 }
1106
1107 DWORD WINAPI
1108 GetEffectiveRightsFromAclW( PACL pacl, PTRUSTEEW pTrustee, PACCESS_MASK pAccessRights )
1109 {
1110     FIXME("%p %p %p - stub\n", pacl, pTrustee, pAccessRights);
1111
1112     return 1;
1113 }
1114
1115 /******************************************************************************
1116  * GetSidIdentifierAuthority [ADVAPI32.@]
1117  *
1118  * PARAMS
1119  *   pSid []
1120  */
1121 PSID_IDENTIFIER_AUTHORITY WINAPI
1122 GetSidIdentifierAuthority( PSID pSid )
1123 {
1124         return RtlIdentifierAuthoritySid(pSid);
1125 }
1126
1127 /******************************************************************************
1128  * GetSidSubAuthority [ADVAPI32.@]
1129  *
1130  * PARAMS
1131  *   pSid          []
1132  *   nSubAuthority []
1133  */
1134 PDWORD WINAPI
1135 GetSidSubAuthority( PSID pSid, DWORD nSubAuthority )
1136 {
1137         SetLastError(ERROR_SUCCESS);
1138         return RtlSubAuthoritySid(pSid, nSubAuthority);
1139 }
1140
1141 /******************************************************************************
1142  * GetSidSubAuthorityCount [ADVAPI32.@]
1143  *
1144  * PARAMS
1145  *   pSid []
1146  */
1147 PUCHAR WINAPI
1148 GetSidSubAuthorityCount (PSID pSid)
1149 {
1150         SetLastError(ERROR_SUCCESS);
1151         return RtlSubAuthorityCountSid(pSid);
1152 }
1153
1154 /******************************************************************************
1155  * GetLengthSid [ADVAPI32.@]
1156  *
1157  * PARAMS
1158  *   pSid []
1159  */
1160 DWORD WINAPI
1161 GetLengthSid (PSID pSid)
1162 {
1163         return RtlLengthSid(pSid);
1164 }
1165
1166 /*      ##############################################
1167         ######  SECURITY DESCRIPTOR FUNCTIONS   ######
1168         ##############################################
1169 */
1170
1171  /****************************************************************************** 
1172  * BuildSecurityDescriptorA [ADVAPI32.@]
1173  *
1174  * Builds a SD from 
1175  *
1176  * PARAMS
1177  *  pOwner                [I]
1178  *  pGroup                [I]
1179  *  cCountOfAccessEntries [I]
1180  *  pListOfAccessEntries  [I]
1181  *  cCountOfAuditEntries  [I]
1182  *  pListofAuditEntries   [I]
1183  *  pOldSD                [I]
1184  *  lpdwBufferLength      [I/O]
1185  *  pNewSD                [O]
1186  *
1187  * RETURNS
1188  *  Success: ERROR_SUCCESS
1189  *  Failure: nonzero error code from Winerror.h
1190  */
1191 DWORD WINAPI BuildSecurityDescriptorA(
1192     IN PTRUSTEEA pOwner,
1193     IN PTRUSTEEA pGroup,
1194     IN ULONG cCountOfAccessEntries,
1195     IN PEXPLICIT_ACCESSA pListOfAccessEntries,
1196     IN ULONG cCountOfAuditEntries,
1197     IN PEXPLICIT_ACCESSA pListofAuditEntries,
1198     IN PSECURITY_DESCRIPTOR pOldSD,
1199     IN OUT PULONG lpdwBufferLength,
1200     OUT PSECURITY_DESCRIPTOR* pNewSD)
1201
1202     FIXME("(%p,%p,%d,%p,%d,%p,%p,%p,%p) stub!\n",pOwner,pGroup,
1203           cCountOfAccessEntries,pListOfAccessEntries,cCountOfAuditEntries,
1204           pListofAuditEntries,pOldSD,lpdwBufferLength,pNewSD);
1205  
1206     return ERROR_CALL_NOT_IMPLEMENTED;
1207
1208  
1209 /******************************************************************************
1210  * BuildSecurityDescriptorW [ADVAPI32.@]
1211  *
1212  * See BuildSecurityDescriptorA.
1213  */
1214 DWORD WINAPI BuildSecurityDescriptorW(
1215     IN PTRUSTEEW pOwner,
1216     IN PTRUSTEEW pGroup,
1217     IN ULONG cCountOfAccessEntries,
1218     IN PEXPLICIT_ACCESSW pListOfAccessEntries,
1219     IN ULONG cCountOfAuditEntries,
1220     IN PEXPLICIT_ACCESSW pListofAuditEntries,
1221     IN PSECURITY_DESCRIPTOR pOldSD,
1222     IN OUT PULONG lpdwBufferLength,
1223     OUT PSECURITY_DESCRIPTOR* pNewSD)
1224
1225     FIXME("(%p,%p,%d,%p,%d,%p,%p,%p,%p) stub!\n",pOwner,pGroup,
1226           cCountOfAccessEntries,pListOfAccessEntries,cCountOfAuditEntries,
1227           pListofAuditEntries,pOldSD,lpdwBufferLength,pNewSD);
1228  
1229     return ERROR_CALL_NOT_IMPLEMENTED;
1230
1231
1232 /******************************************************************************
1233  * InitializeSecurityDescriptor [ADVAPI32.@]
1234  *
1235  * PARAMS
1236  *   pDescr   []
1237  *   revision []
1238  */
1239 BOOL WINAPI
1240 InitializeSecurityDescriptor( PSECURITY_DESCRIPTOR pDescr, DWORD revision )
1241 {
1242         return set_ntstatus( RtlCreateSecurityDescriptor(pDescr, revision ));
1243 }
1244
1245
1246 /******************************************************************************
1247  * MakeAbsoluteSD [ADVAPI32.@]
1248  */
1249 BOOL WINAPI MakeAbsoluteSD (
1250         IN PSECURITY_DESCRIPTOR pSelfRelativeSecurityDescriptor,
1251         OUT PSECURITY_DESCRIPTOR pAbsoluteSecurityDescriptor,
1252         OUT LPDWORD lpdwAbsoluteSecurityDescriptorSize,
1253         OUT PACL pDacl,
1254         OUT LPDWORD lpdwDaclSize,
1255         OUT PACL pSacl,
1256         OUT LPDWORD lpdwSaclSize,
1257         OUT PSID pOwner,
1258         OUT LPDWORD lpdwOwnerSize,
1259         OUT PSID pPrimaryGroup,
1260         OUT LPDWORD lpdwPrimaryGroupSize)
1261 {
1262     return set_ntstatus( RtlSelfRelativeToAbsoluteSD(pSelfRelativeSecurityDescriptor,
1263                                                      pAbsoluteSecurityDescriptor,
1264                                                      lpdwAbsoluteSecurityDescriptorSize,
1265                                                      pDacl, lpdwDaclSize, pSacl, lpdwSaclSize,
1266                                                      pOwner, lpdwOwnerSize,
1267                                                      pPrimaryGroup, lpdwPrimaryGroupSize));
1268 }
1269
1270 /******************************************************************************
1271  * GetKernelObjectSecurity [ADVAPI32.@]
1272  */
1273 BOOL WINAPI GetKernelObjectSecurity(
1274         HANDLE Handle,
1275         SECURITY_INFORMATION RequestedInformation,
1276         PSECURITY_DESCRIPTOR pSecurityDescriptor,
1277         DWORD nLength,
1278         LPDWORD lpnLengthNeeded )
1279 {
1280     TRACE("(%p,0x%08x,%p,0x%08x,%p)\n", Handle, RequestedInformation,
1281           pSecurityDescriptor, nLength, lpnLengthNeeded);
1282
1283     return set_ntstatus( NtQuerySecurityObject(Handle, RequestedInformation, pSecurityDescriptor,
1284                                                nLength, lpnLengthNeeded ));
1285 }
1286
1287 /******************************************************************************
1288  * GetPrivateObjectSecurity [ADVAPI32.@]
1289  */
1290 BOOL WINAPI GetPrivateObjectSecurity(
1291         PSECURITY_DESCRIPTOR ObjectDescriptor,
1292         SECURITY_INFORMATION SecurityInformation,
1293         PSECURITY_DESCRIPTOR ResultantDescriptor,
1294         DWORD DescriptorLength,
1295         PDWORD ReturnLength )
1296 {
1297     SECURITY_DESCRIPTOR desc;
1298     BOOL defaulted, present;
1299     PACL pacl;
1300     PSID psid;
1301
1302     TRACE("(%p,0x%08x,%p,0x%08x,%p)\n", ObjectDescriptor, SecurityInformation,
1303           ResultantDescriptor, DescriptorLength, ReturnLength);
1304
1305     if (!InitializeSecurityDescriptor(&desc, SECURITY_DESCRIPTOR_REVISION))
1306         return FALSE;
1307
1308     if (SecurityInformation & OWNER_SECURITY_INFORMATION)
1309     {
1310         if (!GetSecurityDescriptorOwner(ObjectDescriptor, &psid, &defaulted))
1311             return FALSE;
1312         SetSecurityDescriptorOwner(&desc, psid, defaulted);
1313     }
1314
1315     if (SecurityInformation & GROUP_SECURITY_INFORMATION)
1316     {
1317         if (!GetSecurityDescriptorGroup(ObjectDescriptor, &psid, &defaulted))
1318             return FALSE;
1319         SetSecurityDescriptorGroup(&desc, psid, defaulted);
1320     }
1321
1322     if (SecurityInformation & DACL_SECURITY_INFORMATION)
1323     {
1324         if (!GetSecurityDescriptorDacl(ObjectDescriptor, &present, &pacl, &defaulted))
1325             return FALSE;
1326         SetSecurityDescriptorDacl(&desc, present, pacl, defaulted);
1327     }
1328
1329     if (SecurityInformation & SACL_SECURITY_INFORMATION)
1330     {
1331         if (!GetSecurityDescriptorSacl(ObjectDescriptor, &present, &pacl, &defaulted))
1332             return FALSE;
1333         SetSecurityDescriptorSacl(&desc, present, pacl, defaulted);
1334     }
1335
1336     *ReturnLength = DescriptorLength;
1337     return MakeSelfRelativeSD(&desc, ResultantDescriptor, ReturnLength);
1338 }
1339
1340 /******************************************************************************
1341  * GetSecurityDescriptorLength [ADVAPI32.@]
1342  */
1343 DWORD WINAPI GetSecurityDescriptorLength( PSECURITY_DESCRIPTOR pDescr)
1344 {
1345         return RtlLengthSecurityDescriptor(pDescr);
1346 }
1347
1348 /******************************************************************************
1349  * GetSecurityDescriptorOwner [ADVAPI32.@]
1350  *
1351  * PARAMS
1352  *   pOwner            []
1353  *   lpbOwnerDefaulted []
1354  */
1355 BOOL WINAPI
1356 GetSecurityDescriptorOwner( PSECURITY_DESCRIPTOR pDescr, PSID *pOwner,
1357                             LPBOOL lpbOwnerDefaulted )
1358 {
1359     BOOLEAN defaulted;
1360     BOOL ret = set_ntstatus( RtlGetOwnerSecurityDescriptor( pDescr, pOwner, &defaulted ));
1361     *lpbOwnerDefaulted = defaulted;
1362     return ret;
1363 }
1364
1365 /******************************************************************************
1366  * SetSecurityDescriptorOwner [ADVAPI32.@]
1367  *
1368  * PARAMS
1369  */
1370 BOOL WINAPI SetSecurityDescriptorOwner( PSECURITY_DESCRIPTOR pSecurityDescriptor,
1371                                    PSID pOwner, BOOL bOwnerDefaulted)
1372 {
1373     return set_ntstatus( RtlSetOwnerSecurityDescriptor(pSecurityDescriptor, pOwner, bOwnerDefaulted));
1374 }
1375 /******************************************************************************
1376  * GetSecurityDescriptorGroup                   [ADVAPI32.@]
1377  */
1378 BOOL WINAPI GetSecurityDescriptorGroup(
1379         PSECURITY_DESCRIPTOR SecurityDescriptor,
1380         PSID *Group,
1381         LPBOOL GroupDefaulted)
1382 {
1383     BOOLEAN defaulted;
1384     BOOL ret = set_ntstatus( RtlGetGroupSecurityDescriptor(SecurityDescriptor, Group, &defaulted ));
1385     *GroupDefaulted = defaulted;
1386     return ret;
1387 }
1388 /******************************************************************************
1389  * SetSecurityDescriptorGroup [ADVAPI32.@]
1390  */
1391 BOOL WINAPI SetSecurityDescriptorGroup ( PSECURITY_DESCRIPTOR SecurityDescriptor,
1392                                            PSID Group, BOOL GroupDefaulted)
1393 {
1394     return set_ntstatus( RtlSetGroupSecurityDescriptor( SecurityDescriptor, Group, GroupDefaulted));
1395 }
1396
1397 /******************************************************************************
1398  * IsValidSecurityDescriptor [ADVAPI32.@]
1399  *
1400  * PARAMS
1401  *   lpsecdesc []
1402  */
1403 BOOL WINAPI
1404 IsValidSecurityDescriptor( PSECURITY_DESCRIPTOR SecurityDescriptor )
1405 {
1406     return set_ntstatus( RtlValidSecurityDescriptor(SecurityDescriptor));
1407 }
1408
1409 /******************************************************************************
1410  *  GetSecurityDescriptorDacl                   [ADVAPI32.@]
1411  */
1412 BOOL WINAPI GetSecurityDescriptorDacl(
1413         IN PSECURITY_DESCRIPTOR pSecurityDescriptor,
1414         OUT LPBOOL lpbDaclPresent,
1415         OUT PACL *pDacl,
1416         OUT LPBOOL lpbDaclDefaulted)
1417 {
1418     BOOLEAN present, defaulted;
1419     BOOL ret = set_ntstatus( RtlGetDaclSecurityDescriptor(pSecurityDescriptor, &present, pDacl, &defaulted));
1420     *lpbDaclPresent = present;
1421     *lpbDaclDefaulted = defaulted;
1422     return ret;
1423 }
1424
1425 /******************************************************************************
1426  *  SetSecurityDescriptorDacl                   [ADVAPI32.@]
1427  */
1428 BOOL WINAPI
1429 SetSecurityDescriptorDacl (
1430         PSECURITY_DESCRIPTOR lpsd,
1431         BOOL daclpresent,
1432         PACL dacl,
1433         BOOL dacldefaulted )
1434 {
1435     return set_ntstatus( RtlSetDaclSecurityDescriptor (lpsd, daclpresent, dacl, dacldefaulted ) );
1436 }
1437 /******************************************************************************
1438  *  GetSecurityDescriptorSacl                   [ADVAPI32.@]
1439  */
1440 BOOL WINAPI GetSecurityDescriptorSacl(
1441         IN PSECURITY_DESCRIPTOR lpsd,
1442         OUT LPBOOL lpbSaclPresent,
1443         OUT PACL *pSacl,
1444         OUT LPBOOL lpbSaclDefaulted)
1445 {
1446     BOOLEAN present, defaulted;
1447     BOOL ret = set_ntstatus( RtlGetSaclSecurityDescriptor(lpsd, &present, pSacl, &defaulted) );
1448     *lpbSaclPresent = present;
1449     *lpbSaclDefaulted = defaulted;
1450     return ret;
1451 }
1452
1453 /**************************************************************************
1454  * SetSecurityDescriptorSacl                    [ADVAPI32.@]
1455  */
1456 BOOL WINAPI SetSecurityDescriptorSacl (
1457         PSECURITY_DESCRIPTOR lpsd,
1458         BOOL saclpresent,
1459         PACL lpsacl,
1460         BOOL sacldefaulted)
1461 {
1462     return set_ntstatus (RtlSetSaclSecurityDescriptor(lpsd, saclpresent, lpsacl, sacldefaulted));
1463 }
1464 /******************************************************************************
1465  * MakeSelfRelativeSD [ADVAPI32.@]
1466  *
1467  * PARAMS
1468  *   lpabssecdesc  []
1469  *   lpselfsecdesc []
1470  *   lpbuflen      []
1471  */
1472 BOOL WINAPI
1473 MakeSelfRelativeSD(
1474         IN PSECURITY_DESCRIPTOR pAbsoluteSecurityDescriptor,
1475         IN PSECURITY_DESCRIPTOR pSelfRelativeSecurityDescriptor,
1476         IN OUT LPDWORD lpdwBufferLength)
1477 {
1478     return set_ntstatus( RtlMakeSelfRelativeSD( pAbsoluteSecurityDescriptor,
1479                                                 pSelfRelativeSecurityDescriptor, lpdwBufferLength));
1480 }
1481
1482 /******************************************************************************
1483  * GetSecurityDescriptorControl                 [ADVAPI32.@]
1484  */
1485
1486 BOOL WINAPI GetSecurityDescriptorControl ( PSECURITY_DESCRIPTOR  pSecurityDescriptor,
1487                  PSECURITY_DESCRIPTOR_CONTROL pControl, LPDWORD lpdwRevision)
1488 {
1489     return set_ntstatus( RtlGetControlSecurityDescriptor(pSecurityDescriptor,pControl,lpdwRevision));
1490 }
1491
1492 /******************************************************************************
1493  * SetSecurityDescriptorControl                 [ADVAPI32.@]
1494  */
1495 BOOL WINAPI SetSecurityDescriptorControl( PSECURITY_DESCRIPTOR pSecurityDescriptor,
1496   SECURITY_DESCRIPTOR_CONTROL ControlBitsOfInterest,
1497   SECURITY_DESCRIPTOR_CONTROL ControlBitsToSet )
1498 {
1499     return set_ntstatus( RtlSetControlSecurityDescriptor(
1500         pSecurityDescriptor, ControlBitsOfInterest, ControlBitsToSet ) );
1501 }
1502
1503 /*      ##############################
1504         ######  ACL FUNCTIONS   ######
1505         ##############################
1506 */
1507
1508 /*************************************************************************
1509  * InitializeAcl [ADVAPI32.@]
1510  */
1511 BOOL WINAPI InitializeAcl(PACL acl, DWORD size, DWORD rev)
1512 {
1513     return set_ntstatus( RtlCreateAcl(acl, size, rev));
1514 }
1515
1516 BOOL WINAPI ImpersonateNamedPipeClient( HANDLE hNamedPipe )
1517 {
1518     IO_STATUS_BLOCK io_block;
1519
1520     TRACE("(%p)\n", hNamedPipe);
1521
1522     return set_ntstatus( NtFsControlFile(hNamedPipe, NULL, NULL, NULL,
1523                          &io_block, FSCTL_PIPE_IMPERSONATE, NULL, 0, NULL, 0) );
1524 }
1525
1526 /******************************************************************************
1527  *  AddAccessAllowedAce [ADVAPI32.@]
1528  */
1529 BOOL WINAPI AddAccessAllowedAce(
1530         IN OUT PACL pAcl,
1531         IN DWORD dwAceRevision,
1532         IN DWORD AccessMask,
1533         IN PSID pSid)
1534 {
1535     return set_ntstatus(RtlAddAccessAllowedAce(pAcl, dwAceRevision, AccessMask, pSid));
1536 }
1537
1538 /******************************************************************************
1539  *  AddAccessAllowedAceEx [ADVAPI32.@]
1540  */
1541 BOOL WINAPI AddAccessAllowedAceEx(
1542         IN OUT PACL pAcl,
1543         IN DWORD dwAceRevision,
1544         IN DWORD AceFlags,
1545         IN DWORD AccessMask,
1546         IN PSID pSid)
1547 {
1548     return set_ntstatus(RtlAddAccessAllowedAceEx(pAcl, dwAceRevision, AceFlags, AccessMask, pSid));
1549 }
1550
1551 /******************************************************************************
1552  *  AddAccessDeniedAce [ADVAPI32.@]
1553  */
1554 BOOL WINAPI AddAccessDeniedAce(
1555         IN OUT PACL pAcl,
1556         IN DWORD dwAceRevision,
1557         IN DWORD AccessMask,
1558         IN PSID pSid)
1559 {
1560     return set_ntstatus(RtlAddAccessDeniedAce(pAcl, dwAceRevision, AccessMask, pSid));
1561 }
1562
1563 /******************************************************************************
1564  *  AddAccessDeniedAceEx [ADVAPI32.@]
1565  */
1566 BOOL WINAPI AddAccessDeniedAceEx(
1567         IN OUT PACL pAcl,
1568         IN DWORD dwAceRevision,
1569         IN DWORD AceFlags,
1570         IN DWORD AccessMask,
1571         IN PSID pSid)
1572 {
1573     return set_ntstatus(RtlAddAccessDeniedAceEx(pAcl, dwAceRevision, AceFlags, AccessMask, pSid));
1574 }
1575
1576 /******************************************************************************
1577  *  AddAce [ADVAPI32.@]
1578  */
1579 BOOL WINAPI AddAce(
1580         IN OUT PACL pAcl,
1581         IN DWORD dwAceRevision,
1582         IN DWORD dwStartingAceIndex,
1583         LPVOID pAceList,
1584         DWORD nAceListLength)
1585 {
1586     return set_ntstatus(RtlAddAce(pAcl, dwAceRevision, dwStartingAceIndex, pAceList, nAceListLength));
1587 }
1588
1589 /******************************************************************************
1590  * DeleteAce [ADVAPI32.@]
1591  */
1592 BOOL WINAPI DeleteAce(PACL pAcl, DWORD dwAceIndex)
1593 {
1594     return set_ntstatus(RtlDeleteAce(pAcl, dwAceIndex));
1595 }
1596
1597 /******************************************************************************
1598  *  FindFirstFreeAce [ADVAPI32.@]
1599  */
1600 BOOL WINAPI FindFirstFreeAce(IN PACL pAcl, LPVOID * pAce)
1601 {
1602         return RtlFirstFreeAce(pAcl, (PACE_HEADER *)pAce);
1603 }
1604
1605 /******************************************************************************
1606  * GetAce [ADVAPI32.@]
1607  */
1608 BOOL WINAPI GetAce(PACL pAcl,DWORD dwAceIndex,LPVOID *pAce )
1609 {
1610     return set_ntstatus(RtlGetAce(pAcl, dwAceIndex, pAce));
1611 }
1612
1613 /******************************************************************************
1614  * GetAclInformation [ADVAPI32.@]
1615  */
1616 BOOL WINAPI GetAclInformation(
1617   PACL pAcl,
1618   LPVOID pAclInformation,
1619   DWORD nAclInformationLength,
1620   ACL_INFORMATION_CLASS dwAclInformationClass)
1621 {
1622     return set_ntstatus(RtlQueryInformationAcl(pAcl, pAclInformation,
1623                                                nAclInformationLength, dwAclInformationClass));
1624 }
1625
1626 /******************************************************************************
1627  *  IsValidAcl [ADVAPI32.@]
1628  */
1629 BOOL WINAPI IsValidAcl(IN PACL pAcl)
1630 {
1631         return RtlValidAcl(pAcl);
1632 }
1633
1634 /*      ##############################
1635         ######  MISC FUNCTIONS  ######
1636         ##############################
1637 */
1638
1639 /******************************************************************************
1640  * AllocateLocallyUniqueId [ADVAPI32.@]
1641  *
1642  * PARAMS
1643  *   lpLuid []
1644  */
1645 BOOL WINAPI AllocateLocallyUniqueId( PLUID lpLuid )
1646 {
1647     return set_ntstatus(NtAllocateLocallyUniqueId(lpLuid));
1648 }
1649
1650 static const WCHAR SE_CREATE_TOKEN_NAME_W[] =
1651  { 'S','e','C','r','e','a','t','e','T','o','k','e','n','P','r','i','v','i','l','e','g','e',0 };
1652 static const WCHAR SE_ASSIGNPRIMARYTOKEN_NAME_W[] =
1653  { 'S','e','A','s','s','i','g','n','P','r','i','m','a','r','y','T','o','k','e','n','P','r','i','v','i','l','e','g','e',0 };
1654 static const WCHAR SE_LOCK_MEMORY_NAME_W[] =
1655  { 'S','e','L','o','c','k','M','e','m','o','r','y','P','r','i','v','i','l','e','g','e',0 };
1656 static const WCHAR SE_INCREASE_QUOTA_NAME_W[] =
1657  { 'S','e','I','n','c','r','e','a','s','e','Q','u','o','t','a','P','r','i','v','i','l','e','g','e',0 };
1658 static const WCHAR SE_MACHINE_ACCOUNT_NAME_W[] =
1659  { 'S','e','M','a','c','h','i','n','e','A','c','c','o','u','n','t','P','r','i','v','i','l','e','g','e',0 };
1660 static const WCHAR SE_TCB_NAME_W[] =
1661  { 'S','e','T','c','b','P','r','i','v','i','l','e','g','e',0 };
1662 static const WCHAR SE_SECURITY_NAME_W[] =
1663  { 'S','e','S','e','c','u','r','i','t','y','P','r','i','v','i','l','e','g','e',0 };
1664 static const WCHAR SE_TAKE_OWNERSHIP_NAME_W[] =
1665  { 'S','e','T','a','k','e','O','w','n','e','r','s','h','i','p','P','r','i','v','i','l','e','g','e',0 };
1666 static const WCHAR SE_LOAD_DRIVER_NAME_W[] =
1667  { 'S','e','L','o','a','d','D','r','i','v','e','r','P','r','i','v','i','l','e','g','e',0 };
1668 static const WCHAR SE_SYSTEM_PROFILE_NAME_W[] =
1669  { 'S','e','S','y','s','t','e','m','P','r','o','f','i','l','e','P','r','i','v','i','l','e','g','e',0 };
1670 static const WCHAR SE_SYSTEMTIME_NAME_W[] =
1671  { 'S','e','S','y','s','t','e','m','t','i','m','e','P','r','i','v','i','l','e','g','e',0 };
1672 static const WCHAR SE_PROF_SINGLE_PROCESS_NAME_W[] =
1673  { 'S','e','P','r','o','f','i','l','e','S','i','n','g','l','e','P','r','o','c','e','s','s','P','r','i','v','i','l','e','g','e',0 };
1674 static const WCHAR SE_INC_BASE_PRIORITY_NAME_W[] =
1675  { 'S','e','I','n','c','r','e','a','s','e','B','a','s','e','P','r','i','o','r','i','t','y','P','r','i','v','i','l','e','g','e',0 };
1676 static const WCHAR SE_CREATE_PAGEFILE_NAME_W[] =
1677  { 'S','e','C','r','e','a','t','e','P','a','g','e','f','i','l','e','P','r','i','v','i','l','e','g','e',0 };
1678 static const WCHAR SE_CREATE_PERMANENT_NAME_W[] =
1679  { 'S','e','C','r','e','a','t','e','P','e','r','m','a','n','e','n','t','P','r','i','v','i','l','e','g','e',0 };
1680 static const WCHAR SE_BACKUP_NAME_W[] =
1681  { 'S','e','B','a','c','k','u','p','P','r','i','v','i','l','e','g','e',0 };
1682 static const WCHAR SE_RESTORE_NAME_W[] =
1683  { 'S','e','R','e','s','t','o','r','e','P','r','i','v','i','l','e','g','e',0 };
1684 static const WCHAR SE_SHUTDOWN_NAME_W[] =
1685  { 'S','e','S','h','u','t','d','o','w','n','P','r','i','v','i','l','e','g','e',0 };
1686 static const WCHAR SE_DEBUG_NAME_W[] =
1687  { 'S','e','D','e','b','u','g','P','r','i','v','i','l','e','g','e',0 };
1688 static const WCHAR SE_AUDIT_NAME_W[] =
1689  { 'S','e','A','u','d','i','t','P','r','i','v','i','l','e','g','e',0 };
1690 static const WCHAR SE_SYSTEM_ENVIRONMENT_NAME_W[] =
1691  { 'S','e','S','y','s','t','e','m','E','n','v','i','r','o','n','m','e','n','t','P','r','i','v','i','l','e','g','e',0 };
1692 static const WCHAR SE_CHANGE_NOTIFY_NAME_W[] =
1693  { 'S','e','C','h','a','n','g','e','N','o','t','i','f','y','P','r','i','v','i','l','e','g','e',0 };
1694 static const WCHAR SE_REMOTE_SHUTDOWN_NAME_W[] =
1695  { 'S','e','R','e','m','o','t','e','S','h','u','t','d','o','w','n','P','r','i','v','i','l','e','g','e',0 };
1696 static const WCHAR SE_UNDOCK_NAME_W[] =
1697  { 'S','e','U','n','d','o','c','k','P','r','i','v','i','l','e','g','e',0 };
1698 static const WCHAR SE_SYNC_AGENT_NAME_W[] =
1699  { 'S','e','S','y','n','c','A','g','e','n','t','P','r','i','v','i','l','e','g','e',0 };
1700 static const WCHAR SE_ENABLE_DELEGATION_NAME_W[] =
1701  { 'S','e','E','n','a','b','l','e','D','e','l','e','g','a','t','i','o','n','P','r','i','v','i','l','e','g','e',0 };
1702 static const WCHAR SE_MANAGE_VOLUME_NAME_W[] =
1703  { 'S','e','M','a','n','a','g','e','V','o','l','u','m','e','P','r','i','v','i','l','e','g','e',0 };
1704 static const WCHAR SE_IMPERSONATE_NAME_W[] =
1705  { 'S','e','I','m','p','e','r','s','o','n','a','t','e','P','r','i','v','i','l','e','g','e',0 };
1706 static const WCHAR SE_CREATE_GLOBAL_NAME_W[] =
1707  { 'S','e','C','r','e','a','t','e','G','l','o','b','a','l','P','r','i','v','i','l','e','g','e',0 };
1708
1709 static const WCHAR * const WellKnownPrivNames[SE_MAX_WELL_KNOWN_PRIVILEGE + 1] =
1710 {
1711     NULL,
1712     NULL,
1713     SE_CREATE_TOKEN_NAME_W,
1714     SE_ASSIGNPRIMARYTOKEN_NAME_W,
1715     SE_LOCK_MEMORY_NAME_W,
1716     SE_INCREASE_QUOTA_NAME_W,
1717     SE_MACHINE_ACCOUNT_NAME_W,
1718     SE_TCB_NAME_W,
1719     SE_SECURITY_NAME_W,
1720     SE_TAKE_OWNERSHIP_NAME_W,
1721     SE_LOAD_DRIVER_NAME_W,
1722     SE_SYSTEM_PROFILE_NAME_W,
1723     SE_SYSTEMTIME_NAME_W,
1724     SE_PROF_SINGLE_PROCESS_NAME_W,
1725     SE_INC_BASE_PRIORITY_NAME_W,
1726     SE_CREATE_PAGEFILE_NAME_W,
1727     SE_CREATE_PERMANENT_NAME_W,
1728     SE_BACKUP_NAME_W,
1729     SE_RESTORE_NAME_W,
1730     SE_SHUTDOWN_NAME_W,
1731     SE_DEBUG_NAME_W,
1732     SE_AUDIT_NAME_W,
1733     SE_SYSTEM_ENVIRONMENT_NAME_W,
1734     SE_CHANGE_NOTIFY_NAME_W,
1735     SE_REMOTE_SHUTDOWN_NAME_W,
1736     SE_UNDOCK_NAME_W,
1737     SE_SYNC_AGENT_NAME_W,
1738     SE_ENABLE_DELEGATION_NAME_W,
1739     SE_MANAGE_VOLUME_NAME_W,
1740     SE_IMPERSONATE_NAME_W,
1741     SE_CREATE_GLOBAL_NAME_W,
1742 };
1743
1744 /******************************************************************************
1745  * LookupPrivilegeValueW                        [ADVAPI32.@]
1746  *
1747  * See LookupPrivilegeValueA.
1748  */
1749 BOOL WINAPI
1750 LookupPrivilegeValueW( LPCWSTR lpSystemName, LPCWSTR lpName, PLUID lpLuid )
1751 {
1752     UINT i;
1753
1754     TRACE("%s,%s,%p\n",debugstr_w(lpSystemName), debugstr_w(lpName), lpLuid);
1755
1756     if (!ADVAPI_IsLocalComputer(lpSystemName))
1757     {
1758         SetLastError(RPC_S_SERVER_UNAVAILABLE);
1759         return FALSE;
1760     }
1761     if (!lpName)
1762     {
1763         SetLastError(ERROR_NO_SUCH_PRIVILEGE);
1764         return FALSE;
1765     }
1766     for( i=SE_MIN_WELL_KNOWN_PRIVILEGE; i<=SE_MAX_WELL_KNOWN_PRIVILEGE; i++ )
1767     {
1768         if( !WellKnownPrivNames[i] )
1769             continue;
1770         if( strcmpiW( WellKnownPrivNames[i], lpName) )
1771             continue;
1772         lpLuid->LowPart = i;
1773         lpLuid->HighPart = 0;
1774         TRACE( "%s -> %08x-%08x\n",debugstr_w( lpSystemName ),
1775                lpLuid->HighPart, lpLuid->LowPart );
1776         return TRUE;
1777     }
1778     SetLastError(ERROR_NO_SUCH_PRIVILEGE);
1779     return FALSE;
1780 }
1781
1782 /******************************************************************************
1783  * LookupPrivilegeValueA                        [ADVAPI32.@]
1784  *
1785  * Retrieves LUID used on a system to represent the privilege name.
1786  *
1787  * PARAMS
1788  *  lpSystemName [I] Name of the system
1789  *  lpName       [I] Name of the privilege
1790  *  lpLuid       [O] Destination for the resulting LUID
1791  *
1792  * RETURNS
1793  *  Success: TRUE. lpLuid contains the requested LUID.
1794  *  Failure: FALSE.
1795  */
1796 BOOL WINAPI
1797 LookupPrivilegeValueA( LPCSTR lpSystemName, LPCSTR lpName, PLUID lpLuid )
1798 {
1799     UNICODE_STRING lpSystemNameW;
1800     UNICODE_STRING lpNameW;
1801     BOOL ret;
1802
1803     RtlCreateUnicodeStringFromAsciiz(&lpSystemNameW, lpSystemName);
1804     RtlCreateUnicodeStringFromAsciiz(&lpNameW,lpName);
1805     ret = LookupPrivilegeValueW(lpSystemNameW.Buffer, lpNameW.Buffer, lpLuid);
1806     RtlFreeUnicodeString(&lpNameW);
1807     RtlFreeUnicodeString(&lpSystemNameW);
1808     return ret;
1809 }
1810
1811 BOOL WINAPI LookupPrivilegeDisplayNameA( LPCSTR lpSystemName, LPCSTR lpName, LPSTR lpDisplayName,
1812                                          LPDWORD cchDisplayName, LPDWORD lpLanguageId )
1813 {
1814     FIXME("%s %s %s %p %p - stub\n", debugstr_a(lpSystemName), debugstr_a(lpName),
1815           debugstr_a(lpDisplayName), cchDisplayName, lpLanguageId);
1816
1817     return FALSE;
1818 }
1819
1820 BOOL WINAPI LookupPrivilegeDisplayNameW( LPCWSTR lpSystemName, LPCWSTR lpName, LPWSTR lpDisplayName,
1821                                          LPDWORD cchDisplayName, LPDWORD lpLanguageId )
1822 {
1823     FIXME("%s %s %s %p %p - stub\n", debugstr_w(lpSystemName), debugstr_w(lpName),
1824           debugstr_w(lpDisplayName), cchDisplayName, lpLanguageId);
1825
1826     return FALSE;
1827 }
1828
1829 /******************************************************************************
1830  * LookupPrivilegeNameA                 [ADVAPI32.@]
1831  *
1832  * See LookupPrivilegeNameW.
1833  */
1834 BOOL WINAPI
1835 LookupPrivilegeNameA( LPCSTR lpSystemName, PLUID lpLuid, LPSTR lpName,
1836  LPDWORD cchName)
1837 {
1838     UNICODE_STRING lpSystemNameW;
1839     BOOL ret;
1840     DWORD wLen = 0;
1841
1842     TRACE("%s %p %p %p\n", debugstr_a(lpSystemName), lpLuid, lpName, cchName);
1843
1844     RtlCreateUnicodeStringFromAsciiz(&lpSystemNameW, lpSystemName);
1845     ret = LookupPrivilegeNameW(lpSystemNameW.Buffer, lpLuid, NULL, &wLen);
1846     if (!ret && GetLastError() == ERROR_INSUFFICIENT_BUFFER)
1847     {
1848         LPWSTR lpNameW = HeapAlloc(GetProcessHeap(), 0, wLen * sizeof(WCHAR));
1849
1850         ret = LookupPrivilegeNameW(lpSystemNameW.Buffer, lpLuid, lpNameW,
1851          &wLen);
1852         if (ret)
1853         {
1854             /* Windows crashes if cchName is NULL, so will I */
1855             unsigned int len = WideCharToMultiByte(CP_ACP, 0, lpNameW, -1, lpName,
1856              *cchName, NULL, NULL);
1857
1858             if (len == 0)
1859             {
1860                 /* WideCharToMultiByte failed */
1861                 ret = FALSE;
1862             }
1863             else if (len > *cchName)
1864             {
1865                 *cchName = len;
1866                 SetLastError(ERROR_INSUFFICIENT_BUFFER);
1867                 ret = FALSE;
1868             }
1869             else
1870             {
1871                 /* WideCharToMultiByte succeeded, output length needs to be
1872                  * length not including NULL terminator
1873                  */
1874                 *cchName = len - 1;
1875             }
1876         }
1877         HeapFree(GetProcessHeap(), 0, lpNameW);
1878     }
1879     RtlFreeUnicodeString(&lpSystemNameW);
1880     return ret;
1881 }
1882
1883 /******************************************************************************
1884  * LookupPrivilegeNameW                 [ADVAPI32.@]
1885  *
1886  * Retrieves the privilege name referred to by the LUID lpLuid.
1887  *
1888  * PARAMS
1889  *  lpSystemName [I]   Name of the system
1890  *  lpLuid       [I]   Privilege value
1891  *  lpName       [O]   Name of the privilege
1892  *  cchName      [I/O] Number of characters in lpName.
1893  *
1894  * RETURNS
1895  *  Success: TRUE. lpName contains the name of the privilege whose value is
1896  *  *lpLuid.
1897  *  Failure: FALSE.
1898  *
1899  * REMARKS
1900  *  Only well-known privilege names (those defined in winnt.h) can be retrieved
1901  *  using this function.
1902  *  If the length of lpName is too small, on return *cchName will contain the
1903  *  number of WCHARs needed to contain the privilege, including the NULL
1904  *  terminator, and GetLastError will return ERROR_INSUFFICIENT_BUFFER.
1905  *  On success, *cchName will contain the number of characters stored in
1906  *  lpName, NOT including the NULL terminator.
1907  */
1908 BOOL WINAPI
1909 LookupPrivilegeNameW( LPCWSTR lpSystemName, PLUID lpLuid, LPWSTR lpName,
1910  LPDWORD cchName)
1911 {
1912     size_t privNameLen;
1913
1914     TRACE("%s,%p,%p,%p\n",debugstr_w(lpSystemName), lpLuid, lpName, cchName);
1915
1916     if (!ADVAPI_IsLocalComputer(lpSystemName))
1917     {
1918         SetLastError(RPC_S_SERVER_UNAVAILABLE);
1919         return FALSE;
1920     }
1921     if (lpLuid->HighPart || (lpLuid->LowPart < SE_MIN_WELL_KNOWN_PRIVILEGE ||
1922      lpLuid->LowPart > SE_MAX_WELL_KNOWN_PRIVILEGE))
1923     {
1924         SetLastError(ERROR_NO_SUCH_PRIVILEGE);
1925         return FALSE;
1926     }
1927     privNameLen = strlenW(WellKnownPrivNames[lpLuid->LowPart]);
1928     /* Windows crashes if cchName is NULL, so will I */
1929     if (*cchName <= privNameLen)
1930     {
1931         *cchName = privNameLen + 1;
1932         SetLastError(ERROR_INSUFFICIENT_BUFFER);
1933         return FALSE;
1934     }
1935     else
1936     {
1937         strcpyW(lpName, WellKnownPrivNames[lpLuid->LowPart]);
1938         *cchName = privNameLen;
1939         return TRUE;
1940     }
1941 }
1942
1943 /******************************************************************************
1944  * GetFileSecurityA [ADVAPI32.@]
1945  *
1946  * Obtains Specified information about the security of a file or directory.
1947  *
1948  * PARAMS
1949  *  lpFileName           [I] Name of the file to get info for
1950  *  RequestedInformation [I] SE_ flags from "winnt.h"
1951  *  pSecurityDescriptor  [O] Destination for security information
1952  *  nLength              [I] Length of pSecurityDescriptor
1953  *  lpnLengthNeeded      [O] Destination for length of returned security information
1954  *
1955  * RETURNS
1956  *  Success: TRUE. pSecurityDescriptor contains the requested information.
1957  *  Failure: FALSE. lpnLengthNeeded contains the required space to return the info. 
1958  *
1959  * NOTES
1960  *  The information returned is constrained by the callers access rights and
1961  *  privileges.
1962  */
1963 BOOL WINAPI
1964 GetFileSecurityA( LPCSTR lpFileName,
1965                     SECURITY_INFORMATION RequestedInformation,
1966                     PSECURITY_DESCRIPTOR pSecurityDescriptor,
1967                     DWORD nLength, LPDWORD lpnLengthNeeded )
1968 {
1969     DWORD len;
1970     BOOL r;
1971     LPWSTR name = NULL;
1972
1973     if( lpFileName )
1974     {
1975         len = MultiByteToWideChar( CP_ACP, 0, lpFileName, -1, NULL, 0 );
1976         name = HeapAlloc( GetProcessHeap(), 0, len*sizeof(WCHAR) );
1977         MultiByteToWideChar( CP_ACP, 0, lpFileName, -1, name, len );
1978     }
1979
1980     r = GetFileSecurityW( name, RequestedInformation, pSecurityDescriptor,
1981                           nLength, lpnLengthNeeded );
1982     HeapFree( GetProcessHeap(), 0, name );
1983
1984     return r;
1985 }
1986
1987 /******************************************************************************
1988  * GetFileSecurityW [ADVAPI32.@]
1989  *
1990  * See GetFileSecurityA.
1991  */
1992 BOOL WINAPI
1993 GetFileSecurityW( LPCWSTR lpFileName,
1994                     SECURITY_INFORMATION RequestedInformation,
1995                     PSECURITY_DESCRIPTOR pSecurityDescriptor,
1996                     DWORD nLength, LPDWORD lpnLengthNeeded )
1997 {
1998     HANDLE hfile;
1999     NTSTATUS status;
2000     DWORD access = 0;
2001
2002     TRACE("(%s,%d,%p,%d,%p)\n", debugstr_w(lpFileName),
2003           RequestedInformation, pSecurityDescriptor,
2004           nLength, lpnLengthNeeded);
2005
2006     if (RequestedInformation & (OWNER_SECURITY_INFORMATION|GROUP_SECURITY_INFORMATION|
2007                                 DACL_SECURITY_INFORMATION))
2008         access |= READ_CONTROL;
2009     if (RequestedInformation & SACL_SECURITY_INFORMATION)
2010         access |= ACCESS_SYSTEM_SECURITY;
2011
2012     hfile = CreateFileW( lpFileName, access, FILE_SHARE_READ|FILE_SHARE_WRITE|FILE_SHARE_DELETE,
2013                          NULL, OPEN_EXISTING, FILE_FLAG_BACKUP_SEMANTICS, 0 );
2014     if ( hfile == INVALID_HANDLE_VALUE )
2015         return FALSE;
2016
2017     status = NtQuerySecurityObject( hfile, RequestedInformation, pSecurityDescriptor,
2018                                     nLength, lpnLengthNeeded );
2019     CloseHandle( hfile );
2020     return set_ntstatus( status );
2021 }
2022
2023
2024 /******************************************************************************
2025  * LookupAccountSidA [ADVAPI32.@]
2026  */
2027 BOOL WINAPI
2028 LookupAccountSidA(
2029         IN LPCSTR system,
2030         IN PSID sid,
2031         OUT LPSTR account,
2032         IN OUT LPDWORD accountSize,
2033         OUT LPSTR domain,
2034         IN OUT LPDWORD domainSize,
2035         OUT PSID_NAME_USE name_use )
2036 {
2037     DWORD len;
2038     BOOL r;
2039     LPWSTR systemW = NULL;
2040     LPWSTR accountW = NULL;
2041     LPWSTR domainW = NULL;
2042     DWORD accountSizeW = *accountSize;
2043     DWORD domainSizeW = *domainSize;
2044
2045     if (system) {
2046         len = MultiByteToWideChar( CP_ACP, 0, system, -1, NULL, 0 );
2047         systemW = HeapAlloc( GetProcessHeap(), 0, len * sizeof(WCHAR) );
2048         MultiByteToWideChar( CP_ACP, 0, system, -1, systemW, len );
2049     }
2050     if (account)
2051         accountW = HeapAlloc( GetProcessHeap(), 0, accountSizeW * sizeof(WCHAR) );
2052     if (domain)
2053         domainW = HeapAlloc( GetProcessHeap(), 0, domainSizeW * sizeof(WCHAR) );
2054
2055     r = LookupAccountSidW( systemW, sid, accountW, &accountSizeW, domainW, &domainSizeW, name_use );
2056
2057     if (r) {
2058         if (accountW && *accountSize) {
2059             len = WideCharToMultiByte( CP_ACP, 0, accountW, -1, NULL, 0, NULL, NULL );
2060             WideCharToMultiByte( CP_ACP, 0, accountW, -1, account, len, NULL, NULL );
2061             *accountSize = len;
2062         } else
2063             *accountSize = accountSizeW + 1;
2064
2065         if (domainW && *domainSize) {
2066             len = WideCharToMultiByte( CP_ACP, 0, domainW, -1, NULL, 0, NULL, NULL );
2067             WideCharToMultiByte( CP_ACP, 0, domainW, -1, domain, len, NULL, NULL );
2068             *domainSize = len;
2069         } else
2070             *domainSize = domainSizeW + 1;
2071     }
2072
2073     HeapFree( GetProcessHeap(), 0, systemW );
2074     HeapFree( GetProcessHeap(), 0, accountW );
2075     HeapFree( GetProcessHeap(), 0, domainW );
2076
2077     return r;
2078 }
2079
2080 /******************************************************************************
2081  * LookupAccountSidW [ADVAPI32.@]
2082  *
2083  * PARAMS
2084  *   system      []
2085  *   sid         []
2086  *   account     []
2087  *   accountSize []
2088  *   domain      []
2089  *   domainSize  []
2090  *   name_use    []
2091  */
2092
2093 BOOL WINAPI
2094 LookupAccountSidW(
2095         IN LPCWSTR system,
2096         IN PSID sid,
2097         OUT LPWSTR account,
2098         IN OUT LPDWORD accountSize,
2099         OUT LPWSTR domain,
2100         IN OUT LPDWORD domainSize,
2101         OUT PSID_NAME_USE name_use )
2102 {
2103     unsigned int i, j;
2104     const WCHAR * ac = NULL;
2105     const WCHAR * dm = NULL;
2106     SID_NAME_USE use = 0;
2107     LPWSTR computer_name = NULL;
2108     LPWSTR account_name = NULL;
2109
2110     TRACE("(%s,sid=%s,%p,%p(%u),%p,%p(%u),%p)\n",
2111           debugstr_w(system),debugstr_sid(sid),
2112           account,accountSize,accountSize?*accountSize:0,
2113           domain,domainSize,domainSize?*domainSize:0,
2114           name_use);
2115
2116     if (!ADVAPI_IsLocalComputer(system)) {
2117         FIXME("Only local computer supported!\n");
2118         SetLastError(RPC_S_SERVER_UNAVAILABLE);
2119         return FALSE;
2120     }
2121
2122     /* check the well known SIDs first */
2123     for (i = 0; i <= 60; i++) {
2124         if (IsWellKnownSid(sid, i)) {
2125             for (j = 0; j < (sizeof(ACCOUNT_SIDS) / sizeof(ACCOUNT_SIDS[0])); j++) {
2126                 if (ACCOUNT_SIDS[j].type == i) {
2127                     ac = ACCOUNT_SIDS[j].account;
2128                     dm = ACCOUNT_SIDS[j].domain;
2129                     use = ACCOUNT_SIDS[j].name_use;
2130                 }
2131             }
2132             break;
2133         }
2134     }
2135
2136     if (dm == NULL) {
2137         MAX_SID local;
2138
2139         /* check for the local computer next */
2140         if (ADVAPI_GetComputerSid(&local)) {
2141             DWORD size = MAX_COMPUTERNAME_LENGTH + 1;
2142             BOOL result;
2143
2144             computer_name = HeapAlloc(GetProcessHeap(), 0, size * sizeof(WCHAR));
2145             result = GetComputerNameW(computer_name,  &size);
2146
2147             if (result) {
2148                 if (EqualSid(sid, &local)) {
2149                     dm = computer_name;
2150                     ac = Blank;
2151                     use = 3;
2152                 } else {
2153                     local.SubAuthorityCount++;
2154
2155                     if (EqualPrefixSid(sid, &local)) {
2156                         dm = computer_name;
2157                         use = 1;
2158                         switch (((MAX_SID *)sid)->SubAuthority[4]) {
2159                         case DOMAIN_USER_RID_ADMIN:
2160                             ac = Administrator;
2161                             break;
2162                         case DOMAIN_USER_RID_GUEST:
2163                             ac = Guest;
2164                             break;
2165                         case DOMAIN_GROUP_RID_ADMINS:
2166                             ac = Domain_Admins;
2167                             break;
2168                         case DOMAIN_GROUP_RID_USERS:
2169                             ac = Domain_Users;
2170                             break;
2171                         case DOMAIN_GROUP_RID_GUESTS:
2172                             ac = Domain_Guests;
2173                             break;
2174                         case DOMAIN_GROUP_RID_COMPUTERS:
2175                             ac = Domain_Computers;
2176                             break;
2177                         case DOMAIN_GROUP_RID_CONTROLLERS:
2178                             ac = Domain_Controllers;
2179                             break;
2180                         case DOMAIN_GROUP_RID_CERT_ADMINS:
2181                             ac = Cert_Publishers;
2182                             break;
2183                         case DOMAIN_GROUP_RID_SCHEMA_ADMINS:
2184                             ac = Schema_Admins;
2185                             break;
2186                         case DOMAIN_GROUP_RID_ENTERPRISE_ADMINS:
2187                             ac = Enterprise_Admins;
2188                             break;
2189                         case DOMAIN_GROUP_RID_POLICY_ADMINS:
2190                             ac = Group_Policy_Creator_Owners;
2191                             break;
2192                         case DOMAIN_ALIAS_RID_RAS_SERVERS:
2193                             ac = RAS_and_IAS_Servers;
2194                             break;
2195                         case 1000:      /* first user account */
2196                             size = UNLEN + 1;
2197                             account_name = HeapAlloc(
2198                                 GetProcessHeap(), 0, size * sizeof(WCHAR));
2199                             if (GetUserNameW(account_name, &size))
2200                                 ac = account_name;
2201                             else
2202                                 dm = NULL;
2203
2204                             break;
2205                         default:
2206                             dm = NULL;
2207                             break;
2208                         }
2209                     }
2210                 }
2211             }
2212         }
2213     }
2214
2215     if (dm) {
2216         DWORD ac_len = lstrlenW(ac);
2217         DWORD dm_len = lstrlenW(dm);
2218         BOOL status = TRUE;
2219
2220         if (*accountSize > ac_len) {
2221             if (account)
2222                 lstrcpyW(account, ac);
2223         }
2224         if (*domainSize > dm_len) {
2225             if (domain)
2226                 lstrcpyW(domain, dm);
2227         }
2228         if (((*accountSize != 0) && (*accountSize < ac_len)) ||
2229             ((*domainSize != 0) && (*domainSize < dm_len))) {
2230             SetLastError(ERROR_INSUFFICIENT_BUFFER);
2231             status = FALSE;
2232         }
2233         if (*domainSize)
2234             *domainSize = dm_len;
2235         else
2236             *domainSize = dm_len + 1;
2237         if (*accountSize)
2238             *accountSize = ac_len;
2239         else
2240             *accountSize = ac_len + 1;
2241         *name_use = use;
2242         HeapFree(GetProcessHeap(), 0, account_name);
2243         HeapFree(GetProcessHeap(), 0, computer_name);
2244         return status;
2245     }
2246
2247     HeapFree(GetProcessHeap(), 0, account_name);
2248     HeapFree(GetProcessHeap(), 0, computer_name);
2249     SetLastError(ERROR_NONE_MAPPED);
2250     return FALSE;
2251 }
2252
2253 /******************************************************************************
2254  * SetFileSecurityA [ADVAPI32.@]
2255  *
2256  * See SetFileSecurityW.
2257  */
2258 BOOL WINAPI SetFileSecurityA( LPCSTR lpFileName,
2259                                 SECURITY_INFORMATION RequestedInformation,
2260                                 PSECURITY_DESCRIPTOR pSecurityDescriptor)
2261 {
2262     DWORD len;
2263     BOOL r;
2264     LPWSTR name = NULL;
2265
2266     if( lpFileName )
2267     {
2268         len = MultiByteToWideChar( CP_ACP, 0, lpFileName, -1, NULL, 0 );
2269         name = HeapAlloc( GetProcessHeap(), 0, len*sizeof(WCHAR) );
2270         MultiByteToWideChar( CP_ACP, 0, lpFileName, -1, name, len );
2271     }
2272
2273     r = SetFileSecurityW( name, RequestedInformation, pSecurityDescriptor );
2274     HeapFree( GetProcessHeap(), 0, name );
2275
2276     return r;
2277 }
2278
2279 /******************************************************************************
2280  * SetFileSecurityW [ADVAPI32.@]
2281  *
2282  * Sets the security of a file or directory.
2283  *
2284  * PARAMS
2285  *   lpFileName           []
2286  *   RequestedInformation []
2287  *   pSecurityDescriptor  []
2288  *
2289  * RETURNS
2290  *  Success: TRUE.
2291  *  Failure: FALSE.
2292  */
2293 BOOL WINAPI
2294 SetFileSecurityW( LPCWSTR lpFileName,
2295                     SECURITY_INFORMATION RequestedInformation,
2296                     PSECURITY_DESCRIPTOR pSecurityDescriptor )
2297 {
2298     HANDLE file;
2299     DWORD access = 0;
2300     NTSTATUS status;
2301
2302     TRACE("(%s, 0x%x, %p)\n", debugstr_w(lpFileName), RequestedInformation,
2303           pSecurityDescriptor );
2304
2305     if (RequestedInformation & OWNER_SECURITY_INFORMATION ||
2306         RequestedInformation & GROUP_SECURITY_INFORMATION)
2307         access |= WRITE_OWNER;
2308     if (RequestedInformation & SACL_SECURITY_INFORMATION)
2309         access |= ACCESS_SYSTEM_SECURITY;
2310     if (RequestedInformation & DACL_SECURITY_INFORMATION)
2311         access |= WRITE_DAC;
2312
2313     file = CreateFileW( lpFileName, access, FILE_SHARE_READ|FILE_SHARE_WRITE|FILE_SHARE_DELETE,
2314                         NULL, OPEN_EXISTING, FILE_FLAG_BACKUP_SEMANTICS, NULL );
2315     if (file == INVALID_HANDLE_VALUE)
2316         return FALSE;
2317
2318     status = NtSetSecurityObject( file, RequestedInformation, pSecurityDescriptor );
2319     CloseHandle( file );
2320     return set_ntstatus( status );
2321 }
2322
2323 /******************************************************************************
2324  * QueryWindows31FilesMigration [ADVAPI32.@]
2325  *
2326  * PARAMS
2327  *   x1 []
2328  */
2329 BOOL WINAPI
2330 QueryWindows31FilesMigration( DWORD x1 )
2331 {
2332         FIXME("(%d):stub\n",x1);
2333         return TRUE;
2334 }
2335
2336 /******************************************************************************
2337  * SynchronizeWindows31FilesAndWindowsNTRegistry [ADVAPI32.@]
2338  *
2339  * PARAMS
2340  *   x1 []
2341  *   x2 []
2342  *   x3 []
2343  *   x4 []
2344  */
2345 BOOL WINAPI
2346 SynchronizeWindows31FilesAndWindowsNTRegistry( DWORD x1, DWORD x2, DWORD x3,
2347                                                DWORD x4 )
2348 {
2349         FIXME("(0x%08x,0x%08x,0x%08x,0x%08x):stub\n",x1,x2,x3,x4);
2350         return TRUE;
2351 }
2352
2353 /******************************************************************************
2354  * NotifyBootConfigStatus [ADVAPI32.@]
2355  *
2356  * PARAMS
2357  *   x1 []
2358  */
2359 BOOL WINAPI
2360 NotifyBootConfigStatus( BOOL x1 )
2361 {
2362         FIXME("(0x%08d):stub\n",x1);
2363         return 1;
2364 }
2365
2366 /******************************************************************************
2367  * RevertToSelf [ADVAPI32.@]
2368  *
2369  * Ends the impersonation of a user.
2370  *
2371  * PARAMS
2372  *   void []
2373  *
2374  * RETURNS
2375  *  Success: TRUE.
2376  *  Failure: FALSE.
2377  */
2378 BOOL WINAPI
2379 RevertToSelf( void )
2380 {
2381     HANDLE Token = NULL;
2382     return set_ntstatus( NtSetInformationThread( GetCurrentThread(),
2383         ThreadImpersonationToken, &Token, sizeof(Token) ) );
2384 }
2385
2386 /******************************************************************************
2387  * ImpersonateSelf [ADVAPI32.@]
2388  *
2389  * Makes an impersonation token that represents the process user and assigns
2390  * to the current thread.
2391  *
2392  * PARAMS
2393  *  ImpersonationLevel [I] Level at which to impersonate.
2394  *
2395  * RETURNS
2396  *  Success: TRUE.
2397  *  Failure: FALSE.
2398  */
2399 BOOL WINAPI
2400 ImpersonateSelf(SECURITY_IMPERSONATION_LEVEL ImpersonationLevel)
2401 {
2402     return set_ntstatus( RtlImpersonateSelf( ImpersonationLevel ) );
2403 }
2404
2405 /******************************************************************************
2406  * ImpersonateLoggedOnUser [ADVAPI32.@]
2407  */
2408 BOOL WINAPI ImpersonateLoggedOnUser(HANDLE hToken)
2409 {
2410     DWORD size;
2411     NTSTATUS Status;
2412     HANDLE ImpersonationToken;
2413     TOKEN_TYPE Type;
2414     static BOOL warn = TRUE;
2415
2416     if (warn)
2417     {
2418         FIXME( "(%p)\n", hToken );
2419         warn = FALSE;
2420     }
2421     if (!GetTokenInformation( hToken, TokenType, &Type,
2422                               sizeof(TOKEN_TYPE), &size ))
2423         return FALSE;
2424
2425     if (Type == TokenPrimary)
2426     {
2427         OBJECT_ATTRIBUTES ObjectAttributes;
2428
2429         InitializeObjectAttributes( &ObjectAttributes, NULL, 0, NULL, NULL );
2430
2431         Status = NtDuplicateToken( hToken,
2432                                    TOKEN_IMPERSONATE | TOKEN_QUERY,
2433                                    &ObjectAttributes,
2434                                    SecurityImpersonation,
2435                                    TokenImpersonation,
2436                                    &ImpersonationToken );
2437         if (Status != STATUS_SUCCESS)
2438         {
2439             ERR( "NtDuplicateToken failed with error 0x%08x\n", Status );
2440             SetLastError( RtlNtStatusToDosError( Status ) );
2441             return FALSE;
2442         }
2443     }
2444     else
2445         ImpersonationToken = hToken;
2446
2447     Status = NtSetInformationThread( GetCurrentThread(),
2448                                      ThreadImpersonationToken,
2449                                      &ImpersonationToken,
2450                                      sizeof(ImpersonationToken) );
2451
2452     if (Type == TokenPrimary)
2453         NtClose( ImpersonationToken );
2454
2455     if (Status != STATUS_SUCCESS)
2456     {
2457         ERR( "NtSetInformationThread failed with error 0x%08x\n", Status );
2458         SetLastError( RtlNtStatusToDosError( Status ) );
2459         return FALSE;
2460     }
2461
2462     return TRUE;
2463 }
2464
2465 /******************************************************************************
2466  * AccessCheck [ADVAPI32.@]
2467  */
2468 BOOL WINAPI
2469 AccessCheck(
2470         PSECURITY_DESCRIPTOR SecurityDescriptor,
2471         HANDLE ClientToken,
2472         DWORD DesiredAccess,
2473         PGENERIC_MAPPING GenericMapping,
2474         PPRIVILEGE_SET PrivilegeSet,
2475         LPDWORD PrivilegeSetLength,
2476         LPDWORD GrantedAccess,
2477         LPBOOL AccessStatus)
2478 {
2479     NTSTATUS access_status;
2480     BOOL ret = set_ntstatus( NtAccessCheck(SecurityDescriptor, ClientToken, DesiredAccess,
2481                                            GenericMapping, PrivilegeSet, PrivilegeSetLength,
2482                                            GrantedAccess, &access_status) );
2483     if (ret) *AccessStatus = set_ntstatus( access_status );
2484     return ret;
2485 }
2486
2487
2488 /******************************************************************************
2489  * AccessCheckByType [ADVAPI32.@]
2490  */
2491 BOOL WINAPI AccessCheckByType(
2492     PSECURITY_DESCRIPTOR pSecurityDescriptor, 
2493     PSID PrincipalSelfSid,
2494     HANDLE ClientToken, 
2495     DWORD DesiredAccess, 
2496     POBJECT_TYPE_LIST ObjectTypeList,
2497     DWORD ObjectTypeListLength,
2498     PGENERIC_MAPPING GenericMapping,
2499     PPRIVILEGE_SET PrivilegeSet,
2500     LPDWORD PrivilegeSetLength, 
2501     LPDWORD GrantedAccess,
2502     LPBOOL AccessStatus)
2503 {
2504         FIXME("stub\n");
2505
2506         *AccessStatus = TRUE;
2507
2508         return !*AccessStatus;
2509 }
2510
2511 /******************************************************************************
2512  * MapGenericMask [ADVAPI32.@]
2513  *
2514  * Maps generic access rights into specific access rights according to the
2515  * supplied mapping.
2516  *
2517  * PARAMS
2518  *  AccessMask     [I/O] Access rights.
2519  *  GenericMapping [I] The mapping between generic and specific rights.
2520  *
2521  * RETURNS
2522  *  Nothing.
2523  */
2524 VOID WINAPI MapGenericMask( PDWORD AccessMask, PGENERIC_MAPPING GenericMapping )
2525 {
2526     RtlMapGenericMask( AccessMask, GenericMapping );
2527 }
2528
2529 /*************************************************************************
2530  * SetKernelObjectSecurity [ADVAPI32.@]
2531  */
2532 BOOL WINAPI SetKernelObjectSecurity (
2533         IN HANDLE Handle,
2534         IN SECURITY_INFORMATION SecurityInformation,
2535         IN PSECURITY_DESCRIPTOR SecurityDescriptor )
2536 {
2537     return set_ntstatus (NtSetSecurityObject (Handle, SecurityInformation, SecurityDescriptor));
2538 }
2539
2540
2541 /******************************************************************************
2542  *  AddAuditAccessAce [ADVAPI32.@]
2543  */
2544 BOOL WINAPI AddAuditAccessAce(
2545     IN OUT PACL pAcl, 
2546     IN DWORD dwAceRevision, 
2547     IN DWORD dwAccessMask, 
2548     IN PSID pSid, 
2549     IN BOOL bAuditSuccess, 
2550     IN BOOL bAuditFailure) 
2551 {
2552     return set_ntstatus( RtlAddAuditAccessAce(pAcl, dwAceRevision, dwAccessMask, pSid, 
2553                                               bAuditSuccess, bAuditFailure) ); 
2554 }
2555
2556 /******************************************************************************
2557  *  AddAuditAccessAce [ADVAPI32.@]
2558  */
2559 BOOL WINAPI AddAuditAccessAceEx(
2560     IN OUT PACL pAcl,
2561     IN DWORD dwAceRevision,
2562     IN DWORD dwAceFlags,
2563     IN DWORD dwAccessMask,
2564     IN PSID pSid,
2565     IN BOOL bAuditSuccess,
2566     IN BOOL bAuditFailure)
2567 {
2568     return set_ntstatus( RtlAddAuditAccessAceEx(pAcl, dwAceRevision, dwAceFlags, dwAccessMask, pSid,
2569                                               bAuditSuccess, bAuditFailure) );
2570 }
2571
2572 /******************************************************************************
2573  * LookupAccountNameA [ADVAPI32.@]
2574  */
2575 BOOL WINAPI
2576 LookupAccountNameA(
2577         IN LPCSTR system,
2578         IN LPCSTR account,
2579         OUT PSID sid,
2580         OUT LPDWORD cbSid,
2581         LPSTR ReferencedDomainName,
2582         IN OUT LPDWORD cbReferencedDomainName,
2583         OUT PSID_NAME_USE name_use )
2584 {
2585     BOOL ret;
2586     UNICODE_STRING lpSystemW;
2587     UNICODE_STRING lpAccountW;
2588     LPWSTR lpReferencedDomainNameW = NULL;
2589
2590     RtlCreateUnicodeStringFromAsciiz(&lpSystemW, system);
2591     RtlCreateUnicodeStringFromAsciiz(&lpAccountW, account);
2592
2593     if (ReferencedDomainName)
2594         lpReferencedDomainNameW = HeapAlloc(GetProcessHeap(), 0, *cbReferencedDomainName * sizeof(WCHAR));
2595
2596     ret = LookupAccountNameW(lpSystemW.Buffer, lpAccountW.Buffer, sid, cbSid, lpReferencedDomainNameW,
2597         cbReferencedDomainName, name_use);
2598
2599     if (ret && lpReferencedDomainNameW)
2600     {
2601         WideCharToMultiByte(CP_ACP, 0, lpReferencedDomainNameW, -1,
2602             ReferencedDomainName, *cbReferencedDomainName+1, NULL, NULL);
2603     }
2604
2605     RtlFreeUnicodeString(&lpSystemW);
2606     RtlFreeUnicodeString(&lpAccountW);
2607     HeapFree(GetProcessHeap(), 0, lpReferencedDomainNameW);
2608
2609     return ret;
2610 }
2611
2612 /******************************************************************************
2613  * lookup_user_account_name
2614  */
2615 static BOOL lookup_user_account_name(PSID Sid, PDWORD cbSid, LPWSTR ReferencedDomainName,
2616                                      LPDWORD cchReferencedDomainName, PSID_NAME_USE peUse )
2617 {
2618     char buffer[sizeof(TOKEN_USER) + sizeof(SID) + sizeof(DWORD)*SID_MAX_SUB_AUTHORITIES];
2619     DWORD len = sizeof(buffer);
2620     HANDLE token;
2621     BOOL ret;
2622     PSID pSid;
2623     static const WCHAR dm[] = {'D','O','M','A','I','N',0};
2624     DWORD nameLen;
2625     LPCWSTR domainName;
2626
2627     if (!OpenThreadToken(GetCurrentThread(), TOKEN_READ, TRUE, &token))
2628     {
2629         if (GetLastError() != ERROR_NO_TOKEN) return FALSE;
2630         if (!OpenProcessToken(GetCurrentProcess(), TOKEN_READ, &token)) return FALSE;
2631     }
2632
2633     ret = GetTokenInformation(token, TokenUser, buffer, len, &len);
2634     CloseHandle( token );
2635
2636     if (!ret) return FALSE;
2637
2638     pSid = ((TOKEN_USER *)buffer)->User.Sid;
2639
2640     if (Sid != NULL && (*cbSid >= GetLengthSid(pSid)))
2641        CopySid(*cbSid, Sid, pSid);
2642     if (*cbSid < GetLengthSid(pSid))
2643     {
2644        SetLastError(ERROR_INSUFFICIENT_BUFFER);
2645        ret = FALSE;
2646     }
2647     *cbSid = GetLengthSid(pSid);
2648
2649     domainName = dm;
2650     nameLen = strlenW(domainName);
2651
2652     if (*cchReferencedDomainName <= nameLen || !ret)
2653     {
2654         SetLastError(ERROR_INSUFFICIENT_BUFFER);
2655         nameLen += 1;
2656         ret = FALSE;
2657     }
2658     else if (ReferencedDomainName)
2659         strcpyW(ReferencedDomainName, domainName);
2660
2661     *cchReferencedDomainName = nameLen;
2662
2663     if (ret)
2664         *peUse = SidTypeUser;
2665
2666     return ret;
2667 }
2668
2669 /******************************************************************************
2670  * lookup_computer_account_name
2671  */
2672 static BOOL lookup_computer_account_name(PSID Sid, PDWORD cbSid, LPWSTR ReferencedDomainName,
2673                                          LPDWORD cchReferencedDomainName, PSID_NAME_USE peUse )
2674 {
2675     MAX_SID local;
2676     BOOL ret;
2677     static const WCHAR dm[] = {'D','O','M','A','I','N',0};
2678     DWORD nameLen;
2679     LPCWSTR domainName;
2680
2681     if ((ret = ADVAPI_GetComputerSid(&local)))
2682     {
2683         if (Sid != NULL && (*cbSid >= GetLengthSid(&local)))
2684            CopySid(*cbSid, Sid, &local);
2685         if (*cbSid < GetLengthSid(&local))
2686         {
2687            SetLastError(ERROR_INSUFFICIENT_BUFFER);
2688            ret = FALSE;
2689         }
2690         *cbSid = GetLengthSid(&local);
2691     }
2692
2693     domainName = dm;
2694     nameLen = strlenW(domainName);
2695
2696     if (*cchReferencedDomainName <= nameLen || !ret)
2697     {
2698         SetLastError(ERROR_INSUFFICIENT_BUFFER);
2699         nameLen += 1;
2700         ret = FALSE;
2701     }
2702     else if (ReferencedDomainName)
2703         strcpyW(ReferencedDomainName, domainName);
2704
2705     *cchReferencedDomainName = nameLen;
2706
2707     if (ret)
2708         *peUse = SidTypeDomain;
2709
2710     return ret;
2711 }
2712
2713 static void split_domain_account( const LSA_UNICODE_STRING *str, LSA_UNICODE_STRING *account,
2714                                   LSA_UNICODE_STRING *domain )
2715 {
2716     WCHAR *p = str->Buffer + str->Length / sizeof(WCHAR) - 1;
2717
2718     while (p > str->Buffer && *p != '\\') p--;
2719
2720     if (*p == '\\')
2721     {
2722         domain->Buffer = str->Buffer;
2723         domain->Length = (p - str->Buffer) * sizeof(WCHAR);
2724
2725         account->Buffer = p + 1;
2726         account->Length = str->Length - ((p - str->Buffer + 1) * sizeof(WCHAR));
2727     }
2728     else
2729     {
2730         domain->Buffer = NULL;
2731         domain->Length = 0;
2732
2733         account->Buffer = str->Buffer;
2734         account->Length = str->Length;
2735     }
2736 }
2737
2738 static BOOL match_domain( ULONG idx, LSA_UNICODE_STRING *domain )
2739 {
2740     ULONG len = strlenW( ACCOUNT_SIDS[idx].domain );
2741
2742     if (len == domain->Length / sizeof(WCHAR) && !strncmpiW( domain->Buffer, ACCOUNT_SIDS[idx].domain, len ))
2743         return TRUE;
2744
2745     return FALSE;
2746 }
2747
2748 static BOOL match_account( ULONG idx, LSA_UNICODE_STRING *account )
2749 {
2750     ULONG len = strlenW( ACCOUNT_SIDS[idx].account );
2751
2752     if (len == account->Length / sizeof(WCHAR) && !strncmpiW( account->Buffer, ACCOUNT_SIDS[idx].account, len ))
2753         return TRUE;
2754
2755     if (ACCOUNT_SIDS[idx].alias)
2756     {
2757         len = strlenW( ACCOUNT_SIDS[idx].alias );
2758         if (len == account->Length / sizeof(WCHAR) && !strncmpiW( account->Buffer, ACCOUNT_SIDS[idx].alias, len ))
2759             return TRUE;
2760     }
2761     return FALSE;
2762 }
2763
2764 /*
2765  * Helper function for LookupAccountNameW
2766  */
2767 BOOL lookup_local_wellknown_name( LSA_UNICODE_STRING *account_and_domain,
2768                                   PSID Sid, LPDWORD cbSid,
2769                                   LPWSTR ReferencedDomainName,
2770                                   LPDWORD cchReferencedDomainName,
2771                                   PSID_NAME_USE peUse, BOOL *handled )
2772 {
2773     PSID pSid;
2774     LSA_UNICODE_STRING account, domain;
2775     BOOL ret = TRUE;
2776     ULONG i;
2777
2778     *handled = FALSE;
2779     split_domain_account( account_and_domain, &account, &domain );
2780
2781     for (i = 0; i < sizeof(ACCOUNT_SIDS) / sizeof(ACCOUNT_SIDS[0]); i++)
2782     {
2783         /* check domain first */
2784         if (domain.Buffer && !match_domain( i, &domain )) continue;
2785
2786         if (match_account( i, &account ))
2787         {
2788             DWORD len, sidLen = SECURITY_MAX_SID_SIZE;
2789
2790             if (!(pSid = HeapAlloc( GetProcessHeap(), 0, sidLen ))) return FALSE;
2791
2792             if ((ret = CreateWellKnownSid( ACCOUNT_SIDS[i].type, NULL, pSid, &sidLen )))
2793             {
2794                 if (*cbSid < sidLen)
2795                 {
2796                     SetLastError(ERROR_INSUFFICIENT_BUFFER);
2797                     ret = FALSE;
2798                 }
2799                 else if (Sid)
2800                 {
2801                     CopySid(*cbSid, Sid, pSid);
2802                 }
2803                 *cbSid = sidLen;
2804             }
2805
2806             len = strlenW( ACCOUNT_SIDS[i].domain );
2807             if (*cchReferencedDomainName <= len || !ret)
2808             {
2809                 SetLastError(ERROR_INSUFFICIENT_BUFFER);
2810                 len++;
2811                 ret = FALSE;
2812             }
2813             else if (ReferencedDomainName)
2814             {
2815                 strcpyW( ReferencedDomainName, ACCOUNT_SIDS[i].domain );
2816             }
2817
2818             *cchReferencedDomainName = len;
2819             if (ret)
2820                 *peUse = ACCOUNT_SIDS[i].name_use;
2821
2822             HeapFree(GetProcessHeap(), 0, pSid);
2823             *handled = TRUE;
2824             return ret;
2825         }
2826     }
2827     return ret;
2828 }
2829
2830 BOOL lookup_local_user_name( LSA_UNICODE_STRING *account_and_domain,
2831                              PSID Sid, LPDWORD cbSid,
2832                              LPWSTR ReferencedDomainName,
2833                              LPDWORD cchReferencedDomainName,
2834                              PSID_NAME_USE peUse, BOOL *handled )
2835 {
2836     DWORD nameLen;
2837     LPWSTR userName = NULL;
2838     LSA_UNICODE_STRING account, domain;
2839     BOOL ret = TRUE;
2840
2841     *handled = FALSE;
2842     split_domain_account( account_and_domain, &account, &domain );
2843
2844     /* Let the current Unix user id masquerade as first Windows user account */
2845
2846     nameLen = UNLEN + 1;
2847     if (!(userName = HeapAlloc( GetProcessHeap(), 0, nameLen * sizeof(WCHAR) ))) return FALSE;
2848
2849     if (domain.Buffer)
2850     {
2851         /* check to make sure this account is on this computer */
2852         if (GetComputerNameW( userName, &nameLen ) &&
2853             (domain.Length / sizeof(WCHAR) != nameLen || strncmpW( domain.Buffer, userName, nameLen )))
2854         {
2855             SetLastError(ERROR_NONE_MAPPED);
2856             ret = FALSE;
2857         }
2858         nameLen = UNLEN + 1;
2859     }
2860
2861     if (GetUserNameW( userName, &nameLen ) &&
2862         account.Length / sizeof(WCHAR) == nameLen - 1 && !strncmpW( account.Buffer, userName, nameLen - 1 ))
2863     {
2864             ret = lookup_user_account_name( Sid, cbSid, ReferencedDomainName, cchReferencedDomainName, peUse );
2865             *handled = TRUE;
2866     }
2867     else
2868     {
2869         nameLen = UNLEN + 1;
2870         if (GetComputerNameW( userName, &nameLen ) &&
2871             account.Length / sizeof(WCHAR) == nameLen && !strncmpW( account.Buffer, userName , nameLen ))
2872         {
2873             ret = lookup_computer_account_name( Sid, cbSid, ReferencedDomainName, cchReferencedDomainName, peUse );
2874             *handled = TRUE;
2875         }
2876     }
2877
2878     HeapFree(GetProcessHeap(), 0, userName);
2879     return ret;
2880 }
2881
2882 /******************************************************************************
2883  * LookupAccountNameW [ADVAPI32.@]
2884  */
2885 BOOL WINAPI LookupAccountNameW( LPCWSTR lpSystemName, LPCWSTR lpAccountName, PSID Sid,
2886                                 LPDWORD cbSid, LPWSTR ReferencedDomainName,
2887                                 LPDWORD cchReferencedDomainName, PSID_NAME_USE peUse )
2888 {
2889     BOOL ret, handled;
2890     LSA_UNICODE_STRING account;
2891
2892     FIXME("%s %s %p %p %p %p %p - stub\n", debugstr_w(lpSystemName), debugstr_w(lpAccountName),
2893           Sid, cbSid, ReferencedDomainName, cchReferencedDomainName, peUse);
2894
2895     if (!ADVAPI_IsLocalComputer( lpSystemName ))
2896     {
2897         SetLastError( RPC_S_SERVER_UNAVAILABLE );
2898         return FALSE;
2899     }
2900
2901     if (!lpAccountName || !strcmpW( lpAccountName, Blank ))
2902     {
2903         lpAccountName = BUILTIN;
2904     }
2905
2906     RtlInitUnicodeString( &account, lpAccountName );
2907
2908     /* Check well known SIDs first */
2909     ret = lookup_local_wellknown_name( &account, Sid, cbSid, ReferencedDomainName,
2910                                        cchReferencedDomainName, peUse, &handled );
2911     if (handled)
2912         return ret;
2913
2914     /* Check user names */
2915     ret = lookup_local_user_name( &account, Sid, cbSid, ReferencedDomainName,
2916                                   cchReferencedDomainName, peUse, &handled);
2917     if (handled)
2918         return ret;
2919
2920     SetLastError( ERROR_NONE_MAPPED );
2921     return FALSE;
2922 }
2923
2924 /******************************************************************************
2925  * PrivilegeCheck [ADVAPI32.@]
2926  */
2927 BOOL WINAPI PrivilegeCheck( HANDLE ClientToken, PPRIVILEGE_SET RequiredPrivileges, LPBOOL pfResult)
2928 {
2929     BOOL ret;
2930     BOOLEAN Result;
2931
2932     TRACE("%p %p %p\n", ClientToken, RequiredPrivileges, pfResult);
2933
2934     ret = set_ntstatus (NtPrivilegeCheck (ClientToken, RequiredPrivileges, &Result));
2935     if (ret)
2936         *pfResult = Result;
2937     return ret;
2938 }
2939
2940 /******************************************************************************
2941  * AccessCheckAndAuditAlarmA [ADVAPI32.@]
2942  */
2943 BOOL WINAPI AccessCheckAndAuditAlarmA(LPCSTR Subsystem, LPVOID HandleId, LPSTR ObjectTypeName,
2944   LPSTR ObjectName, PSECURITY_DESCRIPTOR SecurityDescriptor, DWORD DesiredAccess,
2945   PGENERIC_MAPPING GenericMapping, BOOL ObjectCreation, LPDWORD GrantedAccess,
2946   LPBOOL AccessStatus, LPBOOL pfGenerateOnClose)
2947 {
2948         FIXME("stub (%s,%p,%s,%s,%p,%08x,%p,%x,%p,%p,%p)\n", debugstr_a(Subsystem),
2949                 HandleId, debugstr_a(ObjectTypeName), debugstr_a(ObjectName),
2950                 SecurityDescriptor, DesiredAccess, GenericMapping,
2951                 ObjectCreation, GrantedAccess, AccessStatus, pfGenerateOnClose);
2952         return TRUE;
2953 }
2954
2955 /******************************************************************************
2956  * AccessCheckAndAuditAlarmW [ADVAPI32.@]
2957  */
2958 BOOL WINAPI AccessCheckAndAuditAlarmW(LPCWSTR Subsystem, LPVOID HandleId, LPWSTR ObjectTypeName,
2959   LPWSTR ObjectName, PSECURITY_DESCRIPTOR SecurityDescriptor, DWORD DesiredAccess,
2960   PGENERIC_MAPPING GenericMapping, BOOL ObjectCreation, LPDWORD GrantedAccess,
2961   LPBOOL AccessStatus, LPBOOL pfGenerateOnClose)
2962 {
2963         FIXME("stub (%s,%p,%s,%s,%p,%08x,%p,%x,%p,%p,%p)\n", debugstr_w(Subsystem),
2964                 HandleId, debugstr_w(ObjectTypeName), debugstr_w(ObjectName),
2965                 SecurityDescriptor, DesiredAccess, GenericMapping,
2966                 ObjectCreation, GrantedAccess, AccessStatus, pfGenerateOnClose);
2967         return TRUE;
2968 }
2969
2970 BOOL WINAPI ObjectCloseAuditAlarmA(LPCSTR SubsystemName, LPVOID HandleId, BOOL GenerateOnClose)
2971 {
2972     FIXME("stub (%s,%p,%x)\n", debugstr_a(SubsystemName), HandleId, GenerateOnClose);
2973
2974     return TRUE;
2975 }
2976
2977 BOOL WINAPI ObjectCloseAuditAlarmW(LPCWSTR SubsystemName, LPVOID HandleId, BOOL GenerateOnClose)
2978 {
2979     FIXME("stub (%s,%p,%x)\n", debugstr_w(SubsystemName), HandleId, GenerateOnClose);
2980
2981     return TRUE;
2982 }
2983
2984 BOOL WINAPI ObjectDeleteAuditAlarmW(LPCWSTR SubsystemName, LPVOID HandleId, BOOL GenerateOnClose)
2985 {
2986     FIXME("stub (%s,%p,%x)\n", debugstr_w(SubsystemName), HandleId, GenerateOnClose);
2987
2988     return TRUE;
2989 }
2990
2991 BOOL WINAPI ObjectOpenAuditAlarmA(LPCSTR SubsystemName, LPVOID HandleId, LPSTR ObjectTypeName,
2992   LPSTR ObjectName, PSECURITY_DESCRIPTOR pSecurityDescriptor, HANDLE ClientToken, DWORD DesiredAccess,
2993   DWORD GrantedAccess, PPRIVILEGE_SET Privileges, BOOL ObjectCreation, BOOL AccessGranted,
2994   LPBOOL GenerateOnClose)
2995 {
2996         FIXME("stub (%s,%p,%s,%s,%p,%p,0x%08x,0x%08x,%p,%x,%x,%p)\n", debugstr_a(SubsystemName),
2997                 HandleId, debugstr_a(ObjectTypeName), debugstr_a(ObjectName), pSecurityDescriptor,
2998         ClientToken, DesiredAccess, GrantedAccess, Privileges, ObjectCreation, AccessGranted,
2999         GenerateOnClose);
3000
3001     return TRUE;
3002 }
3003
3004 BOOL WINAPI ObjectOpenAuditAlarmW(LPCWSTR SubsystemName, LPVOID HandleId, LPWSTR ObjectTypeName,
3005   LPWSTR ObjectName, PSECURITY_DESCRIPTOR pSecurityDescriptor, HANDLE ClientToken, DWORD DesiredAccess,
3006   DWORD GrantedAccess, PPRIVILEGE_SET Privileges, BOOL ObjectCreation, BOOL AccessGranted,
3007   LPBOOL GenerateOnClose)
3008 {
3009     FIXME("stub (%s,%p,%s,%s,%p,%p,0x%08x,0x%08x,%p,%x,%x,%p)\n", debugstr_w(SubsystemName),
3010         HandleId, debugstr_w(ObjectTypeName), debugstr_w(ObjectName), pSecurityDescriptor,
3011         ClientToken, DesiredAccess, GrantedAccess, Privileges, ObjectCreation, AccessGranted,
3012         GenerateOnClose);
3013
3014     return TRUE;
3015 }
3016
3017 BOOL WINAPI ObjectPrivilegeAuditAlarmA( LPCSTR SubsystemName, LPVOID HandleId, HANDLE ClientToken,
3018   DWORD DesiredAccess, PPRIVILEGE_SET Privileges, BOOL AccessGranted)
3019 {
3020     FIXME("stub (%s,%p,%p,0x%08x,%p,%x)\n", debugstr_a(SubsystemName), HandleId, ClientToken,
3021           DesiredAccess, Privileges, AccessGranted);
3022
3023     return TRUE;
3024 }
3025
3026 BOOL WINAPI ObjectPrivilegeAuditAlarmW( LPCWSTR SubsystemName, LPVOID HandleId, HANDLE ClientToken,
3027   DWORD DesiredAccess, PPRIVILEGE_SET Privileges, BOOL AccessGranted)
3028 {
3029     FIXME("stub (%s,%p,%p,0x%08x,%p,%x)\n", debugstr_w(SubsystemName), HandleId, ClientToken,
3030           DesiredAccess, Privileges, AccessGranted);
3031
3032     return TRUE;
3033 }
3034
3035 BOOL WINAPI PrivilegedServiceAuditAlarmA( LPCSTR SubsystemName, LPCSTR ServiceName, HANDLE ClientToken,
3036                                    PPRIVILEGE_SET Privileges, BOOL AccessGranted)
3037 {
3038     FIXME("stub (%s,%s,%p,%p,%x)\n", debugstr_a(SubsystemName), debugstr_a(ServiceName),
3039           ClientToken, Privileges, AccessGranted);
3040
3041     return TRUE;
3042 }
3043
3044 BOOL WINAPI PrivilegedServiceAuditAlarmW( LPCWSTR SubsystemName, LPCWSTR ServiceName, HANDLE ClientToken,
3045                                    PPRIVILEGE_SET Privileges, BOOL AccessGranted)
3046 {
3047     FIXME("stub %s,%s,%p,%p,%x)\n", debugstr_w(SubsystemName), debugstr_w(ServiceName),
3048           ClientToken, Privileges, AccessGranted);
3049
3050     return TRUE;
3051 }
3052
3053 /******************************************************************************
3054  * GetSecurityInfo [ADVAPI32.@]
3055  *
3056  * Retrieves a copy of the security descriptor associated with an object.
3057  *
3058  * PARAMS
3059  *  hObject              [I] A handle for the object.
3060  *  ObjectType           [I] The type of object.
3061  *  SecurityInfo         [I] A bitmask indicating what info to retrieve.
3062  *  ppsidOwner           [O] If non-null, receives a pointer to the owner SID.
3063  *  ppsidGroup           [O] If non-null, receives a pointer to the group SID.
3064  *  ppDacl               [O] If non-null, receives a pointer to the DACL.
3065  *  ppSacl               [O] If non-null, receives a pointer to the SACL.
3066  *  ppSecurityDescriptor [O] Receives a pointer to the security descriptor,
3067  *                           which must be freed with LocalFree.
3068  *
3069  * RETURNS
3070  *  ERROR_SUCCESS if all's well, and a WIN32 error code otherwise.
3071  */
3072 DWORD WINAPI GetSecurityInfo(
3073     HANDLE hObject, SE_OBJECT_TYPE ObjectType,
3074     SECURITY_INFORMATION SecurityInfo, PSID *ppsidOwner,
3075     PSID *ppsidGroup, PACL *ppDacl, PACL *ppSacl,
3076     PSECURITY_DESCRIPTOR *ppSecurityDescriptor
3077 )
3078 {
3079     PSECURITY_DESCRIPTOR sd;
3080     NTSTATUS status;
3081     ULONG n1, n2;
3082     BOOL present, defaulted;
3083
3084     status = NtQuerySecurityObject(hObject, SecurityInfo, NULL, 0, &n1);
3085     if (status != STATUS_BUFFER_TOO_SMALL && status != STATUS_SUCCESS)
3086         return RtlNtStatusToDosError(status);
3087
3088     sd = LocalAlloc(0, n1);
3089     if (!sd)
3090         return ERROR_NOT_ENOUGH_MEMORY;
3091
3092     status = NtQuerySecurityObject(hObject, SecurityInfo, sd, n1, &n2);
3093     if (status != STATUS_SUCCESS)
3094     {
3095         LocalFree(sd);
3096         return RtlNtStatusToDosError(status);
3097     }
3098
3099     if (ppsidOwner)
3100     {
3101         *ppsidOwner = NULL;
3102         GetSecurityDescriptorOwner(sd, ppsidOwner, &defaulted);
3103     }
3104     if (ppsidGroup)
3105     {
3106         *ppsidGroup = NULL;
3107         GetSecurityDescriptorGroup(sd, ppsidGroup, &defaulted);
3108     }
3109     if (ppDacl)
3110     {
3111         *ppDacl = NULL;
3112         GetSecurityDescriptorDacl(sd, &present, ppDacl, &defaulted);
3113     }
3114     if (ppSacl)
3115     {
3116         *ppSacl = NULL;
3117         GetSecurityDescriptorSacl(sd, &present, ppSacl, &defaulted);
3118     }
3119     if (ppSecurityDescriptor)
3120         *ppSecurityDescriptor = sd;
3121
3122     return ERROR_SUCCESS;
3123 }
3124
3125 /******************************************************************************
3126  * GetSecurityInfoExA [ADVAPI32.@]
3127  */
3128 DWORD WINAPI GetSecurityInfoExA(
3129         HANDLE hObject, SE_OBJECT_TYPE ObjectType,
3130         SECURITY_INFORMATION SecurityInfo, LPCSTR lpProvider,
3131         LPCSTR lpProperty, PACTRL_ACCESSA *ppAccessList,
3132         PACTRL_AUDITA *ppAuditList, LPSTR *lppOwner, LPSTR *lppGroup
3133 )
3134 {
3135   FIXME("stub!\n");
3136   return ERROR_BAD_PROVIDER;
3137 }
3138
3139 /******************************************************************************
3140  * GetSecurityInfoExW [ADVAPI32.@]
3141  */
3142 DWORD WINAPI GetSecurityInfoExW(
3143         HANDLE hObject, SE_OBJECT_TYPE ObjectType, 
3144         SECURITY_INFORMATION SecurityInfo, LPCWSTR lpProvider,
3145         LPCWSTR lpProperty, PACTRL_ACCESSW *ppAccessList, 
3146         PACTRL_AUDITW *ppAuditList, LPWSTR *lppOwner, LPWSTR *lppGroup
3147 )
3148 {
3149   FIXME("stub!\n");
3150   return ERROR_BAD_PROVIDER; 
3151 }
3152
3153 /******************************************************************************
3154  * BuildExplicitAccessWithNameA [ADVAPI32.@]
3155  */
3156 VOID WINAPI BuildExplicitAccessWithNameA( PEXPLICIT_ACCESSA pExplicitAccess,
3157                                           LPSTR pTrusteeName, DWORD AccessPermissions,
3158                                           ACCESS_MODE AccessMode, DWORD Inheritance )
3159 {
3160     TRACE("%p %s 0x%08x 0x%08x 0x%08x\n", pExplicitAccess, debugstr_a(pTrusteeName),
3161           AccessPermissions, AccessMode, Inheritance);
3162
3163     pExplicitAccess->grfAccessPermissions = AccessPermissions;
3164     pExplicitAccess->grfAccessMode = AccessMode;
3165     pExplicitAccess->grfInheritance = Inheritance;
3166
3167     pExplicitAccess->Trustee.pMultipleTrustee = NULL;
3168     pExplicitAccess->Trustee.MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE;
3169     pExplicitAccess->Trustee.TrusteeForm = TRUSTEE_IS_NAME;
3170     pExplicitAccess->Trustee.TrusteeType = TRUSTEE_IS_UNKNOWN;
3171     pExplicitAccess->Trustee.ptstrName = pTrusteeName;
3172 }
3173
3174 /******************************************************************************
3175  * BuildExplicitAccessWithNameW [ADVAPI32.@]
3176  */
3177 VOID WINAPI BuildExplicitAccessWithNameW( PEXPLICIT_ACCESSW pExplicitAccess,
3178                                           LPWSTR pTrusteeName, DWORD AccessPermissions,
3179                                           ACCESS_MODE AccessMode, DWORD Inheritance )
3180 {
3181     TRACE("%p %s 0x%08x 0x%08x 0x%08x\n", pExplicitAccess, debugstr_w(pTrusteeName),
3182           AccessPermissions, AccessMode, Inheritance);
3183
3184     pExplicitAccess->grfAccessPermissions = AccessPermissions;
3185     pExplicitAccess->grfAccessMode = AccessMode;
3186     pExplicitAccess->grfInheritance = Inheritance;
3187
3188     pExplicitAccess->Trustee.pMultipleTrustee = NULL;
3189     pExplicitAccess->Trustee.MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE;
3190     pExplicitAccess->Trustee.TrusteeForm = TRUSTEE_IS_NAME;
3191     pExplicitAccess->Trustee.TrusteeType = TRUSTEE_IS_UNKNOWN;
3192     pExplicitAccess->Trustee.ptstrName = pTrusteeName;
3193 }
3194
3195 /******************************************************************************
3196  * BuildTrusteeWithObjectsAndNameA [ADVAPI32.@]
3197  */
3198 VOID WINAPI BuildTrusteeWithObjectsAndNameA( PTRUSTEEA pTrustee, POBJECTS_AND_NAME_A pObjName,
3199                                              SE_OBJECT_TYPE ObjectType, LPSTR ObjectTypeName,
3200                                              LPSTR InheritedObjectTypeName, LPSTR Name )
3201 {
3202     DWORD ObjectsPresent = 0;
3203
3204     TRACE("%p %p 0x%08x %p %p %s\n", pTrustee, pObjName,
3205           ObjectType, ObjectTypeName, InheritedObjectTypeName, debugstr_a(Name));
3206
3207     /* Fill the OBJECTS_AND_NAME structure */
3208     pObjName->ObjectType = ObjectType;
3209     if (ObjectTypeName != NULL)
3210     {
3211         ObjectsPresent |= ACE_OBJECT_TYPE_PRESENT;
3212     }
3213
3214     pObjName->InheritedObjectTypeName = InheritedObjectTypeName;
3215     if (InheritedObjectTypeName != NULL)
3216     {
3217         ObjectsPresent |= ACE_INHERITED_OBJECT_TYPE_PRESENT;
3218     }
3219
3220     pObjName->ObjectsPresent = ObjectsPresent;
3221     pObjName->ptstrName = Name;
3222
3223     /* Fill the TRUSTEE structure */
3224     pTrustee->pMultipleTrustee = NULL;
3225     pTrustee->MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE;
3226     pTrustee->TrusteeForm = TRUSTEE_IS_OBJECTS_AND_NAME;
3227     pTrustee->TrusteeType = TRUSTEE_IS_UNKNOWN;
3228     pTrustee->ptstrName = (LPSTR)pObjName;
3229 }
3230
3231 /******************************************************************************
3232  * BuildTrusteeWithObjectsAndNameW [ADVAPI32.@]
3233  */
3234 VOID WINAPI BuildTrusteeWithObjectsAndNameW( PTRUSTEEW pTrustee, POBJECTS_AND_NAME_W pObjName,
3235                                              SE_OBJECT_TYPE ObjectType, LPWSTR ObjectTypeName,
3236                                              LPWSTR InheritedObjectTypeName, LPWSTR Name )
3237 {
3238     DWORD ObjectsPresent = 0;
3239
3240     TRACE("%p %p 0x%08x %p %p %s\n", pTrustee, pObjName,
3241           ObjectType, ObjectTypeName, InheritedObjectTypeName, debugstr_w(Name));
3242
3243     /* Fill the OBJECTS_AND_NAME structure */
3244     pObjName->ObjectType = ObjectType;
3245     if (ObjectTypeName != NULL)
3246     {
3247         ObjectsPresent |= ACE_OBJECT_TYPE_PRESENT;
3248     }
3249
3250     pObjName->InheritedObjectTypeName = InheritedObjectTypeName;
3251     if (InheritedObjectTypeName != NULL)
3252     {
3253         ObjectsPresent |= ACE_INHERITED_OBJECT_TYPE_PRESENT;
3254     }
3255
3256     pObjName->ObjectsPresent = ObjectsPresent;
3257     pObjName->ptstrName = Name;
3258
3259     /* Fill the TRUSTEE structure */
3260     pTrustee->pMultipleTrustee = NULL;
3261     pTrustee->MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE;
3262     pTrustee->TrusteeForm = TRUSTEE_IS_OBJECTS_AND_NAME;
3263     pTrustee->TrusteeType = TRUSTEE_IS_UNKNOWN;
3264     pTrustee->ptstrName = (LPWSTR)pObjName;
3265 }
3266
3267 /******************************************************************************
3268  * BuildTrusteeWithObjectsAndSidA [ADVAPI32.@]
3269  */
3270 VOID WINAPI BuildTrusteeWithObjectsAndSidA( PTRUSTEEA pTrustee, POBJECTS_AND_SID pObjSid,
3271                                             GUID* pObjectGuid, GUID* pInheritedObjectGuid, PSID pSid )
3272 {
3273     DWORD ObjectsPresent = 0;
3274
3275     TRACE("%p %p %p %p %p\n", pTrustee, pObjSid, pObjectGuid, pInheritedObjectGuid, pSid);
3276
3277     /* Fill the OBJECTS_AND_SID structure */
3278     if (pObjectGuid != NULL)
3279     {
3280         pObjSid->ObjectTypeGuid = *pObjectGuid;
3281         ObjectsPresent |= ACE_OBJECT_TYPE_PRESENT;
3282     }
3283     else
3284     {
3285         ZeroMemory(&pObjSid->ObjectTypeGuid,
3286                    sizeof(GUID));
3287     }
3288
3289     if (pInheritedObjectGuid != NULL)
3290     {
3291         pObjSid->InheritedObjectTypeGuid = *pInheritedObjectGuid;
3292         ObjectsPresent |= ACE_INHERITED_OBJECT_TYPE_PRESENT;
3293     }
3294     else
3295     {
3296         ZeroMemory(&pObjSid->InheritedObjectTypeGuid,
3297                    sizeof(GUID));
3298     }
3299
3300     pObjSid->ObjectsPresent = ObjectsPresent;
3301     pObjSid->pSid = pSid;
3302
3303     /* Fill the TRUSTEE structure */
3304     pTrustee->pMultipleTrustee = NULL;
3305     pTrustee->MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE;
3306     pTrustee->TrusteeForm = TRUSTEE_IS_OBJECTS_AND_SID;
3307     pTrustee->TrusteeType = TRUSTEE_IS_UNKNOWN;
3308     pTrustee->ptstrName = (LPSTR) pObjSid;
3309 }
3310
3311 /******************************************************************************
3312  * BuildTrusteeWithObjectsAndSidW [ADVAPI32.@]
3313  */
3314 VOID WINAPI BuildTrusteeWithObjectsAndSidW( PTRUSTEEW pTrustee, POBJECTS_AND_SID pObjSid,
3315                                             GUID* pObjectGuid, GUID* pInheritedObjectGuid, PSID pSid )
3316 {
3317     DWORD ObjectsPresent = 0;
3318
3319     TRACE("%p %p %p %p %p\n", pTrustee, pObjSid, pObjectGuid, pInheritedObjectGuid, pSid);
3320
3321     /* Fill the OBJECTS_AND_SID structure */
3322     if (pObjectGuid != NULL)
3323     {
3324         pObjSid->ObjectTypeGuid = *pObjectGuid;
3325         ObjectsPresent |= ACE_OBJECT_TYPE_PRESENT;
3326     }
3327     else
3328     {
3329         ZeroMemory(&pObjSid->ObjectTypeGuid,
3330                    sizeof(GUID));
3331     }
3332
3333     if (pInheritedObjectGuid != NULL)
3334     {
3335         pObjSid->InheritedObjectTypeGuid = *pInheritedObjectGuid;
3336         ObjectsPresent |= ACE_INHERITED_OBJECT_TYPE_PRESENT;
3337     }
3338     else
3339     {
3340         ZeroMemory(&pObjSid->InheritedObjectTypeGuid,
3341                    sizeof(GUID));
3342     }
3343
3344     pObjSid->ObjectsPresent = ObjectsPresent;
3345     pObjSid->pSid = pSid;
3346
3347     /* Fill the TRUSTEE structure */
3348     pTrustee->pMultipleTrustee = NULL;
3349     pTrustee->MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE;
3350     pTrustee->TrusteeForm = TRUSTEE_IS_OBJECTS_AND_SID;
3351     pTrustee->TrusteeType = TRUSTEE_IS_UNKNOWN;
3352     pTrustee->ptstrName = (LPWSTR) pObjSid;
3353 }
3354
3355 /******************************************************************************
3356  * BuildTrusteeWithSidA [ADVAPI32.@]
3357  */
3358 VOID WINAPI BuildTrusteeWithSidA(PTRUSTEEA pTrustee, PSID pSid)
3359 {
3360     TRACE("%p %p\n", pTrustee, pSid);
3361
3362     pTrustee->pMultipleTrustee = NULL;
3363     pTrustee->MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE;
3364     pTrustee->TrusteeForm = TRUSTEE_IS_SID;
3365     pTrustee->TrusteeType = TRUSTEE_IS_UNKNOWN;
3366     pTrustee->ptstrName = pSid;
3367 }
3368
3369 /******************************************************************************
3370  * BuildTrusteeWithSidW [ADVAPI32.@]
3371  */
3372 VOID WINAPI BuildTrusteeWithSidW(PTRUSTEEW pTrustee, PSID pSid)
3373 {
3374     TRACE("%p %p\n", pTrustee, pSid);
3375
3376     pTrustee->pMultipleTrustee = NULL;
3377     pTrustee->MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE;
3378     pTrustee->TrusteeForm = TRUSTEE_IS_SID;
3379     pTrustee->TrusteeType = TRUSTEE_IS_UNKNOWN;
3380     pTrustee->ptstrName = pSid;
3381 }
3382
3383 /******************************************************************************
3384  * BuildTrusteeWithNameA [ADVAPI32.@]
3385  */
3386 VOID WINAPI BuildTrusteeWithNameA(PTRUSTEEA pTrustee, LPSTR name)
3387 {
3388     TRACE("%p %s\n", pTrustee, debugstr_a(name) );
3389
3390     pTrustee->pMultipleTrustee = NULL;
3391     pTrustee->MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE;
3392     pTrustee->TrusteeForm = TRUSTEE_IS_NAME;
3393     pTrustee->TrusteeType = TRUSTEE_IS_UNKNOWN;
3394     pTrustee->ptstrName = name;
3395 }
3396
3397 /******************************************************************************
3398  * BuildTrusteeWithNameW [ADVAPI32.@]
3399  */
3400 VOID WINAPI BuildTrusteeWithNameW(PTRUSTEEW pTrustee, LPWSTR name)
3401 {
3402     TRACE("%p %s\n", pTrustee, debugstr_w(name) );
3403
3404     pTrustee->pMultipleTrustee = NULL;
3405     pTrustee->MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE;
3406     pTrustee->TrusteeForm = TRUSTEE_IS_NAME;
3407     pTrustee->TrusteeType = TRUSTEE_IS_UNKNOWN;
3408     pTrustee->ptstrName = name;
3409 }
3410
3411 /****************************************************************************** 
3412  * GetTrusteeFormA [ADVAPI32.@] 
3413  */ 
3414 TRUSTEE_FORM WINAPI GetTrusteeFormA(PTRUSTEEA pTrustee) 
3415 {  
3416     TRACE("(%p)\n", pTrustee); 
3417   
3418     if (!pTrustee) 
3419         return TRUSTEE_BAD_FORM; 
3420   
3421     return pTrustee->TrusteeForm; 
3422 }  
3423   
3424 /****************************************************************************** 
3425  * GetTrusteeFormW [ADVAPI32.@] 
3426  */ 
3427 TRUSTEE_FORM WINAPI GetTrusteeFormW(PTRUSTEEW pTrustee) 
3428 {  
3429     TRACE("(%p)\n", pTrustee); 
3430   
3431     if (!pTrustee) 
3432         return TRUSTEE_BAD_FORM; 
3433   
3434     return pTrustee->TrusteeForm; 
3435 }  
3436   
3437 /****************************************************************************** 
3438  * GetTrusteeNameA [ADVAPI32.@] 
3439  */ 
3440 LPSTR WINAPI GetTrusteeNameA(PTRUSTEEA pTrustee) 
3441 {  
3442     TRACE("(%p)\n", pTrustee); 
3443   
3444     if (!pTrustee) 
3445         return NULL; 
3446   
3447     return pTrustee->ptstrName; 
3448 }  
3449   
3450 /****************************************************************************** 
3451  * GetTrusteeNameW [ADVAPI32.@] 
3452  */ 
3453 LPWSTR WINAPI GetTrusteeNameW(PTRUSTEEW pTrustee) 
3454 {  
3455     TRACE("(%p)\n", pTrustee); 
3456   
3457     if (!pTrustee) 
3458         return NULL; 
3459   
3460     return pTrustee->ptstrName; 
3461 }  
3462   
3463 /****************************************************************************** 
3464  * GetTrusteeTypeA [ADVAPI32.@] 
3465  */ 
3466 TRUSTEE_TYPE WINAPI GetTrusteeTypeA(PTRUSTEEA pTrustee) 
3467 {  
3468     TRACE("(%p)\n", pTrustee); 
3469   
3470     if (!pTrustee) 
3471         return TRUSTEE_IS_UNKNOWN; 
3472   
3473     return pTrustee->TrusteeType; 
3474 }  
3475   
3476 /****************************************************************************** 
3477  * GetTrusteeTypeW [ADVAPI32.@] 
3478  */ 
3479 TRUSTEE_TYPE WINAPI GetTrusteeTypeW(PTRUSTEEW pTrustee) 
3480 {  
3481     TRACE("(%p)\n", pTrustee); 
3482   
3483     if (!pTrustee) 
3484         return TRUSTEE_IS_UNKNOWN; 
3485   
3486     return pTrustee->TrusteeType; 
3487
3488  
3489 BOOL WINAPI SetAclInformation( PACL pAcl, LPVOID pAclInformation,
3490                                DWORD nAclInformationLength,
3491                                ACL_INFORMATION_CLASS dwAclInformationClass )
3492 {
3493     FIXME("%p %p 0x%08x 0x%08x - stub\n", pAcl, pAclInformation,
3494           nAclInformationLength, dwAclInformationClass);
3495
3496     return TRUE;
3497 }
3498
3499 /******************************************************************************
3500  * SetEntriesInAclA [ADVAPI32.@]
3501  */
3502 DWORD WINAPI SetEntriesInAclA( ULONG count, PEXPLICIT_ACCESSA pEntries,
3503                                PACL OldAcl, PACL* NewAcl )
3504 {
3505     FIXME("%d %p %p %p\n",count,pEntries,OldAcl,NewAcl);
3506     if (NewAcl)
3507          *NewAcl = NULL;
3508     return ERROR_SUCCESS;
3509 }
3510
3511 /******************************************************************************
3512  * SetEntriesInAclW [ADVAPI32.@]
3513  */
3514 DWORD WINAPI SetEntriesInAclW( ULONG count, PEXPLICIT_ACCESSW pEntries,
3515                                PACL OldAcl, PACL* NewAcl )
3516 {
3517     ULONG i;
3518     PSID *ppsid;
3519     DWORD ret = ERROR_SUCCESS;
3520     DWORD acl_size = sizeof(ACL);
3521     NTSTATUS status;
3522
3523     TRACE("%d %p %p %p\n", count, pEntries, OldAcl, NewAcl);
3524
3525     *NewAcl = NULL;
3526
3527     if (!count && !OldAcl)
3528         return ERROR_SUCCESS;
3529
3530     /* allocate array of maximum sized sids allowed */
3531     ppsid = HeapAlloc(GetProcessHeap(), 0, count * (sizeof(SID *) + FIELD_OFFSET(SID, SubAuthority[SID_MAX_SUB_AUTHORITIES])));
3532     if (!ppsid)
3533         return ERROR_OUTOFMEMORY;
3534
3535     for (i = 0; i < count; i++)
3536     {
3537         ppsid[i] = (char *)&ppsid[count] + i * FIELD_OFFSET(SID, SubAuthority[SID_MAX_SUB_AUTHORITIES]);
3538
3539         TRACE("[%d]:\n\tgrfAccessPermissions = 0x%x\n\tgrfAccessMode = %d\n\tgrfInheritance = 0x%x\n\t"
3540               "Trustee.pMultipleTrustee = %p\n\tMultipleTrusteeOperation = %d\n\tTrusteeForm = %d\n\t"
3541               "Trustee.TrusteeType = %d\n\tptstrName = %p\n", i,
3542               pEntries[i].grfAccessPermissions, pEntries[i].grfAccessMode, pEntries[i].grfInheritance,
3543               pEntries[i].Trustee.pMultipleTrustee, pEntries[i].Trustee.MultipleTrusteeOperation,
3544               pEntries[i].Trustee.TrusteeForm, pEntries[i].Trustee.TrusteeType,
3545               pEntries[i].Trustee.ptstrName);
3546
3547         if (pEntries[i].Trustee.MultipleTrusteeOperation == TRUSTEE_IS_IMPERSONATE)
3548         {
3549             WARN("bad multiple trustee operation %d for trustee %d\n", pEntries[i].Trustee.MultipleTrusteeOperation, i);
3550             ret = ERROR_INVALID_PARAMETER;
3551             goto exit;
3552         }
3553
3554         switch (pEntries[i].Trustee.TrusteeForm)
3555         {
3556         case TRUSTEE_IS_SID:
3557             if (!CopySid(FIELD_OFFSET(SID, SubAuthority[SID_MAX_SUB_AUTHORITIES]),
3558                          ppsid[i], pEntries[i].Trustee.ptstrName))
3559             {
3560                 WARN("bad sid %p for trustee %d\n", pEntries[i].Trustee.ptstrName, i);
3561                 ret = ERROR_INVALID_PARAMETER;
3562                 goto exit;
3563             }
3564             break;
3565         case TRUSTEE_IS_NAME:
3566         {
3567             DWORD sid_size = FIELD_OFFSET(SID, SubAuthority[SID_MAX_SUB_AUTHORITIES]);
3568             DWORD domain_size = MAX_COMPUTERNAME_LENGTH + 1;
3569             SID_NAME_USE use;
3570             if (!strcmpW( pEntries[i].Trustee.ptstrName, CURRENT_USER ))
3571             {
3572                 if (!lookup_user_account_name( ppsid[i], &sid_size, NULL, &domain_size, &use ))
3573                 {
3574                     ret = GetLastError();
3575                     goto exit;
3576                 }
3577             }
3578             else if (!LookupAccountNameW(NULL, pEntries[i].Trustee.ptstrName, ppsid[i], &sid_size, NULL, &domain_size, &use))
3579             {
3580                 WARN("bad user name %s for trustee %d\n", debugstr_w(pEntries[i].Trustee.ptstrName), i);
3581                 ret = ERROR_INVALID_PARAMETER;
3582                 goto exit;
3583             }
3584             break;
3585         }
3586         case TRUSTEE_IS_OBJECTS_AND_SID:
3587             FIXME("TRUSTEE_IS_OBJECTS_AND_SID unimplemented\n");
3588             break;
3589         case TRUSTEE_IS_OBJECTS_AND_NAME:
3590             FIXME("TRUSTEE_IS_OBJECTS_AND_NAME unimplemented\n");
3591             break;
3592         default:
3593             WARN("bad trustee form %d for trustee %d\n", pEntries[i].Trustee.TrusteeForm, i);
3594             ret = ERROR_INVALID_PARAMETER;
3595             goto exit;
3596         }
3597
3598         /* Note: we overestimate the ACL size here as a tradeoff between
3599          * instructions (simplicity) and memory */
3600         switch (pEntries[i].grfAccessMode)
3601         {
3602         case GRANT_ACCESS:
3603         case SET_ACCESS:
3604             acl_size += FIELD_OFFSET(ACCESS_ALLOWED_ACE, SidStart) + GetLengthSid(ppsid[i]);
3605             break;
3606         case DENY_ACCESS:
3607             acl_size += FIELD_OFFSET(ACCESS_DENIED_ACE, SidStart) + GetLengthSid(ppsid[i]);
3608             break;
3609         case SET_AUDIT_SUCCESS:
3610         case SET_AUDIT_FAILURE:
3611             acl_size += FIELD_OFFSET(SYSTEM_AUDIT_ACE, SidStart) + GetLengthSid(ppsid[i]);
3612             break;
3613         case REVOKE_ACCESS:
3614             break;
3615         default:
3616             WARN("bad access mode %d for trustee %d\n", pEntries[i].grfAccessMode, i);
3617             ret = ERROR_INVALID_PARAMETER;
3618             goto exit;
3619         }
3620     }
3621
3622     if (OldAcl)
3623     {
3624         ACL_SIZE_INFORMATION size_info;
3625
3626         status = RtlQueryInformationAcl(OldAcl, &size_info, sizeof(size_info), AclSizeInformation);
3627         if (status != STATUS_SUCCESS)
3628         {
3629             ret = RtlNtStatusToDosError(status);
3630             goto exit;
3631         }
3632         acl_size += size_info.AclBytesInUse - sizeof(ACL);
3633     }
3634
3635     *NewAcl = LocalAlloc(0, acl_size);
3636     if (!*NewAcl)
3637     {
3638         ret = ERROR_OUTOFMEMORY;
3639         goto exit;
3640     }
3641
3642     status = RtlCreateAcl( *NewAcl, acl_size, ACL_REVISION );
3643     if (status != STATUS_SUCCESS)
3644     {
3645         ret = RtlNtStatusToDosError(status);
3646         goto exit;
3647     }
3648
3649     for (i = 0; i < count; i++)
3650     {
3651         switch (pEntries[i].grfAccessMode)
3652         {
3653         case GRANT_ACCESS:
3654             status = RtlAddAccessAllowedAceEx(*NewAcl, ACL_REVISION,
3655                                               pEntries[i].grfInheritance,
3656                                               pEntries[i].grfAccessPermissions,
3657                                               ppsid[i]);
3658             break;
3659         case SET_ACCESS:
3660         {
3661             ULONG j;
3662             BOOL add = TRUE;
3663             if (OldAcl)
3664             {
3665                 for (j = 0; ; j++)
3666                 {
3667                     const ACE_HEADER *existing_ace_header;
3668                     status = RtlGetAce(OldAcl, j, (LPVOID *)&existing_ace_header);
3669                     if (status != STATUS_SUCCESS)
3670                         break;
3671                     if (pEntries[i].grfAccessMode == SET_ACCESS &&
3672                         existing_ace_header->AceType == ACCESS_ALLOWED_ACE_TYPE &&
3673                         EqualSid(ppsid[i], &((ACCESS_ALLOWED_ACE *)existing_ace_header)->SidStart))
3674                     {
3675                         add = FALSE;
3676                         break;
3677                     }
3678                 }
3679             }
3680             if (add)
3681                 status = RtlAddAccessAllowedAceEx(*NewAcl, ACL_REVISION,
3682                                                   pEntries[i].grfInheritance,
3683                                                   pEntries[i].grfAccessPermissions,
3684                                                   ppsid[i]);
3685             break;
3686         }
3687         case DENY_ACCESS:
3688             status = RtlAddAccessDeniedAceEx(*NewAcl, ACL_REVISION,
3689                                              pEntries[i].grfInheritance,
3690                                              pEntries[i].grfAccessPermissions,
3691                                              ppsid[i]);
3692             break;
3693         case SET_AUDIT_SUCCESS:
3694             status = RtlAddAuditAccessAceEx(*NewAcl, ACL_REVISION,
3695                                             pEntries[i].grfInheritance,
3696                                             pEntries[i].grfAccessPermissions,
3697                                             ppsid[i], TRUE, FALSE);
3698             break;
3699         case SET_AUDIT_FAILURE:
3700             status = RtlAddAuditAccessAceEx(*NewAcl, ACL_REVISION,
3701                                             pEntries[i].grfInheritance,
3702                                             pEntries[i].grfAccessPermissions,
3703                                             ppsid[i], FALSE, TRUE);
3704             break;
3705         default:
3706             FIXME("unhandled access mode %d\n", pEntries[i].grfAccessMode);
3707         }
3708     }
3709
3710     if (OldAcl)
3711     {
3712         for (i = 0; ; i++)
3713         {
3714             BOOL add = TRUE;
3715             ULONG j;
3716             const ACE_HEADER *old_ace_header;
3717             status = RtlGetAce(OldAcl, i, (LPVOID *)&old_ace_header);
3718             if (status != STATUS_SUCCESS) break;
3719             for (j = 0; j < count; j++)
3720             {
3721                 if (pEntries[j].grfAccessMode == SET_ACCESS &&
3722                     old_ace_header->AceType == ACCESS_ALLOWED_ACE_TYPE &&
3723                     EqualSid(ppsid[j], &((ACCESS_ALLOWED_ACE *)old_ace_header)->SidStart))
3724                 {
3725                     status = RtlAddAccessAllowedAceEx(*NewAcl, ACL_REVISION, pEntries[j].grfInheritance, pEntries[j].grfAccessPermissions, ppsid[j]);
3726                     add = FALSE;
3727                     break;
3728                 }
3729                 else if (pEntries[j].grfAccessMode == REVOKE_ACCESS)
3730                 {
3731                     switch (old_ace_header->AceType)
3732                     {
3733                     case ACCESS_ALLOWED_ACE_TYPE:
3734                         if (EqualSid(ppsid[j], &((ACCESS_ALLOWED_ACE *)old_ace_header)->SidStart))
3735                             add = FALSE;
3736                         break;
3737                     case ACCESS_DENIED_ACE_TYPE:
3738                         if (EqualSid(ppsid[j], &((ACCESS_DENIED_ACE *)old_ace_header)->SidStart))
3739                             add = FALSE;
3740                         break;
3741                     case SYSTEM_AUDIT_ACE_TYPE:
3742                         if (EqualSid(ppsid[j], &((SYSTEM_AUDIT_ACE *)old_ace_header)->SidStart))
3743                             add = FALSE;
3744                         break;
3745                     case SYSTEM_ALARM_ACE_TYPE:
3746                         if (EqualSid(ppsid[j], &((SYSTEM_ALARM_ACE *)old_ace_header)->SidStart))
3747                             add = FALSE;
3748                         break;
3749                     default:
3750                         FIXME("unhandled ace type %d\n", old_ace_header->AceType);
3751                     }
3752
3753                     if (!add)
3754                         break;
3755                 }
3756             }
3757             if (add)
3758                 status = RtlAddAce(*NewAcl, ACL_REVISION, 1, (PACE_HEADER)old_ace_header, old_ace_header->AceSize);
3759             if (status != STATUS_SUCCESS)
3760             {
3761                 WARN("RtlAddAce failed with error 0x%08x\n", status);
3762                 ret = RtlNtStatusToDosError(status);
3763                 break;
3764             }
3765         }
3766     }
3767
3768 exit:
3769     HeapFree(GetProcessHeap(), 0, ppsid);
3770     return ret;
3771 }
3772
3773 /******************************************************************************
3774  * SetNamedSecurityInfoA [ADVAPI32.@]
3775  */
3776 DWORD WINAPI SetNamedSecurityInfoA(LPSTR pObjectName,
3777         SE_OBJECT_TYPE ObjectType, SECURITY_INFORMATION SecurityInfo,
3778         PSID psidOwner, PSID psidGroup, PACL pDacl, PACL pSacl)
3779 {
3780     DWORD len;
3781     LPWSTR wstr = NULL;
3782     DWORD r;
3783
3784     TRACE("%s %d %d %p %p %p %p\n", debugstr_a(pObjectName), ObjectType,
3785            SecurityInfo, psidOwner, psidGroup, pDacl, pSacl);
3786
3787     if( pObjectName )
3788     {
3789         len = MultiByteToWideChar( CP_ACP, 0, pObjectName, -1, NULL, 0 );
3790         wstr = HeapAlloc( GetProcessHeap(), 0, len*sizeof(WCHAR));
3791         MultiByteToWideChar( CP_ACP, 0, pObjectName, -1, wstr, len );
3792     }
3793
3794     r = SetNamedSecurityInfoW( wstr, ObjectType, SecurityInfo, psidOwner,
3795                            psidGroup, pDacl, pSacl );
3796
3797     HeapFree( GetProcessHeap(), 0, wstr );
3798
3799     return r;
3800 }
3801
3802 BOOL WINAPI SetPrivateObjectSecurity( SECURITY_INFORMATION SecurityInformation,
3803     PSECURITY_DESCRIPTOR ModificationDescriptor,
3804     PSECURITY_DESCRIPTOR* ObjectsSecurityDescriptor,
3805     PGENERIC_MAPPING GenericMapping,
3806     HANDLE Token )
3807 {
3808     FIXME("0x%08x %p %p %p %p - stub\n", SecurityInformation, ModificationDescriptor,
3809           ObjectsSecurityDescriptor, GenericMapping, Token);
3810
3811     return TRUE;
3812 }
3813
3814 BOOL WINAPI AreAllAccessesGranted( DWORD GrantedAccess, DWORD DesiredAccess )
3815 {
3816     return RtlAreAllAccessesGranted( GrantedAccess, DesiredAccess );
3817 }
3818
3819 /******************************************************************************
3820  * AreAnyAccessesGranted [ADVAPI32.@]
3821  *
3822  * Determines whether or not any of a set of specified access permissions have
3823  * been granted or not.
3824  *
3825  * PARAMS
3826  *   GrantedAccess [I] The permissions that have been granted.
3827  *   DesiredAccess [I] The permissions that you want to have.
3828  *
3829  * RETURNS
3830  *   Nonzero if any of the permissions have been granted, zero if none of the
3831  *   permissions have been granted.
3832  */
3833
3834 BOOL WINAPI AreAnyAccessesGranted( DWORD GrantedAccess, DWORD DesiredAccess )
3835 {
3836     return RtlAreAnyAccessesGranted( GrantedAccess, DesiredAccess );
3837 }
3838
3839 /******************************************************************************
3840  * SetNamedSecurityInfoW [ADVAPI32.@]
3841  */
3842 DWORD WINAPI SetNamedSecurityInfoW(LPWSTR pObjectName,
3843         SE_OBJECT_TYPE ObjectType, SECURITY_INFORMATION SecurityInfo,
3844         PSID psidOwner, PSID psidGroup, PACL pDacl, PACL pSacl)
3845 {
3846     FIXME("%s %d %d %p %p %p %p\n", debugstr_w(pObjectName), ObjectType,
3847            SecurityInfo, psidOwner, psidGroup, pDacl, pSacl);
3848     return ERROR_SUCCESS;
3849 }
3850
3851 /******************************************************************************
3852  * GetExplicitEntriesFromAclA [ADVAPI32.@]
3853  */
3854 DWORD WINAPI GetExplicitEntriesFromAclA( PACL pacl, PULONG pcCountOfExplicitEntries,
3855         PEXPLICIT_ACCESSA* pListOfExplicitEntries)
3856 {
3857     FIXME("%p %p %p\n",pacl, pcCountOfExplicitEntries, pListOfExplicitEntries);
3858     return ERROR_CALL_NOT_IMPLEMENTED;
3859 }
3860
3861 /******************************************************************************
3862  * GetExplicitEntriesFromAclW [ADVAPI32.@]
3863  */
3864 DWORD WINAPI GetExplicitEntriesFromAclW( PACL pacl, PULONG pcCountOfExplicitEntries,
3865         PEXPLICIT_ACCESSW* pListOfExplicitEntries)
3866 {
3867     FIXME("%p %p %p\n",pacl, pcCountOfExplicitEntries, pListOfExplicitEntries);
3868     return ERROR_CALL_NOT_IMPLEMENTED;
3869 }
3870
3871 /******************************************************************************
3872  * GetAuditedPermissionsFromAclA [ADVAPI32.@]
3873  */
3874 DWORD WINAPI GetAuditedPermissionsFromAclA( PACL pacl, PTRUSTEEA pTrustee, PACCESS_MASK pSuccessfulAuditedRights,
3875         PACCESS_MASK pFailedAuditRights)
3876 {
3877     FIXME("%p %p %p %p\n",pacl, pTrustee, pSuccessfulAuditedRights, pFailedAuditRights);
3878     return ERROR_CALL_NOT_IMPLEMENTED;
3879
3880 }
3881
3882 /******************************************************************************
3883  * GetAuditedPermissionsFromAclW [ADVAPI32.@]
3884  */
3885 DWORD WINAPI GetAuditedPermissionsFromAclW( PACL pacl, PTRUSTEEW pTrustee, PACCESS_MASK pSuccessfulAuditedRights,
3886         PACCESS_MASK pFailedAuditRights)
3887 {
3888     FIXME("%p %p %p %p\n",pacl, pTrustee, pSuccessfulAuditedRights, pFailedAuditRights);
3889     return ERROR_CALL_NOT_IMPLEMENTED;
3890
3891 }
3892
3893 /******************************************************************************
3894  * ParseAclStringFlags
3895  */
3896 static DWORD ParseAclStringFlags(LPCWSTR* StringAcl)
3897 {
3898     DWORD flags = 0;
3899     LPCWSTR szAcl = *StringAcl;
3900
3901     while (*szAcl != '(')
3902     {
3903         if (*szAcl == 'P')
3904         {
3905             flags |= SE_DACL_PROTECTED;
3906         }
3907         else if (*szAcl == 'A')
3908         {
3909             szAcl++;
3910             if (*szAcl == 'R')
3911                 flags |= SE_DACL_AUTO_INHERIT_REQ;
3912             else if (*szAcl == 'I')
3913                 flags |= SE_DACL_AUTO_INHERITED;
3914         }
3915         szAcl++;
3916     }
3917
3918     *StringAcl = szAcl;
3919     return flags;
3920 }
3921
3922 /******************************************************************************
3923  * ParseAceStringType
3924  */
3925 static const ACEFLAG AceType[] =
3926 {
3927     { SDDL_ALARM,          SYSTEM_ALARM_ACE_TYPE },
3928     { SDDL_AUDIT,          SYSTEM_AUDIT_ACE_TYPE },
3929     { SDDL_ACCESS_ALLOWED, ACCESS_ALLOWED_ACE_TYPE },
3930     { SDDL_ACCESS_DENIED,  ACCESS_DENIED_ACE_TYPE },
3931     /*
3932     { SDDL_OBJECT_ACCESS_ALLOWED, ACCESS_ALLOWED_OBJECT_ACE_TYPE },
3933     { SDDL_OBJECT_ACCESS_DENIED,  ACCESS_DENIED_OBJECT_ACE_TYPE },
3934     { SDDL_OBJECT_ALARM,          SYSTEM_ALARM_OBJECT_ACE_TYPE },
3935     { SDDL_OBJECT_AUDIT,          SYSTEM_AUDIT_OBJECT_ACE_TYPE },
3936     */
3937     { NULL, 0 },
3938 };
3939
3940 static BYTE ParseAceStringType(LPCWSTR* StringAcl)
3941 {
3942     UINT len = 0;
3943     LPCWSTR szAcl = *StringAcl;
3944     const ACEFLAG *lpaf = AceType;
3945
3946     while (*szAcl == ' ')
3947         szAcl++;
3948
3949     while (lpaf->wstr &&
3950         (len = strlenW(lpaf->wstr)) &&
3951         strncmpW(lpaf->wstr, szAcl, len))
3952         lpaf++;
3953
3954     if (!lpaf->wstr)
3955         return 0;
3956
3957     *StringAcl = szAcl + len;
3958     return lpaf->value;
3959 }
3960
3961
3962 /******************************************************************************
3963  * ParseAceStringFlags
3964  */
3965 static const ACEFLAG AceFlags[] =
3966 {
3967     { SDDL_CONTAINER_INHERIT, CONTAINER_INHERIT_ACE },
3968     { SDDL_AUDIT_FAILURE,     FAILED_ACCESS_ACE_FLAG },
3969     { SDDL_INHERITED,         INHERITED_ACE },
3970     { SDDL_INHERIT_ONLY,      INHERIT_ONLY_ACE },
3971     { SDDL_NO_PROPAGATE,      NO_PROPAGATE_INHERIT_ACE },
3972     { SDDL_OBJECT_INHERIT,    OBJECT_INHERIT_ACE },
3973     { SDDL_AUDIT_SUCCESS,     SUCCESSFUL_ACCESS_ACE_FLAG },
3974     { NULL, 0 },
3975 };
3976
3977 static BYTE ParseAceStringFlags(LPCWSTR* StringAcl)
3978 {
3979     UINT len = 0;
3980     BYTE flags = 0;
3981     LPCWSTR szAcl = *StringAcl;
3982
3983     while (*szAcl == ' ')
3984         szAcl++;
3985
3986     while (*szAcl != ';')
3987     {
3988         const ACEFLAG *lpaf = AceFlags;
3989
3990         while (lpaf->wstr &&
3991                (len = strlenW(lpaf->wstr)) &&
3992                strncmpW(lpaf->wstr, szAcl, len))
3993             lpaf++;
3994
3995         if (!lpaf->wstr)
3996             return 0;
3997
3998         flags |= lpaf->value;
3999         szAcl += len;
4000     }
4001
4002     *StringAcl = szAcl;
4003     return flags;
4004 }
4005
4006
4007 /******************************************************************************
4008  * ParseAceStringRights
4009  */
4010 static const ACEFLAG AceRights[] =
4011 {
4012     { SDDL_GENERIC_ALL,     GENERIC_ALL },
4013     { SDDL_GENERIC_READ,    GENERIC_READ },
4014     { SDDL_GENERIC_WRITE,   GENERIC_WRITE },
4015     { SDDL_GENERIC_EXECUTE, GENERIC_EXECUTE },
4016
4017     { SDDL_READ_CONTROL,    READ_CONTROL },
4018     { SDDL_STANDARD_DELETE, DELETE },
4019     { SDDL_WRITE_DAC,       WRITE_DAC },
4020     { SDDL_WRITE_OWNER,     WRITE_OWNER },
4021
4022     { SDDL_READ_PROPERTY,   ADS_RIGHT_DS_READ_PROP},
4023     { SDDL_WRITE_PROPERTY,  ADS_RIGHT_DS_WRITE_PROP},
4024     { SDDL_CREATE_CHILD,    ADS_RIGHT_DS_CREATE_CHILD},
4025     { SDDL_DELETE_CHILD,    ADS_RIGHT_DS_DELETE_CHILD},
4026     { SDDL_LIST_CHILDREN,   ADS_RIGHT_ACTRL_DS_LIST},
4027     { SDDL_SELF_WRITE,      ADS_RIGHT_DS_SELF},
4028     { SDDL_LIST_OBJECT,     ADS_RIGHT_DS_LIST_OBJECT},
4029     { SDDL_DELETE_TREE,     ADS_RIGHT_DS_DELETE_TREE},
4030     { SDDL_CONTROL_ACCESS,  ADS_RIGHT_DS_CONTROL_ACCESS},
4031
4032     { SDDL_FILE_ALL,        FILE_ALL_ACCESS },
4033     { SDDL_FILE_READ,       FILE_GENERIC_READ },
4034     { SDDL_FILE_WRITE,      FILE_GENERIC_WRITE },
4035     { SDDL_FILE_EXECUTE,    FILE_GENERIC_EXECUTE },
4036
4037     { SDDL_KEY_ALL,         KEY_ALL_ACCESS },
4038     { SDDL_KEY_READ,        KEY_READ },
4039     { SDDL_KEY_WRITE,       KEY_WRITE },
4040     { SDDL_KEY_EXECUTE,     KEY_EXECUTE },
4041     { NULL, 0 },
4042 };
4043
4044 static DWORD ParseAceStringRights(LPCWSTR* StringAcl)
4045 {
4046     UINT len = 0;
4047     DWORD rights = 0;
4048     LPCWSTR szAcl = *StringAcl;
4049
4050     while (*szAcl == ' ')
4051         szAcl++;
4052
4053     if ((*szAcl == '0') && (*(szAcl + 1) == 'x'))
4054     {
4055         LPCWSTR p = szAcl;
4056
4057         while (*p && *p != ';')
4058             p++;
4059
4060         if (p - szAcl <= 10 /* 8 hex digits + "0x" */ )
4061         {
4062             rights = strtoulW(szAcl, NULL, 16);
4063             szAcl = p;
4064         }
4065         else
4066             WARN("Invalid rights string format: %s\n", debugstr_wn(szAcl, p - szAcl));
4067     }
4068     else
4069     {
4070         while (*szAcl != ';')
4071         {
4072             const ACEFLAG *lpaf = AceRights;
4073
4074             while (lpaf->wstr &&
4075                (len = strlenW(lpaf->wstr)) &&
4076                strncmpW(lpaf->wstr, szAcl, len))
4077             {
4078                lpaf++;
4079             }
4080
4081             if (!lpaf->wstr)
4082                 return 0;
4083
4084             rights |= lpaf->value;
4085             szAcl += len;
4086         }
4087     }
4088
4089     *StringAcl = szAcl;
4090     return rights;
4091 }
4092
4093
4094 /******************************************************************************
4095  * ParseStringAclToAcl
4096  * 
4097  * dacl_flags(string_ace1)(string_ace2)... (string_acen) 
4098  */
4099 static BOOL ParseStringAclToAcl(LPCWSTR StringAcl, LPDWORD lpdwFlags, 
4100     PACL pAcl, LPDWORD cBytes)
4101 {
4102     DWORD val;
4103     DWORD sidlen;
4104     DWORD length = sizeof(ACL);
4105     DWORD acesize = 0;
4106     DWORD acecount = 0;
4107     PACCESS_ALLOWED_ACE pAce = NULL; /* pointer to current ACE */
4108     DWORD error = ERROR_INVALID_ACL;
4109
4110     TRACE("%s\n", debugstr_w(StringAcl));
4111
4112     if (!StringAcl)
4113         return FALSE;
4114
4115     if (pAcl) /* pAce is only useful if we're setting values */
4116         pAce = (PACCESS_ALLOWED_ACE) (pAcl + 1);
4117
4118     /* Parse ACL flags */
4119     *lpdwFlags = ParseAclStringFlags(&StringAcl);
4120
4121     /* Parse ACE */
4122     while (*StringAcl == '(')
4123     {
4124         StringAcl++;
4125
4126         /* Parse ACE type */
4127         val = ParseAceStringType(&StringAcl);
4128         if (pAce)
4129             pAce->Header.AceType = (BYTE) val;
4130         if (*StringAcl != ';')
4131         {
4132             error = RPC_S_INVALID_STRING_UUID;
4133             goto lerr;
4134         }
4135         StringAcl++;
4136
4137         /* Parse ACE flags */
4138         val = ParseAceStringFlags(&StringAcl);
4139         if (pAce)
4140             pAce->Header.AceFlags = (BYTE) val;
4141         if (*StringAcl != ';')
4142             goto lerr;
4143         StringAcl++;
4144
4145         /* Parse ACE rights */
4146         val = ParseAceStringRights(&StringAcl);
4147         if (pAce)
4148             pAce->Mask = val;
4149         if (*StringAcl != ';')
4150             goto lerr;
4151         StringAcl++;
4152
4153         /* Parse ACE object guid */
4154         while (*StringAcl == ' ')
4155             StringAcl++;
4156         if (*StringAcl != ';')
4157         {
4158             FIXME("Support for *_OBJECT_ACE_TYPE not implemented\n");
4159             goto lerr;
4160         }
4161         StringAcl++;
4162
4163         /* Parse ACE inherit object guid */
4164         while (*StringAcl == ' ')
4165             StringAcl++;
4166         if (*StringAcl != ';')
4167         {
4168             FIXME("Support for *_OBJECT_ACE_TYPE not implemented\n");
4169             goto lerr;
4170         }
4171         StringAcl++;
4172
4173         /* Parse ACE account sid */
4174         if (ParseStringSidToSid(StringAcl, pAce ? &pAce->SidStart : NULL, &sidlen))
4175         {
4176             while (*StringAcl && *StringAcl != ')')
4177                 StringAcl++;
4178         }
4179
4180         if (*StringAcl != ')')
4181             goto lerr;
4182         StringAcl++;
4183
4184         acesize = sizeof(ACCESS_ALLOWED_ACE) - sizeof(DWORD) + sidlen;
4185         length += acesize;
4186         if (pAce)
4187         {
4188             pAce->Header.AceSize = acesize;
4189             pAce = (PACCESS_ALLOWED_ACE)((LPBYTE)pAce + acesize);
4190         }
4191         acecount++;
4192     }
4193
4194     *cBytes = length;
4195
4196     if (length > 0xffff)
4197     {
4198         ERR("ACL too large\n");
4199         goto lerr;
4200     }
4201
4202     if (pAcl)
4203     {
4204         pAcl->AclRevision = ACL_REVISION;
4205         pAcl->Sbz1 = 0;
4206         pAcl->AclSize = length;
4207         pAcl->AceCount = acecount++;
4208         pAcl->Sbz2 = 0;
4209     }
4210     return TRUE;
4211
4212 lerr:
4213     SetLastError(error);
4214     WARN("Invalid ACE string format\n");
4215     return FALSE;
4216 }
4217
4218
4219 /******************************************************************************
4220  * ParseStringSecurityDescriptorToSecurityDescriptor
4221  */
4222 static BOOL ParseStringSecurityDescriptorToSecurityDescriptor(
4223     LPCWSTR StringSecurityDescriptor,
4224     SECURITY_DESCRIPTOR_RELATIVE* SecurityDescriptor,
4225     LPDWORD cBytes)
4226 {
4227     BOOL bret = FALSE;
4228     WCHAR toktype;
4229     WCHAR tok[MAX_PATH];
4230     LPCWSTR lptoken;
4231     LPBYTE lpNext = NULL;
4232     DWORD len;
4233
4234     *cBytes = sizeof(SECURITY_DESCRIPTOR);
4235
4236     if (SecurityDescriptor)
4237         lpNext = (LPBYTE)(SecurityDescriptor + 1);
4238
4239     while (*StringSecurityDescriptor == ' ')
4240         StringSecurityDescriptor++;
4241
4242     while (*StringSecurityDescriptor)
4243     {
4244         toktype = *StringSecurityDescriptor;
4245
4246         /* Expect char identifier followed by ':' */
4247         StringSecurityDescriptor++;
4248         if (*StringSecurityDescriptor != ':')
4249         {
4250             SetLastError(ERROR_INVALID_PARAMETER);
4251             goto lend;
4252         }
4253         StringSecurityDescriptor++;
4254
4255         /* Extract token */
4256         lptoken = StringSecurityDescriptor;
4257         while (*lptoken && *lptoken != ':')
4258             lptoken++;
4259
4260         if (*lptoken)
4261             lptoken--;
4262
4263         len = lptoken - StringSecurityDescriptor;
4264         memcpy( tok, StringSecurityDescriptor, len * sizeof(WCHAR) );
4265         tok[len] = 0;
4266
4267         switch (toktype)
4268         {
4269             case 'O':
4270             {
4271                 DWORD bytes;
4272
4273                 if (!ParseStringSidToSid(tok, lpNext, &bytes))
4274                     goto lend;
4275
4276                 if (SecurityDescriptor)
4277                 {
4278                     SecurityDescriptor->Owner = lpNext - (LPBYTE)SecurityDescriptor;
4279                     lpNext += bytes; /* Advance to next token */
4280                 }
4281
4282                 *cBytes += bytes;
4283
4284                 break;
4285             }
4286
4287             case 'G':
4288             {
4289                 DWORD bytes;
4290
4291                 if (!ParseStringSidToSid(tok, lpNext, &bytes))
4292                     goto lend;
4293
4294                 if (SecurityDescriptor)
4295                 {
4296                     SecurityDescriptor->Group = lpNext - (LPBYTE)SecurityDescriptor;
4297                     lpNext += bytes; /* Advance to next token */
4298                 }
4299
4300                 *cBytes += bytes;
4301
4302                 break;
4303             }
4304
4305             case 'D':
4306             {
4307                 DWORD flags;
4308                 DWORD bytes;
4309
4310                 if (!ParseStringAclToAcl(tok, &flags, (PACL)lpNext, &bytes))
4311                     goto lend;
4312
4313                 if (SecurityDescriptor)
4314                 {
4315                     SecurityDescriptor->Control |= SE_DACL_PRESENT | flags;
4316                     SecurityDescriptor->Dacl = lpNext - (LPBYTE)SecurityDescriptor;
4317                     lpNext += bytes; /* Advance to next token */
4318                 }
4319
4320                 *cBytes += bytes;
4321
4322                 break;
4323             }
4324
4325             case 'S':
4326             {
4327                 DWORD flags;
4328                 DWORD bytes;
4329
4330                 if (!ParseStringAclToAcl(tok, &flags, (PACL)lpNext, &bytes))
4331                     goto lend;
4332
4333                 if (SecurityDescriptor)
4334                 {
4335                     SecurityDescriptor->Control |= SE_SACL_PRESENT | flags;
4336                     SecurityDescriptor->Sacl = lpNext - (LPBYTE)SecurityDescriptor;
4337                     lpNext += bytes; /* Advance to next token */
4338                 }
4339
4340                 *cBytes += bytes;
4341
4342                 break;
4343             }
4344
4345             default:
4346                 FIXME("Unknown token\n");
4347                 SetLastError(ERROR_INVALID_PARAMETER);
4348                 goto lend;
4349         }
4350
4351         StringSecurityDescriptor = lptoken;
4352     }
4353
4354     bret = TRUE;
4355
4356 lend:
4357     return bret;
4358 }
4359
4360 /******************************************************************************
4361  * ConvertStringSecurityDescriptorToSecurityDescriptorA [ADVAPI32.@]
4362  */
4363 BOOL WINAPI ConvertStringSecurityDescriptorToSecurityDescriptorA(
4364         LPCSTR StringSecurityDescriptor,
4365         DWORD StringSDRevision,
4366         PSECURITY_DESCRIPTOR* SecurityDescriptor,
4367         PULONG SecurityDescriptorSize)
4368 {
4369     UINT len;
4370     BOOL ret = FALSE;
4371     LPWSTR StringSecurityDescriptorW;
4372
4373     len = MultiByteToWideChar(CP_ACP, 0, StringSecurityDescriptor, -1, NULL, 0);
4374     StringSecurityDescriptorW = HeapAlloc(GetProcessHeap(), 0, len * sizeof(WCHAR));
4375
4376     if (StringSecurityDescriptorW)
4377     {
4378         MultiByteToWideChar(CP_ACP, 0, StringSecurityDescriptor, -1, StringSecurityDescriptorW, len);
4379
4380         ret = ConvertStringSecurityDescriptorToSecurityDescriptorW(StringSecurityDescriptorW,
4381                                                                    StringSDRevision, SecurityDescriptor,
4382                                                                    SecurityDescriptorSize);
4383         HeapFree(GetProcessHeap(), 0, StringSecurityDescriptorW);
4384     }
4385
4386     return ret;
4387 }
4388
4389 /******************************************************************************
4390  * ConvertStringSecurityDescriptorToSecurityDescriptorW [ADVAPI32.@]
4391  */
4392 BOOL WINAPI ConvertStringSecurityDescriptorToSecurityDescriptorW(
4393         LPCWSTR StringSecurityDescriptor,
4394         DWORD StringSDRevision,
4395         PSECURITY_DESCRIPTOR* SecurityDescriptor,
4396         PULONG SecurityDescriptorSize)
4397 {
4398     DWORD cBytes;
4399     SECURITY_DESCRIPTOR* psd;
4400     BOOL bret = FALSE;
4401
4402     TRACE("%s\n", debugstr_w(StringSecurityDescriptor));
4403
4404     if (GetVersion() & 0x80000000)
4405     {
4406         SetLastError(ERROR_CALL_NOT_IMPLEMENTED);
4407         goto lend;
4408     }
4409     else if (!StringSecurityDescriptor || !SecurityDescriptor)
4410     {
4411         SetLastError(ERROR_INVALID_PARAMETER);
4412         goto lend;
4413     }
4414     else if (StringSDRevision != SID_REVISION)
4415     {
4416         SetLastError(ERROR_UNKNOWN_REVISION);
4417         goto lend;
4418     }
4419
4420     /* Compute security descriptor length */
4421     if (!ParseStringSecurityDescriptorToSecurityDescriptor(StringSecurityDescriptor,
4422         NULL, &cBytes))
4423         goto lend;
4424
4425     psd = *SecurityDescriptor = LocalAlloc(GMEM_ZEROINIT, cBytes);
4426     if (!psd) goto lend;
4427
4428     psd->Revision = SID_REVISION;
4429     psd->Control |= SE_SELF_RELATIVE;
4430
4431     if (!ParseStringSecurityDescriptorToSecurityDescriptor(StringSecurityDescriptor,
4432              (SECURITY_DESCRIPTOR_RELATIVE *)psd, &cBytes))
4433     {
4434         LocalFree(psd);
4435         goto lend;
4436     }
4437
4438     if (SecurityDescriptorSize)
4439         *SecurityDescriptorSize = cBytes;
4440
4441     bret = TRUE;
4442  
4443 lend:
4444     TRACE(" ret=%d\n", bret);
4445     return bret;
4446 }
4447
4448 static void DumpString(LPCWSTR string, int cch, WCHAR **pwptr, ULONG *plen)
4449 {
4450     if (cch == -1)
4451         cch = strlenW(string);
4452
4453     if (plen)
4454         *plen += cch;
4455
4456     if (pwptr)
4457     {
4458         memcpy(*pwptr, string, sizeof(WCHAR)*cch);
4459         *pwptr += cch;
4460     }
4461 }
4462
4463 static BOOL DumpSidNumeric(PSID psid, WCHAR **pwptr, ULONG *plen)
4464 {
4465     DWORD i;
4466     WCHAR fmt[] = { 'S','-','%','u','-','%','d',0 };
4467     WCHAR subauthfmt[] = { '-','%','u',0 };
4468     WCHAR buf[26];
4469     SID *pisid = psid;
4470
4471     if( !IsValidSid( psid ) || pisid->Revision != SDDL_REVISION)
4472     {
4473         SetLastError(ERROR_INVALID_SID);
4474         return FALSE;
4475     }
4476
4477     if (pisid->IdentifierAuthority.Value[0] ||
4478      pisid->IdentifierAuthority.Value[1])
4479     {
4480         FIXME("not matching MS' bugs\n");
4481         SetLastError(ERROR_INVALID_SID);
4482         return FALSE;
4483     }
4484
4485     sprintfW( buf, fmt, pisid->Revision,
4486         MAKELONG(
4487             MAKEWORD( pisid->IdentifierAuthority.Value[5],
4488                     pisid->IdentifierAuthority.Value[4] ),
4489             MAKEWORD( pisid->IdentifierAuthority.Value[3],
4490                     pisid->IdentifierAuthority.Value[2] )
4491         ) );
4492     DumpString(buf, -1, pwptr, plen);
4493
4494     for( i=0; i<pisid->SubAuthorityCount; i++ )
4495     {
4496         sprintfW( buf, subauthfmt, pisid->SubAuthority[i] );
4497         DumpString(buf, -1, pwptr, plen);
4498     }
4499     return TRUE;
4500 }
4501
4502 static BOOL DumpSid(PSID psid, WCHAR **pwptr, ULONG *plen)
4503 {
4504     size_t i;
4505     for (i = 0; i < sizeof(WellKnownSids) / sizeof(WellKnownSids[0]); i++)
4506     {
4507         if (WellKnownSids[i].wstr[0] && EqualSid(psid, (PSID)&(WellKnownSids[i].Sid.Revision)))
4508         {
4509             DumpString(WellKnownSids[i].wstr, 2, pwptr, plen);
4510             return TRUE;
4511         }
4512     }
4513
4514     return DumpSidNumeric(psid, pwptr, plen);
4515 }
4516
4517 static const LPCWSTR AceRightBitNames[32] = {
4518         SDDL_CREATE_CHILD,        /*  0 */
4519         SDDL_DELETE_CHILD,
4520         SDDL_LIST_CHILDREN,
4521         SDDL_SELF_WRITE,
4522         SDDL_READ_PROPERTY,       /*  4 */
4523         SDDL_WRITE_PROPERTY,
4524         SDDL_DELETE_TREE,
4525         SDDL_LIST_OBJECT,
4526         SDDL_CONTROL_ACCESS,      /*  8 */
4527         NULL,
4528         NULL,
4529         NULL,
4530         NULL,                     /* 12 */
4531         NULL,
4532         NULL,
4533         NULL,
4534         SDDL_STANDARD_DELETE,     /* 16 */
4535         SDDL_READ_CONTROL,
4536         SDDL_WRITE_DAC,
4537         SDDL_WRITE_OWNER,
4538         NULL,                     /* 20 */
4539         NULL,
4540         NULL,
4541         NULL,
4542         NULL,                     /* 24 */
4543         NULL,
4544         NULL,
4545         NULL,
4546         SDDL_GENERIC_ALL,         /* 28 */
4547         SDDL_GENERIC_EXECUTE,
4548         SDDL_GENERIC_WRITE,
4549         SDDL_GENERIC_READ
4550 };
4551
4552 static void DumpRights(DWORD mask, WCHAR **pwptr, ULONG *plen)
4553 {
4554     static const WCHAR fmtW[] = {'0','x','%','x',0};
4555     WCHAR buf[15];
4556     size_t i;
4557
4558     if (mask == 0)
4559         return;
4560
4561     /* first check if the right have name */
4562     for (i = 0; i < sizeof(AceRights)/sizeof(AceRights[0]); i++)
4563     {
4564         if (AceRights[i].wstr == NULL)
4565             break;
4566         if (mask == AceRights[i].value)
4567         {
4568             DumpString(AceRights[i].wstr, -1, pwptr, plen);
4569             return;
4570         }
4571     }
4572
4573     /* then check if it can be built from bit names */
4574     for (i = 0; i < 32; i++)
4575     {
4576         if ((mask & (1 << i)) && (AceRightBitNames[i] == NULL))
4577         {
4578             /* can't be built from bit names */
4579             sprintfW(buf, fmtW, mask);
4580             DumpString(buf, -1, pwptr, plen);
4581             return;
4582         }
4583     }
4584
4585     /* build from bit names */
4586     for (i = 0; i < 32; i++)
4587         if (mask & (1 << i))
4588             DumpString(AceRightBitNames[i], -1, pwptr, plen);
4589 }
4590
4591 static BOOL DumpAce(LPVOID pace, WCHAR **pwptr, ULONG *plen)
4592 {
4593     ACCESS_ALLOWED_ACE *piace; /* all the supported ACEs have the same memory layout */
4594     static const WCHAR openbr = '(';
4595     static const WCHAR closebr = ')';
4596     static const WCHAR semicolon = ';';
4597
4598     if (((PACE_HEADER)pace)->AceType > SYSTEM_ALARM_ACE_TYPE || ((PACE_HEADER)pace)->AceSize < sizeof(ACCESS_ALLOWED_ACE))
4599     {
4600         SetLastError(ERROR_INVALID_ACL);
4601         return FALSE;
4602     }
4603
4604     piace = pace;
4605     DumpString(&openbr, 1, pwptr, plen);
4606     switch (piace->Header.AceType)
4607     {
4608         case ACCESS_ALLOWED_ACE_TYPE:
4609             DumpString(SDDL_ACCESS_ALLOWED, -1, pwptr, plen);
4610             break;
4611         case ACCESS_DENIED_ACE_TYPE:
4612             DumpString(SDDL_ACCESS_DENIED, -1, pwptr, plen);
4613             break;
4614         case SYSTEM_AUDIT_ACE_TYPE:
4615             DumpString(SDDL_AUDIT, -1, pwptr, plen);
4616             break;
4617         case SYSTEM_ALARM_ACE_TYPE:
4618             DumpString(SDDL_ALARM, -1, pwptr, plen);
4619             break;
4620     }
4621     DumpString(&semicolon, 1, pwptr, plen);
4622
4623     if (piace->Header.AceFlags & OBJECT_INHERIT_ACE)
4624         DumpString(SDDL_OBJECT_INHERIT, -1, pwptr, plen);
4625     if (piace->Header.AceFlags & CONTAINER_INHERIT_ACE)
4626         DumpString(SDDL_CONTAINER_INHERIT, -1, pwptr, plen);
4627     if (piace->Header.AceFlags & NO_PROPAGATE_INHERIT_ACE)
4628         DumpString(SDDL_NO_PROPAGATE, -1, pwptr, plen);
4629     if (piace->Header.AceFlags & INHERIT_ONLY_ACE)
4630         DumpString(SDDL_INHERIT_ONLY, -1, pwptr, plen);
4631     if (piace->Header.AceFlags & INHERITED_ACE)
4632         DumpString(SDDL_INHERITED, -1, pwptr, plen);
4633     if (piace->Header.AceFlags & SUCCESSFUL_ACCESS_ACE_FLAG)
4634         DumpString(SDDL_AUDIT_SUCCESS, -1, pwptr, plen);
4635     if (piace->Header.AceFlags & FAILED_ACCESS_ACE_FLAG)
4636         DumpString(SDDL_AUDIT_FAILURE, -1, pwptr, plen);
4637     DumpString(&semicolon, 1, pwptr, plen);
4638     DumpRights(piace->Mask, pwptr, plen);
4639     DumpString(&semicolon, 1, pwptr, plen);
4640     /* objects not supported */
4641     DumpString(&semicolon, 1, pwptr, plen);
4642     /* objects not supported */
4643     DumpString(&semicolon, 1, pwptr, plen);
4644     if (!DumpSid(&piace->SidStart, pwptr, plen))
4645         return FALSE;
4646     DumpString(&closebr, 1, pwptr, plen);
4647     return TRUE;
4648 }
4649
4650 static BOOL DumpAcl(PACL pacl, WCHAR **pwptr, ULONG *plen, BOOL protected, BOOL autoInheritReq, BOOL autoInherited)
4651 {
4652     WORD count;
4653     int i;
4654
4655     if (protected)
4656         DumpString(SDDL_PROTECTED, -1, pwptr, plen);
4657     if (autoInheritReq)
4658         DumpString(SDDL_AUTO_INHERIT_REQ, -1, pwptr, plen);
4659     if (autoInherited)
4660         DumpString(SDDL_AUTO_INHERITED, -1, pwptr, plen);
4661
4662     if (pacl == NULL)
4663         return TRUE;
4664
4665     if (!IsValidAcl(pacl))
4666         return FALSE;
4667
4668     count = pacl->AceCount;
4669     for (i = 0; i < count; i++)
4670     {
4671         LPVOID ace;
4672         if (!GetAce(pacl, i, &ace))
4673             return FALSE;
4674         if (!DumpAce(ace, pwptr, plen))
4675             return FALSE;
4676     }
4677
4678     return TRUE;
4679 }
4680
4681 static BOOL DumpOwner(PSECURITY_DESCRIPTOR SecurityDescriptor, WCHAR **pwptr, ULONG *plen)
4682 {
4683     static const WCHAR prefix[] = {'O',':',0};
4684     BOOL bDefaulted;
4685     PSID psid;
4686
4687     if (!GetSecurityDescriptorOwner(SecurityDescriptor, &psid, &bDefaulted))
4688         return FALSE;
4689
4690     if (psid == NULL)
4691         return TRUE;
4692
4693     DumpString(prefix, -1, pwptr, plen);
4694     if (!DumpSid(psid, pwptr, plen))
4695         return FALSE;
4696     return TRUE;
4697 }
4698
4699 static BOOL DumpGroup(PSECURITY_DESCRIPTOR SecurityDescriptor, WCHAR **pwptr, ULONG *plen)
4700 {
4701     static const WCHAR prefix[] = {'G',':',0};
4702     BOOL bDefaulted;
4703     PSID psid;
4704
4705     if (!GetSecurityDescriptorGroup(SecurityDescriptor, &psid, &bDefaulted))
4706         return FALSE;
4707
4708     if (psid == NULL)
4709         return TRUE;
4710
4711     DumpString(prefix, -1, pwptr, plen);
4712     if (!DumpSid(psid, pwptr, plen))
4713         return FALSE;
4714     return TRUE;
4715 }
4716
4717 static BOOL DumpDacl(PSECURITY_DESCRIPTOR SecurityDescriptor, WCHAR **pwptr, ULONG *plen)
4718 {
4719     static const WCHAR dacl[] = {'D',':',0};
4720     SECURITY_DESCRIPTOR_CONTROL control;
4721     BOOL present, defaulted;
4722     DWORD revision;
4723     PACL pacl;
4724
4725     if (!GetSecurityDescriptorDacl(SecurityDescriptor, &present, &pacl, &defaulted))
4726         return FALSE;
4727
4728     if (!GetSecurityDescriptorControl(SecurityDescriptor, &control, &revision))
4729         return FALSE;
4730
4731     if (!present)
4732         return TRUE;
4733
4734     DumpString(dacl, 2, pwptr, plen);
4735     if (!DumpAcl(pacl, pwptr, plen, control & SE_DACL_PROTECTED, control & SE_DACL_AUTO_INHERIT_REQ, control & SE_DACL_AUTO_INHERITED))
4736         return FALSE;
4737     return TRUE;
4738 }
4739
4740 static BOOL DumpSacl(PSECURITY_DESCRIPTOR SecurityDescriptor, WCHAR **pwptr, ULONG *plen)
4741 {
4742     static const WCHAR sacl[] = {'S',':',0};
4743     SECURITY_DESCRIPTOR_CONTROL control;
4744     BOOL present, defaulted;
4745     DWORD revision;
4746     PACL pacl;
4747
4748     if (!GetSecurityDescriptorSacl(SecurityDescriptor, &present, &pacl, &defaulted))
4749         return FALSE;
4750
4751     if (!GetSecurityDescriptorControl(SecurityDescriptor, &control, &revision))
4752         return FALSE;
4753
4754     if (!present)
4755         return TRUE;
4756
4757     DumpString(sacl, 2, pwptr, plen);
4758     if (!DumpAcl(pacl, pwptr, plen, control & SE_SACL_PROTECTED, control & SE_SACL_AUTO_INHERIT_REQ, control & SE_SACL_AUTO_INHERITED))
4759         return FALSE;
4760     return TRUE;
4761 }
4762
4763 /******************************************************************************
4764  * ConvertSecurityDescriptorToStringSecurityDescriptorA [ADVAPI32.@]
4765  */
4766 BOOL WINAPI ConvertSecurityDescriptorToStringSecurityDescriptorW(PSECURITY_DESCRIPTOR SecurityDescriptor, DWORD SDRevision, SECURITY_INFORMATION RequestedInformation, LPWSTR *OutputString, PULONG OutputLen)
4767 {
4768     ULONG len;
4769     WCHAR *wptr, *wstr;
4770
4771     if (SDRevision != SDDL_REVISION_1)
4772     {
4773         ERR("Pogram requested unknown SDDL revision %d\n", SDRevision);
4774         SetLastError(ERROR_UNKNOWN_REVISION);
4775         return FALSE;
4776     }
4777
4778     len = 0;
4779     if (RequestedInformation & OWNER_SECURITY_INFORMATION)
4780         if (!DumpOwner(SecurityDescriptor, NULL, &len))
4781             return FALSE;
4782     if (RequestedInformation & GROUP_SECURITY_INFORMATION)
4783         if (!DumpGroup(SecurityDescriptor, NULL, &len))
4784             return FALSE;
4785     if (RequestedInformation & DACL_SECURITY_INFORMATION)
4786         if (!DumpDacl(SecurityDescriptor, NULL, &len))
4787             return FALSE;
4788     if (RequestedInformation & SACL_SECURITY_INFORMATION)
4789         if (!DumpSacl(SecurityDescriptor, NULL, &len))
4790             return FALSE;
4791
4792     wstr = wptr = LocalAlloc(0, (len + 1)*sizeof(WCHAR));
4793     if (RequestedInformation & OWNER_SECURITY_INFORMATION)
4794         if (!DumpOwner(SecurityDescriptor, &wptr, NULL))
4795             return FALSE;
4796     if (RequestedInformation & GROUP_SECURITY_INFORMATION)
4797         if (!DumpGroup(SecurityDescriptor, &wptr, NULL))
4798             return FALSE;
4799     if (RequestedInformation & DACL_SECURITY_INFORMATION)
4800         if (!DumpDacl(SecurityDescriptor, &wptr, NULL))
4801             return FALSE;
4802     if (RequestedInformation & SACL_SECURITY_INFORMATION)
4803         if (!DumpSacl(SecurityDescriptor, &wptr, NULL))
4804             return FALSE;
4805     *wptr = 0;
4806
4807     TRACE("ret: %s, %d\n", wine_dbgstr_w(wstr), len);
4808     *OutputString = wstr;
4809     if (OutputLen)
4810         *OutputLen = strlenW(*OutputString)+1;
4811     return TRUE;
4812 }
4813
4814 /******************************************************************************
4815  * ConvertSecurityDescriptorToStringSecurityDescriptorA [ADVAPI32.@]
4816  */
4817 BOOL WINAPI ConvertSecurityDescriptorToStringSecurityDescriptorA(PSECURITY_DESCRIPTOR SecurityDescriptor, DWORD SDRevision, SECURITY_INFORMATION Information, LPSTR *OutputString, PULONG OutputLen)
4818 {
4819     LPWSTR wstr;
4820     ULONG len;
4821     if (ConvertSecurityDescriptorToStringSecurityDescriptorW(SecurityDescriptor, SDRevision, Information, &wstr, &len))
4822     {
4823         int lenA;
4824
4825         lenA = WideCharToMultiByte(CP_ACP, 0, wstr, len, NULL, 0, NULL, NULL);
4826         *OutputString = HeapAlloc(GetProcessHeap(), 0, lenA);
4827         WideCharToMultiByte(CP_ACP, 0, wstr, len, *OutputString, lenA, NULL, NULL);
4828         LocalFree(wstr);
4829
4830         if (OutputLen != NULL)
4831             *OutputLen = lenA;
4832         return TRUE;
4833     }
4834     else
4835     {
4836         *OutputString = NULL;
4837         if (OutputLen)
4838             *OutputLen = 0;
4839         return FALSE;
4840     }
4841 }
4842
4843 /******************************************************************************
4844  * ConvertStringSidToSidW [ADVAPI32.@]
4845  */
4846 BOOL WINAPI ConvertStringSidToSidW(LPCWSTR StringSid, PSID* Sid)
4847 {
4848     BOOL bret = FALSE;
4849     DWORD cBytes;
4850
4851     TRACE("%s, %p\n", debugstr_w(StringSid), Sid);
4852     if (GetVersion() & 0x80000000)
4853         SetLastError(ERROR_CALL_NOT_IMPLEMENTED);
4854     else if (!StringSid || !Sid)
4855         SetLastError(ERROR_INVALID_PARAMETER);
4856     else if (ParseStringSidToSid(StringSid, NULL, &cBytes))
4857     {
4858         PSID pSid = *Sid = LocalAlloc(0, cBytes);
4859
4860         bret = ParseStringSidToSid(StringSid, pSid, &cBytes);
4861         if (!bret)
4862             LocalFree(*Sid); 
4863     }
4864     return bret;
4865 }
4866
4867 /******************************************************************************
4868  * ConvertStringSidToSidA [ADVAPI32.@]
4869  */
4870 BOOL WINAPI ConvertStringSidToSidA(LPCSTR StringSid, PSID* Sid)
4871 {
4872     BOOL bret = FALSE;
4873
4874     TRACE("%s, %p\n", debugstr_a(StringSid), Sid);
4875     if (GetVersion() & 0x80000000)
4876         SetLastError(ERROR_CALL_NOT_IMPLEMENTED);
4877     else if (!StringSid || !Sid)
4878         SetLastError(ERROR_INVALID_PARAMETER);
4879     else
4880     {
4881         UINT len = MultiByteToWideChar(CP_ACP, 0, StringSid, -1, NULL, 0);
4882         LPWSTR wStringSid = HeapAlloc(GetProcessHeap(), 0,
4883          len * sizeof(WCHAR));
4884
4885         MultiByteToWideChar(CP_ACP, 0, StringSid, -1, wStringSid, len);
4886         bret = ConvertStringSidToSidW(wStringSid, Sid);
4887         HeapFree(GetProcessHeap(), 0, wStringSid);
4888     }
4889     return bret;
4890 }
4891
4892 /******************************************************************************
4893  * ConvertSidToStringSidW [ADVAPI32.@]
4894  *
4895  *  format of SID string is:
4896  *    S-<count>-<auth>-<subauth1>-<subauth2>-<subauth3>...
4897  *  where
4898  *    <rev> is the revision of the SID encoded as decimal
4899  *    <auth> is the identifier authority encoded as hex
4900  *    <subauthN> is the subauthority id encoded as decimal
4901  */
4902 BOOL WINAPI ConvertSidToStringSidW( PSID pSid, LPWSTR *pstr )
4903 {
4904     DWORD len = 0;
4905     LPWSTR wstr, wptr;
4906
4907     TRACE("%p %p\n", pSid, pstr );
4908
4909     len = 0;
4910     if (!DumpSidNumeric(pSid, NULL, &len))
4911         return FALSE;
4912     wstr = wptr = LocalAlloc(0, (len+1) * sizeof(WCHAR));
4913     DumpSidNumeric(pSid, &wptr, NULL);
4914     *wptr = 0;
4915
4916     *pstr = wstr;
4917     return TRUE;
4918 }
4919
4920 /******************************************************************************
4921  * ConvertSidToStringSidA [ADVAPI32.@]
4922  */
4923 BOOL WINAPI ConvertSidToStringSidA(PSID pSid, LPSTR *pstr)
4924 {
4925     LPWSTR wstr = NULL;
4926     LPSTR str;
4927     UINT len;
4928
4929     TRACE("%p %p\n", pSid, pstr );
4930
4931     if( !ConvertSidToStringSidW( pSid, &wstr ) )
4932         return FALSE;
4933
4934     len = WideCharToMultiByte( CP_ACP, 0, wstr, -1, NULL, 0, NULL, NULL );
4935     str = LocalAlloc( 0, len );
4936     WideCharToMultiByte( CP_ACP, 0, wstr, -1, str, len, NULL, NULL );
4937     LocalFree( wstr );
4938
4939     *pstr = str;
4940
4941     return TRUE;
4942 }
4943
4944 BOOL WINAPI ConvertToAutoInheritPrivateObjectSecurity(
4945         PSECURITY_DESCRIPTOR pdesc,
4946         PSECURITY_DESCRIPTOR cdesc,
4947         PSECURITY_DESCRIPTOR* ndesc,
4948         GUID* objtype,
4949         BOOL isdir,
4950         PGENERIC_MAPPING genmap )
4951 {
4952     FIXME("%p %p %p %p %d %p - stub\n", pdesc, cdesc, ndesc, objtype, isdir, genmap);
4953
4954     return FALSE;
4955 }
4956
4957 BOOL WINAPI CreatePrivateObjectSecurity(
4958         PSECURITY_DESCRIPTOR ParentDescriptor,
4959         PSECURITY_DESCRIPTOR CreatorDescriptor,
4960         PSECURITY_DESCRIPTOR* NewDescriptor,
4961         BOOL IsDirectoryObject,
4962         HANDLE Token,
4963         PGENERIC_MAPPING GenericMapping )
4964 {
4965     FIXME("%p %p %p %d %p %p - stub\n", ParentDescriptor, CreatorDescriptor,
4966           NewDescriptor, IsDirectoryObject, Token, GenericMapping);
4967
4968     return FALSE;
4969 }
4970
4971 BOOL WINAPI DestroyPrivateObjectSecurity( PSECURITY_DESCRIPTOR* ObjectDescriptor )
4972 {
4973     FIXME("%p - stub\n", ObjectDescriptor);
4974
4975     return TRUE;
4976 }
4977
4978 BOOL WINAPI CreateProcessAsUserA(
4979         HANDLE hToken,
4980         LPCSTR lpApplicationName,
4981         LPSTR lpCommandLine,
4982         LPSECURITY_ATTRIBUTES lpProcessAttributes,
4983         LPSECURITY_ATTRIBUTES lpThreadAttributes,
4984         BOOL bInheritHandles,
4985         DWORD dwCreationFlags,
4986         LPVOID lpEnvironment,
4987         LPCSTR lpCurrentDirectory,
4988         LPSTARTUPINFOA lpStartupInfo,
4989         LPPROCESS_INFORMATION lpProcessInformation )
4990 {
4991     FIXME("%p %s %s %p %p %d 0x%08x %p %s %p %p - stub\n", hToken, debugstr_a(lpApplicationName),
4992           debugstr_a(lpCommandLine), lpProcessAttributes, lpThreadAttributes, bInheritHandles,
4993           dwCreationFlags, lpEnvironment, debugstr_a(lpCurrentDirectory), lpStartupInfo, lpProcessInformation);
4994
4995     return FALSE;
4996 }
4997
4998 BOOL WINAPI CreateProcessAsUserW(
4999         HANDLE hToken,
5000         LPCWSTR lpApplicationName,
5001         LPWSTR lpCommandLine,
5002         LPSECURITY_ATTRIBUTES lpProcessAttributes,
5003         LPSECURITY_ATTRIBUTES lpThreadAttributes,
5004         BOOL bInheritHandles,
5005         DWORD dwCreationFlags,
5006         LPVOID lpEnvironment,
5007         LPCWSTR lpCurrentDirectory,
5008         LPSTARTUPINFOW lpStartupInfo,
5009         LPPROCESS_INFORMATION lpProcessInformation )
5010 {
5011     FIXME("%p %s %s %p %p %d 0x%08x %p %s %p %p - semi- stub\n", hToken, 
5012           debugstr_w(lpApplicationName), debugstr_w(lpCommandLine), lpProcessAttributes,
5013           lpThreadAttributes, bInheritHandles, dwCreationFlags, lpEnvironment, 
5014           debugstr_w(lpCurrentDirectory), lpStartupInfo, lpProcessInformation);
5015
5016     /* We should create the process with a suspended main thread */
5017     if (!CreateProcessW (lpApplicationName,
5018                          lpCommandLine,
5019                          lpProcessAttributes,
5020                          lpThreadAttributes,
5021                          bInheritHandles,
5022                          dwCreationFlags, /* CREATE_SUSPENDED */
5023                          lpEnvironment,
5024                          lpCurrentDirectory,
5025                          lpStartupInfo,
5026                          lpProcessInformation))
5027     {
5028       return FALSE;
5029     }
5030
5031     return TRUE;
5032 }
5033
5034 /******************************************************************************
5035  * CreateProcessWithLogonW
5036  */
5037 BOOL WINAPI CreateProcessWithLogonW( LPCWSTR lpUsername, LPCWSTR lpDomain, LPCWSTR lpPassword, DWORD dwLogonFlags,
5038     LPCWSTR lpApplicationName, LPWSTR lpCommandLine, DWORD dwCreationFlags, LPVOID lpEnvironment,
5039     LPCWSTR lpCurrentDirectory, LPSTARTUPINFOW lpStartupInfo, LPPROCESS_INFORMATION lpProcessInformation )
5040 {
5041     FIXME("%s %s %s 0x%08x %s %s 0x%08x %p %s %p %p stub\n", debugstr_w(lpUsername), debugstr_w(lpDomain),
5042     debugstr_w(lpPassword), dwLogonFlags, debugstr_w(lpApplicationName),
5043     debugstr_w(lpCommandLine), dwCreationFlags, lpEnvironment, debugstr_w(lpCurrentDirectory),
5044     lpStartupInfo, lpProcessInformation);
5045
5046     return FALSE;
5047 }
5048
5049 /******************************************************************************
5050  * DuplicateTokenEx [ADVAPI32.@]
5051  */
5052 BOOL WINAPI DuplicateTokenEx(
5053         HANDLE ExistingTokenHandle, DWORD dwDesiredAccess,
5054         LPSECURITY_ATTRIBUTES lpTokenAttributes,
5055         SECURITY_IMPERSONATION_LEVEL ImpersonationLevel,
5056         TOKEN_TYPE TokenType,
5057         PHANDLE DuplicateTokenHandle )
5058 {
5059     OBJECT_ATTRIBUTES ObjectAttributes;
5060
5061     TRACE("%p 0x%08x 0x%08x 0x%08x %p\n", ExistingTokenHandle, dwDesiredAccess,
5062           ImpersonationLevel, TokenType, DuplicateTokenHandle);
5063
5064     InitializeObjectAttributes(
5065         &ObjectAttributes,
5066         NULL,
5067         (lpTokenAttributes && lpTokenAttributes->bInheritHandle) ? OBJ_INHERIT : 0,
5068         NULL,
5069         lpTokenAttributes ? lpTokenAttributes->lpSecurityDescriptor : NULL );
5070
5071     return set_ntstatus( NtDuplicateToken( ExistingTokenHandle,
5072                                            dwDesiredAccess,
5073                                            &ObjectAttributes,
5074                                            ImpersonationLevel,
5075                                            TokenType,
5076                                            DuplicateTokenHandle ) );
5077 }
5078
5079 BOOL WINAPI DuplicateToken(
5080         HANDLE ExistingTokenHandle,
5081         SECURITY_IMPERSONATION_LEVEL ImpersonationLevel,
5082         PHANDLE DuplicateTokenHandle )
5083 {
5084     return DuplicateTokenEx( ExistingTokenHandle, TOKEN_IMPERSONATE | TOKEN_QUERY,
5085                              NULL, ImpersonationLevel, TokenImpersonation,
5086                              DuplicateTokenHandle );
5087 }
5088
5089 /******************************************************************************
5090  * ComputeStringSidSize
5091  */
5092 static DWORD ComputeStringSidSize(LPCWSTR StringSid)
5093 {
5094     if (StringSid[0] == 'S' && StringSid[1] == '-') /* S-R-I(-S)+ */
5095     {
5096         int ctok = 0;
5097         while (*StringSid)
5098         {
5099             if (*StringSid == '-')
5100                 ctok++;
5101             StringSid++;
5102         }
5103
5104         if (ctok >= 3)
5105             return GetSidLengthRequired(ctok - 2);
5106     }
5107     else /* String constant format  - Only available in winxp and above */
5108     {
5109         unsigned int i;
5110
5111         for (i = 0; i < sizeof(WellKnownSids)/sizeof(WellKnownSids[0]); i++)
5112             if (!strncmpW(WellKnownSids[i].wstr, StringSid, 2))
5113                 return GetSidLengthRequired(WellKnownSids[i].Sid.SubAuthorityCount);
5114     }
5115
5116     return GetSidLengthRequired(0);
5117 }
5118
5119 /******************************************************************************
5120  * ParseStringSidToSid
5121  */
5122 static BOOL ParseStringSidToSid(LPCWSTR StringSid, PSID pSid, LPDWORD cBytes)
5123 {
5124     BOOL bret = FALSE;
5125     SID* pisid=pSid;
5126
5127     TRACE("%s, %p, %p\n", debugstr_w(StringSid), pSid, cBytes);
5128     if (!StringSid)
5129     {
5130         SetLastError(ERROR_INVALID_PARAMETER);
5131         TRACE("StringSid is NULL, returning FALSE\n");
5132         return FALSE;
5133     }
5134
5135     while (*StringSid == ' ')
5136         StringSid++;
5137
5138     *cBytes = ComputeStringSidSize(StringSid);
5139     if (!pisid) /* Simply compute the size */
5140     {
5141         TRACE("only size requested, returning TRUE\n");
5142         return TRUE;
5143     }
5144
5145     if (StringSid[0] == 'S' && StringSid[1] == '-') /* S-R-I-S-S */
5146     {
5147         DWORD i = 0, identAuth;
5148         DWORD csubauth = ((*cBytes - GetSidLengthRequired(0)) / sizeof(DWORD));
5149
5150         StringSid += 2; /* Advance to Revision */
5151         pisid->Revision = atoiW(StringSid);
5152
5153         if (pisid->Revision != SDDL_REVISION)
5154         {
5155             TRACE("Revision %d is unknown\n", pisid->Revision);
5156             goto lend; /* ERROR_INVALID_SID */
5157         }
5158         if (csubauth == 0)
5159         {
5160             TRACE("SubAuthorityCount is 0\n");
5161             goto lend; /* ERROR_INVALID_SID */
5162         }
5163
5164         pisid->SubAuthorityCount = csubauth;
5165
5166         /* Advance to identifier authority */
5167         while (*StringSid && *StringSid != '-')
5168             StringSid++;
5169         if (*StringSid == '-')
5170             StringSid++;
5171
5172         /* MS' implementation can't handle values greater than 2^32 - 1, so
5173          * we don't either; assume most significant bytes are always 0
5174          */
5175         pisid->IdentifierAuthority.Value[0] = 0;
5176         pisid->IdentifierAuthority.Value[1] = 0;
5177         identAuth = atoiW(StringSid);
5178         pisid->IdentifierAuthority.Value[5] = identAuth & 0xff;
5179         pisid->IdentifierAuthority.Value[4] = (identAuth & 0xff00) >> 8;
5180         pisid->IdentifierAuthority.Value[3] = (identAuth & 0xff0000) >> 16;
5181         pisid->IdentifierAuthority.Value[2] = (identAuth & 0xff000000) >> 24;
5182
5183         /* Advance to first sub authority */
5184         while (*StringSid && *StringSid != '-')
5185             StringSid++;
5186         if (*StringSid == '-')
5187             StringSid++;
5188
5189         while (*StringSid)
5190         {
5191             pisid->SubAuthority[i++] = atoiW(StringSid);
5192
5193             while (*StringSid && *StringSid != '-')
5194                 StringSid++;
5195             if (*StringSid == '-')
5196                 StringSid++;
5197         }
5198
5199         if (i != pisid->SubAuthorityCount)
5200             goto lend; /* ERROR_INVALID_SID */
5201
5202         bret = TRUE;
5203     }
5204     else /* String constant format  - Only available in winxp and above */
5205     {
5206         unsigned int i;
5207         pisid->Revision = SDDL_REVISION;
5208
5209         for (i = 0; i < sizeof(WellKnownSids)/sizeof(WellKnownSids[0]); i++)
5210             if (!strncmpW(WellKnownSids[i].wstr, StringSid, 2))
5211             {
5212                 DWORD j;
5213                 pisid->SubAuthorityCount = WellKnownSids[i].Sid.SubAuthorityCount;
5214                 pisid->IdentifierAuthority = WellKnownSids[i].Sid.IdentifierAuthority;
5215                 for (j = 0; j < WellKnownSids[i].Sid.SubAuthorityCount; j++)
5216                     pisid->SubAuthority[j] = WellKnownSids[i].Sid.SubAuthority[j];
5217                 bret = TRUE;
5218             }
5219
5220         if (!bret)
5221             FIXME("String constant not supported: %s\n", debugstr_wn(StringSid, 2));
5222     }
5223
5224 lend:
5225     if (!bret)
5226         SetLastError(ERROR_INVALID_SID);
5227
5228     TRACE("returning %s\n", bret ? "TRUE" : "FALSE");
5229     return bret;
5230 }
5231
5232 /******************************************************************************
5233  * GetNamedSecurityInfoA [ADVAPI32.@]
5234  */
5235 DWORD WINAPI GetNamedSecurityInfoA(LPSTR pObjectName,
5236         SE_OBJECT_TYPE ObjectType, SECURITY_INFORMATION SecurityInfo,
5237         PSID* ppsidOwner, PSID* ppsidGroup, PACL* ppDacl, PACL* ppSacl,
5238         PSECURITY_DESCRIPTOR* ppSecurityDescriptor)
5239 {
5240     DWORD len;
5241     LPWSTR wstr = NULL;
5242     DWORD r;
5243
5244     TRACE("%s %d %d %p %p %p %p %p\n", pObjectName, ObjectType, SecurityInfo,
5245         ppsidOwner, ppsidGroup, ppDacl, ppSacl, ppSecurityDescriptor);
5246
5247     if( pObjectName )
5248     {
5249         len = MultiByteToWideChar( CP_ACP, 0, pObjectName, -1, NULL, 0 );
5250         wstr = HeapAlloc( GetProcessHeap(), 0, len*sizeof(WCHAR));
5251         MultiByteToWideChar( CP_ACP, 0, pObjectName, -1, wstr, len );
5252     }
5253
5254     r = GetNamedSecurityInfoW( wstr, ObjectType, SecurityInfo, ppsidOwner,
5255                            ppsidGroup, ppDacl, ppSacl, ppSecurityDescriptor );
5256
5257     HeapFree( GetProcessHeap(), 0, wstr );
5258
5259     return r;
5260 }
5261
5262 /******************************************************************************
5263  * GetNamedSecurityInfoW [ADVAPI32.@]
5264  */
5265 DWORD WINAPI GetNamedSecurityInfoW( LPWSTR name, SE_OBJECT_TYPE type,
5266     SECURITY_INFORMATION info, PSID* owner, PSID* group, PACL* dacl,
5267     PACL* sacl, PSECURITY_DESCRIPTOR* descriptor )
5268 {
5269     DWORD needed, offset;
5270     SECURITY_DESCRIPTOR_RELATIVE *relative;
5271     BYTE *buffer;
5272
5273     TRACE( "%s %d %d %p %p %p %p %p\n", debugstr_w(name), type, info, owner,
5274            group, dacl, sacl, descriptor );
5275
5276     if (!name || !descriptor) return ERROR_INVALID_PARAMETER;
5277
5278     needed = sizeof(SECURITY_DESCRIPTOR_RELATIVE);
5279     if (info & OWNER_SECURITY_INFORMATION)
5280         needed += sizeof(sidWorld);
5281     if (info & GROUP_SECURITY_INFORMATION)
5282         needed += sizeof(sidWorld);
5283     if (info & DACL_SECURITY_INFORMATION)
5284         needed += WINE_SIZE_OF_WORLD_ACCESS_ACL;
5285     if (info & SACL_SECURITY_INFORMATION)
5286         needed += WINE_SIZE_OF_WORLD_ACCESS_ACL;
5287
5288     /* must be freed by caller */
5289     *descriptor = HeapAlloc( GetProcessHeap(), 0, needed );
5290     if (!*descriptor) return ERROR_NOT_ENOUGH_MEMORY;
5291
5292     if (!InitializeSecurityDescriptor( *descriptor, SECURITY_DESCRIPTOR_REVISION ))
5293     {
5294         HeapFree( GetProcessHeap(), 0, *descriptor );
5295         return ERROR_INVALID_SECURITY_DESCR;
5296     }
5297
5298     relative = *descriptor;
5299     relative->Control |= SE_SELF_RELATIVE;
5300     buffer = (BYTE *)relative;
5301     offset = sizeof(SECURITY_DESCRIPTOR_RELATIVE);
5302
5303     if (info & OWNER_SECURITY_INFORMATION)
5304     {
5305         memcpy( buffer + offset, &sidWorld, sizeof(sidWorld) );
5306         relative->Owner = offset;
5307         if (owner)
5308             *owner = buffer + offset;
5309         offset += sizeof(sidWorld);
5310     }
5311     if (info & GROUP_SECURITY_INFORMATION)
5312     {
5313         memcpy( buffer + offset, &sidWorld, sizeof(sidWorld) );
5314         relative->Group = offset;
5315         if (group)
5316             *group = buffer + offset;
5317         offset += sizeof(sidWorld);
5318     }
5319     if (info & DACL_SECURITY_INFORMATION)
5320     {
5321         relative->Control |= SE_DACL_PRESENT;
5322         GetWorldAccessACL( (PACL)(buffer + offset) );
5323         relative->Dacl = offset;
5324         if (dacl)
5325             *dacl = (PACL)(buffer + offset);
5326         offset += WINE_SIZE_OF_WORLD_ACCESS_ACL;
5327     }
5328     if (info & SACL_SECURITY_INFORMATION)
5329     {
5330         relative->Control |= SE_SACL_PRESENT;
5331         GetWorldAccessACL( (PACL)(buffer + offset) );
5332         relative->Sacl = offset;
5333         if (sacl)
5334             *sacl = (PACL)(buffer + offset);
5335     }
5336     return ERROR_SUCCESS;
5337 }
5338
5339 /******************************************************************************
5340  * DecryptFileW [ADVAPI32.@]
5341  */
5342 BOOL WINAPI DecryptFileW(LPCWSTR lpFileName, DWORD dwReserved)
5343 {
5344     FIXME("%s %08x\n", debugstr_w(lpFileName), dwReserved);
5345     return TRUE;
5346 }
5347
5348 /******************************************************************************
5349  * DecryptFileA [ADVAPI32.@]
5350  */
5351 BOOL WINAPI DecryptFileA(LPCSTR lpFileName, DWORD dwReserved)
5352 {
5353     FIXME("%s %08x\n", debugstr_a(lpFileName), dwReserved);
5354     return TRUE;
5355 }
5356
5357 /******************************************************************************
5358  * EncryptFileW [ADVAPI32.@]
5359  */
5360 BOOL WINAPI EncryptFileW(LPCWSTR lpFileName)
5361 {
5362     FIXME("%s\n", debugstr_w(lpFileName));
5363     return TRUE;
5364 }
5365
5366 /******************************************************************************
5367  * EncryptFileA [ADVAPI32.@]
5368  */
5369 BOOL WINAPI EncryptFileA(LPCSTR lpFileName)
5370 {
5371     FIXME("%s\n", debugstr_a(lpFileName));
5372     return TRUE;
5373 }
5374
5375 /******************************************************************************
5376  * FileEncryptionStatusW [ADVAPI32.@]
5377  */
5378 BOOL WINAPI FileEncryptionStatusW(LPCWSTR lpFileName, LPDWORD lpStatus)
5379 {
5380     FIXME("(%s %p): stub\n", debugstr_w(lpFileName), lpStatus);
5381     if (!lpStatus)
5382         return FALSE;
5383     *lpStatus = FILE_SYSTEM_NOT_SUPPORT;
5384     return TRUE;
5385 }
5386
5387 /******************************************************************************
5388  * FileEncryptionStatusA [ADVAPI32.@]
5389  */
5390 BOOL WINAPI FileEncryptionStatusA(LPCSTR lpFileName, LPDWORD lpStatus)
5391 {
5392     FIXME("(%s %p): stub\n", debugstr_a(lpFileName), lpStatus);
5393     if (!lpStatus)
5394         return FALSE;
5395     *lpStatus = FILE_SYSTEM_NOT_SUPPORT;
5396     return TRUE;
5397 }
5398
5399 /******************************************************************************
5400  * SetSecurityInfo [ADVAPI32.@]
5401  */
5402 DWORD WINAPI SetSecurityInfo(HANDLE handle, SE_OBJECT_TYPE ObjectType, 
5403                       SECURITY_INFORMATION SecurityInfo, PSID psidOwner,
5404                       PSID psidGroup, PACL pDacl, PACL pSacl) {
5405     FIXME("stub\n");
5406     return ERROR_SUCCESS;
5407 }
5408
5409 /******************************************************************************
5410  * SaferCreateLevel   [ADVAPI32.@]
5411  */
5412 BOOL WINAPI SaferCreateLevel(DWORD ScopeId, DWORD LevelId, DWORD OpenFlags,
5413                              SAFER_LEVEL_HANDLE* LevelHandle, LPVOID lpReserved)
5414 {
5415     FIXME("(%u, %x, %u, %p, %p) stub\n", ScopeId, LevelId, OpenFlags, LevelHandle, lpReserved);
5416     return FALSE;
5417 }
5418
5419 DWORD WINAPI TreeResetNamedSecurityInfoW( LPWSTR pObjectName,
5420                 SE_OBJECT_TYPE ObjectType, SECURITY_INFORMATION SecurityInfo,
5421                 PSID pOwner, PSID pGroup, PACL pDacl, PACL pSacl,
5422                 BOOL KeepExplicit, FN_PROGRESS fnProgress,
5423                 PROG_INVOKE_SETTING ProgressInvokeSetting, PVOID Args)
5424 {
5425     FIXME("(%s, %i, %i, %p, %p, %p, %p, %i, %p, %i, %p  Stub\n",
5426         debugstr_w(pObjectName), ObjectType, SecurityInfo, pOwner, pGroup,
5427         pDacl, pSacl, KeepExplicit, fnProgress, ProgressInvokeSetting, Args);
5428
5429     return ERROR_SUCCESS;
5430 }
5431
5432 /******************************************************************************
5433  * SaferGetPolicyInformation   [ADVAPI32.@]
5434  */
5435 BOOL WINAPI SaferGetPolicyInformation(DWORD scope, SAFER_POLICY_INFO_CLASS class, DWORD size,
5436                                       PVOID buffer, PDWORD required, LPVOID lpReserved)
5437 {
5438     FIXME("(%u %u %u %p %p %p) stub\n", scope, class, size, buffer, required, lpReserved);
5439     return FALSE;
5440 }