advapi32: Implement SetEntriesInAclA by calling SetEntriesInAclW.
[wine] / dlls / advapi32 / security.c
1 /*
2  * Copyright 1999, 2000 Juergen Schmied <juergen.schmied@debitel.net>
3  * Copyright 2003 CodeWeavers Inc. (Ulrich Czekalla)
4  * Copyright 2006 Robert Reif
5  *
6  * This library is free software; you can redistribute it and/or
7  * modify it under the terms of the GNU Lesser General Public
8  * License as published by the Free Software Foundation; either
9  * version 2.1 of the License, or (at your option) any later version.
10  *
11  * This library is distributed in the hope that it will be useful,
12  * but WITHOUT ANY WARRANTY; without even the implied warranty of
13  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
14  * Lesser General Public License for more details.
15  *
16  * You should have received a copy of the GNU Lesser General Public
17  * License along with this library; if not, write to the Free Software
18  * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
19  *
20  */
21
22 #include <stdarg.h>
23 #include <string.h>
24
25 #include "ntstatus.h"
26 #define WIN32_NO_STATUS
27 #include "windef.h"
28 #include "winbase.h"
29 #include "winerror.h"
30 #include "winreg.h"
31 #include "winsafer.h"
32 #include "winternl.h"
33 #include "winioctl.h"
34 #include "ntsecapi.h"
35 #include "accctrl.h"
36 #include "sddl.h"
37 #include "winsvc.h"
38 #include "aclapi.h"
39 #include "objbase.h"
40 #include "iads.h"
41 #include "advapi32_misc.h"
42 #include "lmcons.h"
43
44 #include "wine/debug.h"
45 #include "wine/unicode.h"
46
47 WINE_DEFAULT_DEBUG_CHANNEL(advapi);
48
49 static BOOL ParseStringSidToSid(LPCWSTR StringSid, PSID pSid, LPDWORD cBytes);
50 static BOOL ParseStringAclToAcl(LPCWSTR StringAcl, LPDWORD lpdwFlags, 
51     PACL pAcl, LPDWORD cBytes);
52 static BYTE ParseAceStringFlags(LPCWSTR* StringAcl);
53 static BYTE ParseAceStringType(LPCWSTR* StringAcl);
54 static DWORD ParseAceStringRights(LPCWSTR* StringAcl);
55 static BOOL ParseStringSecurityDescriptorToSecurityDescriptor(
56     LPCWSTR StringSecurityDescriptor,
57     SECURITY_DESCRIPTOR_RELATIVE* SecurityDescriptor,
58     LPDWORD cBytes);
59 static DWORD ParseAclStringFlags(LPCWSTR* StringAcl);
60
61 typedef struct _ACEFLAG
62 {
63    LPCWSTR wstr;
64    DWORD value;
65 } ACEFLAG, *LPACEFLAG;
66
67 typedef struct _MAX_SID
68 {
69     /* same fields as struct _SID */
70     BYTE Revision;
71     BYTE SubAuthorityCount;
72     SID_IDENTIFIER_AUTHORITY IdentifierAuthority;
73     DWORD SubAuthority[SID_MAX_SUB_AUTHORITIES];
74 } MAX_SID;
75
76 typedef struct WELLKNOWNSID
77 {
78     WCHAR wstr[2];
79     WELL_KNOWN_SID_TYPE Type;
80     MAX_SID Sid;
81 } WELLKNOWNSID;
82
83 static const WELLKNOWNSID WellKnownSids[] =
84 {
85     { {0,0}, WinNullSid, { SID_REVISION, 1, { SECURITY_NULL_SID_AUTHORITY }, { SECURITY_NULL_RID } } },
86     { {'W','D'}, WinWorldSid, { SID_REVISION, 1, { SECURITY_WORLD_SID_AUTHORITY }, { SECURITY_WORLD_RID } } },
87     { {0,0}, WinLocalSid, { SID_REVISION, 1, { SECURITY_LOCAL_SID_AUTHORITY }, { SECURITY_LOCAL_RID } } },
88     { {'C','O'}, WinCreatorOwnerSid, { SID_REVISION, 1, { SECURITY_CREATOR_SID_AUTHORITY }, { SECURITY_CREATOR_OWNER_RID } } },
89     { {'C','G'}, WinCreatorGroupSid, { SID_REVISION, 1, { SECURITY_CREATOR_SID_AUTHORITY }, { SECURITY_CREATOR_GROUP_RID } } },
90     { {0,0}, WinCreatorOwnerServerSid, { SID_REVISION, 1, { SECURITY_CREATOR_SID_AUTHORITY }, { SECURITY_CREATOR_OWNER_SERVER_RID } } },
91     { {0,0}, WinCreatorGroupServerSid, { SID_REVISION, 1, { SECURITY_CREATOR_SID_AUTHORITY }, { SECURITY_CREATOR_GROUP_SERVER_RID } } },
92     { {0,0}, WinNtAuthoritySid, { SID_REVISION, 0, { SECURITY_NT_AUTHORITY }, { SECURITY_NULL_RID } } },
93     { {0,0}, WinDialupSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_DIALUP_RID } } },
94     { {'N','U'}, WinNetworkSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_NETWORK_RID } } },
95     { {0,0}, WinBatchSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_BATCH_RID } } },
96     { {'I','U'}, WinInteractiveSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_INTERACTIVE_RID } } },
97     { {'S','U'}, WinServiceSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_SERVICE_RID } } },
98     { {'A','N'}, WinAnonymousSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_ANONYMOUS_LOGON_RID } } },
99     { {0,0}, WinProxySid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_PROXY_RID } } },
100     { {'E','D'}, WinEnterpriseControllersSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_ENTERPRISE_CONTROLLERS_RID } } },
101     { {'P','S'}, WinSelfSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_PRINCIPAL_SELF_RID } } },
102     { {'A','U'}, WinAuthenticatedUserSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_AUTHENTICATED_USER_RID } } },
103     { {'R','C'}, WinRestrictedCodeSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_RESTRICTED_CODE_RID } } },
104     { {0,0}, WinTerminalServerSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_TERMINAL_SERVER_RID } } },
105     { {0,0}, WinRemoteLogonIdSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_REMOTE_LOGON_RID } } },
106     { {'S','Y'}, WinLocalSystemSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_LOCAL_SYSTEM_RID } } },
107     { {'L','S'}, WinLocalServiceSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_LOCAL_SERVICE_RID } } },
108     { {'N','S'}, WinNetworkServiceSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_NETWORK_SERVICE_RID } } },
109     { {0,0}, WinBuiltinDomainSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID } } },
110     { {'B','A'}, WinBuiltinAdministratorsSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_ADMINS } } },
111     { {'B','U'}, WinBuiltinUsersSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_USERS } } },
112     { {'B','G'}, WinBuiltinGuestsSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_GUESTS } } },
113     { {'P','U'}, WinBuiltinPowerUsersSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_POWER_USERS } } },
114     { {'A','O'}, WinBuiltinAccountOperatorsSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_ACCOUNT_OPS } } },
115     { {'S','O'}, WinBuiltinSystemOperatorsSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_SYSTEM_OPS } } },
116     { {'P','O'}, WinBuiltinPrintOperatorsSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_PRINT_OPS } } },
117     { {'B','O'}, WinBuiltinBackupOperatorsSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_BACKUP_OPS } } },
118     { {'R','E'}, WinBuiltinReplicatorSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_REPLICATOR } } },
119     { {'R','U'}, WinBuiltinPreWindows2000CompatibleAccessSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_PREW2KCOMPACCESS } } },
120     { {'R','D'}, WinBuiltinRemoteDesktopUsersSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_REMOTE_DESKTOP_USERS } } },
121     { {'N','O'}, WinBuiltinNetworkConfigurationOperatorsSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_NETWORK_CONFIGURATION_OPS } } },
122     { {0,0}, WinNTLMAuthenticationSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_PACKAGE_BASE_RID, SECURITY_PACKAGE_NTLM_RID } } },
123     { {0,0}, WinDigestAuthenticationSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_PACKAGE_BASE_RID, SECURITY_PACKAGE_DIGEST_RID } } },
124     { {0,0}, WinSChannelAuthenticationSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_PACKAGE_BASE_RID, SECURITY_PACKAGE_SCHANNEL_RID } } },
125     { {0,0}, WinThisOrganizationSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_THIS_ORGANIZATION_RID } } },
126     { {0,0}, WinOtherOrganizationSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_OTHER_ORGANIZATION_RID } } },
127     { {0,0}, WinBuiltinIncomingForestTrustBuildersSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_INCOMING_FOREST_TRUST_BUILDERS  } } },
128     { {0,0}, WinBuiltinPerfMonitoringUsersSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_MONITORING_USERS } } },
129     { {0,0}, WinBuiltinPerfLoggingUsersSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_LOGGING_USERS } } },
130     { {0,0}, WinBuiltinAuthorizationAccessSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_AUTHORIZATIONACCESS } } },
131     { {0,0}, WinBuiltinTerminalServerLicenseServersSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_TS_LICENSE_SERVERS } } },
132     { {0,0}, WinBuiltinDCOMUsersSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_DCOM_USERS } } },
133     { {'L','W'}, WinLowLabelSid, { SID_REVISION, 1, { SECURITY_MANDATORY_LABEL_AUTHORITY}, { SECURITY_MANDATORY_LOW_RID} } },
134     { {'M','E'}, WinMediumLabelSid, { SID_REVISION, 1, { SECURITY_MANDATORY_LABEL_AUTHORITY}, { SECURITY_MANDATORY_MEDIUM_RID } } },
135     { {'H','I'}, WinHighLabelSid, { SID_REVISION, 1, { SECURITY_MANDATORY_LABEL_AUTHORITY}, { SECURITY_MANDATORY_HIGH_RID } } },
136     { {'S','I'}, WinSystemLabelSid, { SID_REVISION, 1, { SECURITY_MANDATORY_LABEL_AUTHORITY}, { SECURITY_MANDATORY_SYSTEM_RID } } },
137 };
138
139 /* these SIDs must be constructed as relative to some domain - only the RID is well-known */
140 typedef struct WELLKNOWNRID
141 {
142     WELL_KNOWN_SID_TYPE Type;
143     DWORD Rid;
144 } WELLKNOWNRID;
145
146 static const WELLKNOWNRID WellKnownRids[] = {
147     { WinAccountAdministratorSid,    DOMAIN_USER_RID_ADMIN },
148     { WinAccountGuestSid,            DOMAIN_USER_RID_GUEST },
149     { WinAccountKrbtgtSid,           DOMAIN_USER_RID_KRBTGT },
150     { WinAccountDomainAdminsSid,     DOMAIN_GROUP_RID_ADMINS },
151     { WinAccountDomainUsersSid,      DOMAIN_GROUP_RID_USERS },
152     { WinAccountDomainGuestsSid,     DOMAIN_GROUP_RID_GUESTS },
153     { WinAccountComputersSid,        DOMAIN_GROUP_RID_COMPUTERS },
154     { WinAccountControllersSid,      DOMAIN_GROUP_RID_CONTROLLERS },
155     { WinAccountCertAdminsSid,       DOMAIN_GROUP_RID_CERT_ADMINS },
156     { WinAccountSchemaAdminsSid,     DOMAIN_GROUP_RID_SCHEMA_ADMINS },
157     { WinAccountEnterpriseAdminsSid, DOMAIN_GROUP_RID_ENTERPRISE_ADMINS },
158     { WinAccountPolicyAdminsSid,     DOMAIN_GROUP_RID_POLICY_ADMINS },
159     { WinAccountRasAndIasServersSid, DOMAIN_ALIAS_RID_RAS_SERVERS },
160 };
161
162
163 static SID const sidWorld = { SID_REVISION, 1, { SECURITY_WORLD_SID_AUTHORITY} , { SECURITY_WORLD_RID } };
164
165 typedef struct _AccountSid {
166     WELL_KNOWN_SID_TYPE type;
167     LPCWSTR account;
168     LPCWSTR domain;
169     SID_NAME_USE name_use;
170     LPCWSTR alias;
171 } AccountSid;
172
173 static const WCHAR Account_Operators[] = { 'A','c','c','o','u','n','t',' ','O','p','e','r','a','t','o','r','s',0 };
174 static const WCHAR Administrator[] = {'A','d','m','i','n','i','s','t','r','a','t','o','r',0 };
175 static const WCHAR Administrators[] = { 'A','d','m','i','n','i','s','t','r','a','t','o','r','s',0 };
176 static const WCHAR ANONYMOUS_LOGON[] = { 'A','N','O','N','Y','M','O','U','S',' ','L','O','G','O','N',0 };
177 static const WCHAR Authenticated_Users[] = { 'A','u','t','h','e','n','t','i','c','a','t','e','d',' ','U','s','e','r','s',0 };
178 static const WCHAR Backup_Operators[] = { 'B','a','c','k','u','p',' ','O','p','e','r','a','t','o','r','s',0 };
179 static const WCHAR BATCH[] = { 'B','A','T','C','H',0 };
180 static const WCHAR Blank[] = { 0 };
181 static const WCHAR BUILTIN[] = { 'B','U','I','L','T','I','N',0 };
182 static const WCHAR Cert_Publishers[] = { 'C','e','r','t',' ','P','u','b','l','i','s','h','e','r','s',0 };
183 static const WCHAR CREATOR_GROUP[] = { 'C','R','E','A','T','O','R',' ','G','R','O','U','P',0 };
184 static const WCHAR CREATOR_GROUP_SERVER[] = { 'C','R','E','A','T','O','R',' ','G','R','O','U','P',' ','S','E','R','V','E','R',0 };
185 static const WCHAR CREATOR_OWNER[] = { 'C','R','E','A','T','O','R',' ','O','W','N','E','R',0 };
186 static const WCHAR CREATOR_OWNER_SERVER[] = { 'C','R','E','A','T','O','R',' ','O','W','N','E','R',' ','S','E','R','V','E','R',0 };
187 static const WCHAR CURRENT_USER[] = { 'C','U','R','R','E','N','T','_','U','S','E','R',0 };
188 static const WCHAR DIALUP[] = { 'D','I','A','L','U','P',0 };
189 static const WCHAR Digest_Authentication[] = { 'D','i','g','e','s','t',' ','A','u','t','h','e','n','t','i','c','a','t','i','o','n',0 };
190 static const WCHAR DOMAIN[] = {'D','O','M','A','I','N',0};
191 static const WCHAR Domain_Admins[] = { 'D','o','m','a','i','n',' ','A','d','m','i','n','s',0 };
192 static const WCHAR Domain_Computers[] = { 'D','o','m','a','i','n',' ','C','o','m','p','u','t','e','r','s',0 };
193 static const WCHAR Domain_Controllers[] = { 'D','o','m','a','i','n',' ','C','o','n','t','r','o','l','l','e','r','s',0 };
194 static const WCHAR Domain_Guests[] = { 'D','o','m','a','i','n',' ','G','u','e','s','t','s',0 };
195 static const WCHAR Domain_Users[] = { 'D','o','m','a','i','n',' ','U','s','e','r','s',0 };
196 static const WCHAR Enterprise_Admins[] = { 'E','n','t','e','r','p','r','i','s','e',' ','A','d','m','i','n','s',0 };
197 static const WCHAR ENTERPRISE_DOMAIN_CONTROLLERS[] = { 'E','N','T','E','R','P','R','I','S','E',' ','D','O','M','A','I','N',' ','C','O','N','T','R','O','L','L','E','R','S',0 };
198 static const WCHAR Everyone[] = { 'E','v','e','r','y','o','n','e',0 };
199 static const WCHAR Group_Policy_Creator_Owners[] = { 'G','r','o','u','p',' ','P','o','l','i','c','y',' ','C','r','e','a','t','o','r',' ','O','w','n','e','r','s',0 };
200 static const WCHAR Guest[] = { 'G','u','e','s','t',0 };
201 static const WCHAR Guests[] = { 'G','u','e','s','t','s',0 };
202 static const WCHAR INTERACTIVE[] = { 'I','N','T','E','R','A','C','T','I','V','E',0 };
203 static const WCHAR LOCAL[] = { 'L','O','C','A','L',0 };
204 static const WCHAR LOCAL_SERVICE[] = { 'L','O','C','A','L',' ','S','E','R','V','I','C','E',0 };
205 static const WCHAR LOCAL_SERVICE2[] = { 'L','O','C','A','L','S','E','R','V','I','C','E',0 };
206 static const WCHAR NETWORK[] = { 'N','E','T','W','O','R','K',0 };
207 static const WCHAR Network_Configuration_Operators[] = { 'N','e','t','w','o','r','k',' ','C','o','n','f','i','g','u','r','a','t','i','o','n',' ','O','p','e','r','a','t','o','r','s',0 };
208 static const WCHAR NETWORK_SERVICE[] = { 'N','E','T','W','O','R','K',' ','S','E','R','V','I','C','E',0 };
209 static const WCHAR NETWORK_SERVICE2[] = { 'N','E','T','W','O','R','K','S','E','R','V','I','C','E',0 };
210 static const WCHAR NT_AUTHORITY[] = { 'N','T',' ','A','U','T','H','O','R','I','T','Y',0 };
211 static const WCHAR NT_Pseudo_Domain[] = { 'N','T',' ','P','s','e','u','d','o',' ','D','o','m','a','i','n',0 };
212 static const WCHAR NTML_Authentication[] = { 'N','T','M','L',' ','A','u','t','h','e','n','t','i','c','a','t','i','o','n',0 };
213 static const WCHAR NULL_SID[] = { 'N','U','L','L',' ','S','I','D',0 };
214 static const WCHAR Other_Organization[] = { 'O','t','h','e','r',' ','O','r','g','a','n','i','z','a','t','i','o','n',0 };
215 static const WCHAR Performance_Log_Users[] = { 'P','e','r','f','o','r','m','a','n','c','e',' ','L','o','g',' ','U','s','e','r','s',0 };
216 static const WCHAR Performance_Monitor_Users[] = { 'P','e','r','f','o','r','m','a','n','c','e',' ','M','o','n','i','t','o','r',' ','U','s','e','r','s',0 };
217 static const WCHAR Power_Users[] = { 'P','o','w','e','r',' ','U','s','e','r','s',0 };
218 static const WCHAR Pre_Windows_2000_Compatible_Access[] = { 'P','r','e','-','W','i','n','d','o','w','s',' ','2','0','0','0',' ','C','o','m','p','a','t','i','b','l','e',' ','A','c','c','e','s','s',0 };
219 static const WCHAR Print_Operators[] = { 'P','r','i','n','t',' ','O','p','e','r','a','t','o','r','s',0 };
220 static const WCHAR PROXY[] = { 'P','R','O','X','Y',0 };
221 static const WCHAR RAS_and_IAS_Servers[] = { 'R','A','S',' ','a','n','d',' ','I','A','S',' ','S','e','r','v','e','r','s',0 };
222 static const WCHAR Remote_Desktop_Users[] = { 'R','e','m','o','t','e',' ','D','e','s','k','t','o','p',' ','U','s','e','r','s',0 };
223 static const WCHAR REMOTE_INTERACTIVE_LOGON[] = { 'R','E','M','O','T','E',' ','I','N','T','E','R','A','C','T','I','V','E',' ','L','O','G','O','N',0 };
224 static const WCHAR Replicators[] = { 'R','e','p','l','i','c','a','t','o','r','s',0 };
225 static const WCHAR RESTRICTED[] = { 'R','E','S','T','R','I','C','T','E','D',0 };
226 static const WCHAR SChannel_Authentication[] = { 'S','C','h','a','n','n','e','l',' ','A','u','t','h','e','n','t','i','c','a','t','i','o','n',0 };
227 static const WCHAR Schema_Admins[] = { 'S','c','h','e','m','a',' ','A','d','m','i','n','s',0 };
228 static const WCHAR SELF[] = { 'S','E','L','F',0 };
229 static const WCHAR Server_Operators[] = { 'S','e','r','v','e','r',' ','O','p','e','r','a','t','o','r','s',0 };
230 static const WCHAR SERVICE[] = { 'S','E','R','V','I','C','E',0 };
231 static const WCHAR SYSTEM[] = { 'S','Y','S','T','E','M',0 };
232 static const WCHAR TERMINAL_SERVER_USER[] = { 'T','E','R','M','I','N','A','L',' ','S','E','R','V','E','R',' ','U','S','E','R',0 };
233 static const WCHAR This_Organization[] = { 'T','h','i','s',' ','O','r','g','a','n','i','z','a','t','i','o','n',0 };
234 static const WCHAR Users[] = { 'U','s','e','r','s',0 };
235
236 static const AccountSid ACCOUNT_SIDS[] = {
237     { WinNullSid, NULL_SID, Blank, SidTypeWellKnownGroup },
238     { WinWorldSid, Everyone, Blank, SidTypeWellKnownGroup },
239     { WinLocalSid, LOCAL, Blank, SidTypeWellKnownGroup },
240     { WinCreatorOwnerSid, CREATOR_OWNER, Blank, SidTypeWellKnownGroup },
241     { WinCreatorGroupSid, CREATOR_GROUP, Blank, SidTypeWellKnownGroup },
242     { WinCreatorOwnerServerSid, CREATOR_OWNER_SERVER, Blank, SidTypeWellKnownGroup },
243     { WinCreatorGroupServerSid, CREATOR_GROUP_SERVER, Blank, SidTypeWellKnownGroup },
244     { WinNtAuthoritySid, NT_Pseudo_Domain, NT_Pseudo_Domain, SidTypeDomain },
245     { WinDialupSid, DIALUP, NT_AUTHORITY, SidTypeWellKnownGroup },
246     { WinNetworkSid, NETWORK, NT_AUTHORITY, SidTypeWellKnownGroup },
247     { WinBatchSid, BATCH, NT_AUTHORITY, SidTypeWellKnownGroup },
248     { WinInteractiveSid, INTERACTIVE, NT_AUTHORITY, SidTypeWellKnownGroup },
249     { WinServiceSid, SERVICE, NT_AUTHORITY, SidTypeWellKnownGroup },
250     { WinAnonymousSid, ANONYMOUS_LOGON, NT_AUTHORITY, SidTypeWellKnownGroup },
251     { WinProxySid, PROXY, NT_AUTHORITY, SidTypeWellKnownGroup },
252     { WinEnterpriseControllersSid, ENTERPRISE_DOMAIN_CONTROLLERS, NT_AUTHORITY, SidTypeWellKnownGroup },
253     { WinSelfSid, SELF, NT_AUTHORITY, SidTypeWellKnownGroup },
254     { WinAuthenticatedUserSid, Authenticated_Users, NT_AUTHORITY, SidTypeWellKnownGroup },
255     { WinRestrictedCodeSid, RESTRICTED, NT_AUTHORITY, SidTypeWellKnownGroup },
256     { WinTerminalServerSid, TERMINAL_SERVER_USER, NT_AUTHORITY, SidTypeWellKnownGroup },
257     { WinRemoteLogonIdSid, REMOTE_INTERACTIVE_LOGON, NT_AUTHORITY, SidTypeWellKnownGroup },
258     { WinLocalSystemSid, SYSTEM, NT_AUTHORITY, SidTypeWellKnownGroup },
259     { WinLocalServiceSid, LOCAL_SERVICE, NT_AUTHORITY, SidTypeWellKnownGroup, LOCAL_SERVICE2 },
260     { WinNetworkServiceSid, NETWORK_SERVICE, NT_AUTHORITY, SidTypeWellKnownGroup , NETWORK_SERVICE2},
261     { WinBuiltinDomainSid, BUILTIN, BUILTIN, SidTypeDomain },
262     { WinBuiltinAdministratorsSid, Administrators, BUILTIN, SidTypeAlias },
263     { WinBuiltinUsersSid, Users, BUILTIN, SidTypeAlias },
264     { WinBuiltinGuestsSid, Guests, BUILTIN, SidTypeAlias },
265     { WinBuiltinPowerUsersSid, Power_Users, BUILTIN, SidTypeAlias },
266     { WinBuiltinAccountOperatorsSid, Account_Operators, BUILTIN, SidTypeAlias },
267     { WinBuiltinSystemOperatorsSid, Server_Operators, BUILTIN, SidTypeAlias },
268     { WinBuiltinPrintOperatorsSid, Print_Operators, BUILTIN, SidTypeAlias },
269     { WinBuiltinBackupOperatorsSid, Backup_Operators, BUILTIN, SidTypeAlias },
270     { WinBuiltinReplicatorSid, Replicators, BUILTIN, SidTypeAlias },
271     { WinBuiltinPreWindows2000CompatibleAccessSid, Pre_Windows_2000_Compatible_Access, BUILTIN, SidTypeAlias },
272     { WinBuiltinRemoteDesktopUsersSid, Remote_Desktop_Users, BUILTIN, SidTypeAlias },
273     { WinBuiltinNetworkConfigurationOperatorsSid, Network_Configuration_Operators, BUILTIN, SidTypeAlias },
274     { WinNTLMAuthenticationSid, NTML_Authentication, NT_AUTHORITY, SidTypeWellKnownGroup },
275     { WinDigestAuthenticationSid, Digest_Authentication, NT_AUTHORITY, SidTypeWellKnownGroup },
276     { WinSChannelAuthenticationSid, SChannel_Authentication, NT_AUTHORITY, SidTypeWellKnownGroup },
277     { WinThisOrganizationSid, This_Organization, NT_AUTHORITY, SidTypeWellKnownGroup },
278     { WinOtherOrganizationSid, Other_Organization, NT_AUTHORITY, SidTypeWellKnownGroup },
279     { WinBuiltinPerfMonitoringUsersSid, Performance_Monitor_Users, BUILTIN, SidTypeAlias },
280     { WinBuiltinPerfLoggingUsersSid, Performance_Log_Users, BUILTIN, SidTypeAlias },
281 };
282 /*
283  * ACE access rights
284  */
285 static const WCHAR SDDL_READ_CONTROL[]     = {'R','C',0};
286 static const WCHAR SDDL_WRITE_DAC[]        = {'W','D',0};
287 static const WCHAR SDDL_WRITE_OWNER[]      = {'W','O',0};
288 static const WCHAR SDDL_STANDARD_DELETE[]  = {'S','D',0};
289
290 static const WCHAR SDDL_READ_PROPERTY[]    = {'R','P',0};
291 static const WCHAR SDDL_WRITE_PROPERTY[]   = {'W','P',0};
292 static const WCHAR SDDL_CREATE_CHILD[]     = {'C','C',0};
293 static const WCHAR SDDL_DELETE_CHILD[]     = {'D','C',0};
294 static const WCHAR SDDL_LIST_CHILDREN[]    = {'L','C',0};
295 static const WCHAR SDDL_SELF_WRITE[]       = {'S','W',0};
296 static const WCHAR SDDL_LIST_OBJECT[]      = {'L','O',0};
297 static const WCHAR SDDL_DELETE_TREE[]      = {'D','T',0};
298 static const WCHAR SDDL_CONTROL_ACCESS[]   = {'C','R',0};
299
300 static const WCHAR SDDL_FILE_ALL[]         = {'F','A',0};
301 static const WCHAR SDDL_FILE_READ[]        = {'F','R',0};
302 static const WCHAR SDDL_FILE_WRITE[]       = {'F','W',0};
303 static const WCHAR SDDL_FILE_EXECUTE[]     = {'F','X',0};
304
305 static const WCHAR SDDL_KEY_ALL[]          = {'K','A',0};
306 static const WCHAR SDDL_KEY_READ[]         = {'K','R',0};
307 static const WCHAR SDDL_KEY_WRITE[]        = {'K','W',0};
308 static const WCHAR SDDL_KEY_EXECUTE[]      = {'K','X',0};
309
310 static const WCHAR SDDL_GENERIC_ALL[]      = {'G','A',0};
311 static const WCHAR SDDL_GENERIC_READ[]     = {'G','R',0};
312 static const WCHAR SDDL_GENERIC_WRITE[]    = {'G','W',0};
313 static const WCHAR SDDL_GENERIC_EXECUTE[]  = {'G','X',0};
314
315 /*
316  * ACL flags
317  */
318 static const WCHAR SDDL_PROTECTED[]             = {'P',0};
319 static const WCHAR SDDL_AUTO_INHERIT_REQ[]      = {'A','R',0};
320 static const WCHAR SDDL_AUTO_INHERITED[]        = {'A','I',0};
321
322 /*
323  * ACE types
324  */
325 static const WCHAR SDDL_ACCESS_ALLOWED[]        = {'A',0};
326 static const WCHAR SDDL_ACCESS_DENIED[]         = {'D',0};
327 static const WCHAR SDDL_OBJECT_ACCESS_ALLOWED[] = {'O','A',0};
328 static const WCHAR SDDL_OBJECT_ACCESS_DENIED[]  = {'O','D',0};
329 static const WCHAR SDDL_AUDIT[]                 = {'A','U',0};
330 static const WCHAR SDDL_ALARM[]                 = {'A','L',0};
331 static const WCHAR SDDL_OBJECT_AUDIT[]          = {'O','U',0};
332 static const WCHAR SDDL_OBJECT_ALARMp[]         = {'O','L',0};
333
334 /*
335  * ACE flags
336  */
337 static const WCHAR SDDL_CONTAINER_INHERIT[]  = {'C','I',0};
338 static const WCHAR SDDL_OBJECT_INHERIT[]     = {'O','I',0};
339 static const WCHAR SDDL_NO_PROPAGATE[]       = {'N','P',0};
340 static const WCHAR SDDL_INHERIT_ONLY[]       = {'I','O',0};
341 static const WCHAR SDDL_INHERITED[]          = {'I','D',0};
342 static const WCHAR SDDL_AUDIT_SUCCESS[]      = {'S','A',0};
343 static const WCHAR SDDL_AUDIT_FAILURE[]      = {'F','A',0};
344
345 const char * debugstr_sid(PSID sid)
346 {
347     int auth = 0;
348     SID * psid = sid;
349
350     if (psid == NULL)
351         return "(null)";
352
353     auth = psid->IdentifierAuthority.Value[5] +
354            (psid->IdentifierAuthority.Value[4] << 8) +
355            (psid->IdentifierAuthority.Value[3] << 16) +
356            (psid->IdentifierAuthority.Value[2] << 24);
357
358     switch (psid->SubAuthorityCount) {
359     case 0:
360         return wine_dbg_sprintf("S-%d-%d", psid->Revision, auth);
361     case 1:
362         return wine_dbg_sprintf("S-%d-%d-%u", psid->Revision, auth,
363             psid->SubAuthority[0]);
364     case 2:
365         return wine_dbg_sprintf("S-%d-%d-%u-%u", psid->Revision, auth,
366             psid->SubAuthority[0], psid->SubAuthority[1]);
367     case 3:
368         return wine_dbg_sprintf("S-%d-%d-%u-%u-%u", psid->Revision, auth,
369             psid->SubAuthority[0], psid->SubAuthority[1], psid->SubAuthority[2]);
370     case 4:
371         return wine_dbg_sprintf("S-%d-%d-%u-%u-%u-%u", psid->Revision, auth,
372             psid->SubAuthority[0], psid->SubAuthority[1], psid->SubAuthority[2],
373             psid->SubAuthority[3]);
374     case 5:
375         return wine_dbg_sprintf("S-%d-%d-%u-%u-%u-%u-%u", psid->Revision, auth,
376             psid->SubAuthority[0], psid->SubAuthority[1], psid->SubAuthority[2],
377             psid->SubAuthority[3], psid->SubAuthority[4]);
378     case 6:
379         return wine_dbg_sprintf("S-%d-%d-%u-%u-%u-%u-%u-%u", psid->Revision, auth,
380             psid->SubAuthority[3], psid->SubAuthority[1], psid->SubAuthority[2],
381             psid->SubAuthority[0], psid->SubAuthority[4], psid->SubAuthority[5]);
382     case 7:
383         return wine_dbg_sprintf("S-%d-%d-%u-%u-%u-%u-%u-%u-%u", psid->Revision, auth,
384             psid->SubAuthority[0], psid->SubAuthority[1], psid->SubAuthority[2],
385             psid->SubAuthority[3], psid->SubAuthority[4], psid->SubAuthority[5],
386             psid->SubAuthority[6]);
387     case 8:
388         return wine_dbg_sprintf("S-%d-%d-%u-%u-%u-%u-%u-%u-%u-%u", psid->Revision, auth,
389             psid->SubAuthority[0], psid->SubAuthority[1], psid->SubAuthority[2],
390             psid->SubAuthority[3], psid->SubAuthority[4], psid->SubAuthority[5],
391             psid->SubAuthority[6], psid->SubAuthority[7]);
392     }
393     return "(too-big)";
394 }
395
396 /* set last error code from NT status and get the proper boolean return value */
397 /* used for functions that are a simple wrapper around the corresponding ntdll API */
398 static inline BOOL set_ntstatus( NTSTATUS status )
399 {
400     if (status) SetLastError( RtlNtStatusToDosError( status ));
401     return !status;
402 }
403
404 #define WINE_SIZE_OF_WORLD_ACCESS_ACL   (sizeof(ACL) + sizeof(ACCESS_ALLOWED_ACE) + sizeof(sidWorld) - sizeof(DWORD))
405
406 static void GetWorldAccessACL(PACL pACL)
407 {
408     PACCESS_ALLOWED_ACE pACE = (PACCESS_ALLOWED_ACE) (pACL + 1);
409
410     pACL->AclRevision = ACL_REVISION;
411     pACL->Sbz1 = 0;
412     pACL->AclSize = WINE_SIZE_OF_WORLD_ACCESS_ACL;
413     pACL->AceCount = 1;
414     pACL->Sbz2 = 0;
415
416     pACE->Header.AceType = ACCESS_ALLOWED_ACE_TYPE;
417     pACE->Header.AceFlags = CONTAINER_INHERIT_ACE;
418     pACE->Header.AceSize = sizeof(ACCESS_ALLOWED_ACE) + sizeof(sidWorld) - sizeof(DWORD);
419     pACE->Mask = 0xf3ffffff; /* Everything except reserved bits */
420     memcpy(&pACE->SidStart, &sidWorld, sizeof(sidWorld));
421 }
422
423 /************************************************************
424  *                ADVAPI_IsLocalComputer
425  *
426  * Checks whether the server name indicates local machine.
427  */
428 BOOL ADVAPI_IsLocalComputer(LPCWSTR ServerName)
429 {
430     DWORD dwSize = MAX_COMPUTERNAME_LENGTH + 1;
431     BOOL Result;
432     LPWSTR buf;
433
434     if (!ServerName || !ServerName[0])
435         return TRUE;
436
437     buf = HeapAlloc(GetProcessHeap(), 0, dwSize * sizeof(WCHAR));
438     Result = GetComputerNameW(buf,  &dwSize);
439     if (Result && (ServerName[0] == '\\') && (ServerName[1] == '\\'))
440         ServerName += 2;
441     Result = Result && !lstrcmpW(ServerName, buf);
442     HeapFree(GetProcessHeap(), 0, buf);
443
444     return Result;
445 }
446
447 /************************************************************
448  *                ADVAPI_GetComputerSid
449  *
450  * Reads the computer SID from the registry.
451  */
452 BOOL ADVAPI_GetComputerSid(PSID sid)
453 {
454     HKEY key;
455     LONG ret;
456     BOOL retval = FALSE;
457     static const WCHAR Account[] = { 'S','E','C','U','R','I','T','Y','\\','S','A','M','\\','D','o','m','a','i','n','s','\\','A','c','c','o','u','n','t',0 };
458     static const WCHAR V[] = { 'V',0 };
459
460     if ((ret = RegOpenKeyExW(HKEY_LOCAL_MACHINE, Account, 0,
461         KEY_READ, &key)) == ERROR_SUCCESS)
462     {
463         DWORD size = 0;
464         ret = RegQueryValueExW(key, V, NULL, NULL, NULL, &size);
465         if (ret == ERROR_MORE_DATA || ret == ERROR_SUCCESS)
466         {
467             BYTE * data = HeapAlloc(GetProcessHeap(), 0, size);
468             if (data)
469             {
470                 if ((ret = RegQueryValueExW(key, V, NULL, NULL,
471                      data, &size)) == ERROR_SUCCESS)
472                 {
473                     /* the SID is in the last 24 bytes of the binary data */
474                     CopyMemory(sid, &data[size-24], 24);
475                     retval = TRUE;
476                 }
477                 HeapFree(GetProcessHeap(), 0, data);
478             }
479         }
480         RegCloseKey(key);
481     }
482
483     if(retval == TRUE) return retval;
484
485     /* create a new random SID */
486     if (RegCreateKeyExW(HKEY_LOCAL_MACHINE, Account,
487         0, NULL, 0, KEY_ALL_ACCESS, NULL, &key, NULL) == ERROR_SUCCESS)
488     {
489         PSID new_sid;
490         SID_IDENTIFIER_AUTHORITY identifierAuthority = {SECURITY_NT_AUTHORITY};
491         DWORD id[3];
492
493         if (RtlGenRandom(id, sizeof(id)))
494         {
495             if (AllocateAndInitializeSid(&identifierAuthority, 4, SECURITY_NT_NON_UNIQUE, id[0], id[1], id[2], 0, 0, 0, 0, &new_sid))
496             {
497                 if (RegSetValueExW(key, V, 0, REG_BINARY, new_sid, GetLengthSid(new_sid)) == ERROR_SUCCESS)
498                     retval = CopySid(GetLengthSid(new_sid), sid, new_sid);
499
500                 FreeSid(new_sid);
501             }
502         }
503         RegCloseKey(key);
504     }
505
506     return retval;
507 }
508
509 /*      ##############################
510         ######  TOKEN FUNCTIONS ######
511         ##############################
512 */
513
514 /******************************************************************************
515  * OpenProcessToken                     [ADVAPI32.@]
516  * Opens the access token associated with a process handle.
517  *
518  * PARAMS
519  *   ProcessHandle [I] Handle to process
520  *   DesiredAccess [I] Desired access to process
521  *   TokenHandle   [O] Pointer to handle of open access token
522  *
523  * RETURNS
524  *  Success: TRUE. TokenHandle contains the access token.
525  *  Failure: FALSE.
526  *
527  * NOTES
528  *  See NtOpenProcessToken.
529  */
530 BOOL WINAPI
531 OpenProcessToken( HANDLE ProcessHandle, DWORD DesiredAccess,
532                   HANDLE *TokenHandle )
533 {
534         return set_ntstatus(NtOpenProcessToken( ProcessHandle, DesiredAccess, TokenHandle ));
535 }
536
537 /******************************************************************************
538  * OpenThreadToken [ADVAPI32.@]
539  *
540  * Opens the access token associated with a thread handle.
541  *
542  * PARAMS
543  *   ThreadHandle  [I] Handle to process
544  *   DesiredAccess [I] Desired access to the thread
545  *   OpenAsSelf    [I] ???
546  *   TokenHandle   [O] Destination for the token handle
547  *
548  * RETURNS
549  *  Success: TRUE. TokenHandle contains the access token.
550  *  Failure: FALSE.
551  *
552  * NOTES
553  *  See NtOpenThreadToken.
554  */
555 BOOL WINAPI
556 OpenThreadToken( HANDLE ThreadHandle, DWORD DesiredAccess,
557                  BOOL OpenAsSelf, HANDLE *TokenHandle)
558 {
559         return set_ntstatus( NtOpenThreadToken(ThreadHandle, DesiredAccess, OpenAsSelf, TokenHandle));
560 }
561
562 BOOL WINAPI
563 AdjustTokenGroups( HANDLE TokenHandle, BOOL ResetToDefault, PTOKEN_GROUPS NewState,
564                    DWORD BufferLength, PTOKEN_GROUPS PreviousState, PDWORD ReturnLength )
565 {
566     return set_ntstatus( NtAdjustGroupsToken(TokenHandle, ResetToDefault, NewState, BufferLength,
567                                              PreviousState, ReturnLength));
568 }
569
570 /******************************************************************************
571  * AdjustTokenPrivileges [ADVAPI32.@]
572  *
573  * Adjust the privileges of an open token handle.
574  * 
575  * PARAMS
576  *  TokenHandle          [I]   Handle from OpenProcessToken() or OpenThreadToken() 
577  *  DisableAllPrivileges [I]   TRUE=Remove all privileges, FALSE=Use NewState
578  *  NewState             [I]   Desired new privileges of the token
579  *  BufferLength         [I]   Length of NewState
580  *  PreviousState        [O]   Destination for the previous state
581  *  ReturnLength         [I/O] Size of PreviousState
582  *
583  *
584  * RETURNS
585  *  Success: TRUE. Privileges are set to NewState and PreviousState is updated.
586  *  Failure: FALSE.
587  *
588  * NOTES
589  *  See NtAdjustPrivilegesToken.
590  */
591 BOOL WINAPI
592 AdjustTokenPrivileges( HANDLE TokenHandle, BOOL DisableAllPrivileges,
593                        PTOKEN_PRIVILEGES NewState, DWORD BufferLength,
594                        PTOKEN_PRIVILEGES PreviousState, PDWORD ReturnLength )
595 {
596     NTSTATUS status;
597
598     TRACE("\n");
599     
600     status = NtAdjustPrivilegesToken(TokenHandle, DisableAllPrivileges,
601                                                      NewState, BufferLength, PreviousState,
602                                                      ReturnLength);
603     SetLastError( RtlNtStatusToDosError( status ));
604     if ((status == STATUS_SUCCESS) || (status == STATUS_NOT_ALL_ASSIGNED))
605         return TRUE;
606     else
607         return FALSE;
608 }
609
610 /******************************************************************************
611  * CheckTokenMembership [ADVAPI32.@]
612  *
613  * Determine if an access token is a member of a SID.
614  * 
615  * PARAMS
616  *   TokenHandle [I] Handle from OpenProcessToken() or OpenThreadToken()
617  *   SidToCheck  [I] SID that possibly contains the token
618  *   IsMember    [O] Destination for result.
619  *
620  * RETURNS
621  *  Success: TRUE. IsMember is TRUE if TokenHandle is a member, FALSE otherwise.
622  *  Failure: FALSE.
623  */
624 BOOL WINAPI
625 CheckTokenMembership( HANDLE token, PSID sid_to_check,
626                       PBOOL is_member )
627 {
628     PTOKEN_GROUPS token_groups = NULL;
629     HANDLE thread_token = NULL;
630     DWORD size, i;
631     BOOL ret;
632
633     TRACE("(%p %s %p)\n", token, debugstr_sid(sid_to_check), is_member);
634
635     *is_member = FALSE;
636
637     if (!token)
638     {
639         if (!OpenThreadToken(GetCurrentThread(), TOKEN_QUERY, TRUE, &thread_token))
640         {
641             HANDLE process_token;
642             ret = OpenProcessToken(GetCurrentProcess(), TOKEN_DUPLICATE, &process_token);
643             if (!ret)
644                 goto exit;
645             ret = DuplicateTokenEx(process_token, TOKEN_QUERY,
646                 NULL, SecurityImpersonation, TokenImpersonation,
647                 &thread_token);
648             CloseHandle(process_token);
649             if (!ret)
650                 goto exit;
651         }
652         token = thread_token;
653     }
654
655     ret = GetTokenInformation(token, TokenGroups, NULL, 0, &size);
656     if (!ret && GetLastError() != ERROR_INSUFFICIENT_BUFFER)
657         goto exit;
658
659     token_groups = HeapAlloc(GetProcessHeap(), 0, size);
660     if (!token_groups)
661     {
662         ret = FALSE;
663         goto exit;
664     }
665
666     ret = GetTokenInformation(token, TokenGroups, token_groups, size, &size);
667     if (!ret)
668         goto exit;
669
670     for (i = 0; i < token_groups->GroupCount; i++)
671     {
672         TRACE("Groups[%d]: {0x%x, %s}\n", i,
673             token_groups->Groups[i].Attributes,
674             debugstr_sid(token_groups->Groups[i].Sid));
675         if ((token_groups->Groups[i].Attributes & SE_GROUP_ENABLED) &&
676             EqualSid(sid_to_check, token_groups->Groups[i].Sid))
677         {
678             *is_member = TRUE;
679             TRACE("sid enabled and found in token\n");
680             break;
681         }
682     }
683
684 exit:
685     HeapFree(GetProcessHeap(), 0, token_groups);
686     if (thread_token != NULL) CloseHandle(thread_token);
687
688     return ret;
689 }
690
691 /******************************************************************************
692  * GetTokenInformation [ADVAPI32.@]
693  *
694  * Get a type of information about an access token.
695  *
696  * PARAMS
697  *   token           [I] Handle from OpenProcessToken() or OpenThreadToken()
698  *   tokeninfoclass  [I] A TOKEN_INFORMATION_CLASS from "winnt.h"
699  *   tokeninfo       [O] Destination for token information
700  *   tokeninfolength [I] Length of tokeninfo
701  *   retlen          [O] Destination for returned token information length
702  *
703  * RETURNS
704  *  Success: TRUE. tokeninfo contains retlen bytes of token information
705  *  Failure: FALSE.
706  *
707  * NOTES
708  *  See NtQueryInformationToken.
709  */
710 BOOL WINAPI
711 GetTokenInformation( HANDLE token, TOKEN_INFORMATION_CLASS tokeninfoclass,
712                      LPVOID tokeninfo, DWORD tokeninfolength, LPDWORD retlen )
713 {
714     TRACE("(%p, %s, %p, %d, %p):\n",
715           token,
716           (tokeninfoclass == TokenUser) ? "TokenUser" :
717           (tokeninfoclass == TokenGroups) ? "TokenGroups" :
718           (tokeninfoclass == TokenPrivileges) ? "TokenPrivileges" :
719           (tokeninfoclass == TokenOwner) ? "TokenOwner" :
720           (tokeninfoclass == TokenPrimaryGroup) ? "TokenPrimaryGroup" :
721           (tokeninfoclass == TokenDefaultDacl) ? "TokenDefaultDacl" :
722           (tokeninfoclass == TokenSource) ? "TokenSource" :
723           (tokeninfoclass == TokenType) ? "TokenType" :
724           (tokeninfoclass == TokenImpersonationLevel) ? "TokenImpersonationLevel" :
725           (tokeninfoclass == TokenStatistics) ? "TokenStatistics" :
726           (tokeninfoclass == TokenRestrictedSids) ? "TokenRestrictedSids" :
727           (tokeninfoclass == TokenSessionId) ? "TokenSessionId" :
728           (tokeninfoclass == TokenGroupsAndPrivileges) ? "TokenGroupsAndPrivileges" :
729           (tokeninfoclass == TokenSessionReference) ? "TokenSessionReference" :
730           (tokeninfoclass == TokenSandBoxInert) ? "TokenSandBoxInert" :
731           "Unknown",
732           tokeninfo, tokeninfolength, retlen);
733     return set_ntstatus( NtQueryInformationToken( token, tokeninfoclass, tokeninfo,
734                                                   tokeninfolength, retlen));
735 }
736
737 /******************************************************************************
738  * SetTokenInformation [ADVAPI32.@]
739  *
740  * Set information for an access token.
741  *
742  * PARAMS
743  *   token           [I] Handle from OpenProcessToken() or OpenThreadToken()
744  *   tokeninfoclass  [I] A TOKEN_INFORMATION_CLASS from "winnt.h"
745  *   tokeninfo       [I] Token information to set
746  *   tokeninfolength [I] Length of tokeninfo
747  *
748  * RETURNS
749  *  Success: TRUE. The information for the token is set to tokeninfo.
750  *  Failure: FALSE.
751  */
752 BOOL WINAPI
753 SetTokenInformation( HANDLE token, TOKEN_INFORMATION_CLASS tokeninfoclass,
754                      LPVOID tokeninfo, DWORD tokeninfolength )
755 {
756     TRACE("(%p, %s, %p, %d): stub\n",
757           token,
758           (tokeninfoclass == TokenUser) ? "TokenUser" :
759           (tokeninfoclass == TokenGroups) ? "TokenGroups" :
760           (tokeninfoclass == TokenPrivileges) ? "TokenPrivileges" :
761           (tokeninfoclass == TokenOwner) ? "TokenOwner" :
762           (tokeninfoclass == TokenPrimaryGroup) ? "TokenPrimaryGroup" :
763           (tokeninfoclass == TokenDefaultDacl) ? "TokenDefaultDacl" :
764           (tokeninfoclass == TokenSource) ? "TokenSource" :
765           (tokeninfoclass == TokenType) ? "TokenType" :
766           (tokeninfoclass == TokenImpersonationLevel) ? "TokenImpersonationLevel" :
767           (tokeninfoclass == TokenStatistics) ? "TokenStatistics" :
768           (tokeninfoclass == TokenRestrictedSids) ? "TokenRestrictedSids" :
769           (tokeninfoclass == TokenSessionId) ? "TokenSessionId" :
770           (tokeninfoclass == TokenGroupsAndPrivileges) ? "TokenGroupsAndPrivileges" :
771           (tokeninfoclass == TokenSessionReference) ? "TokenSessionReference" :
772           (tokeninfoclass == TokenSandBoxInert) ? "TokenSandBoxInert" :
773           "Unknown",
774           tokeninfo, tokeninfolength);
775
776     return set_ntstatus( NtSetInformationToken( token, tokeninfoclass, tokeninfo, tokeninfolength ));
777 }
778
779 /*************************************************************************
780  * SetThreadToken [ADVAPI32.@]
781  *
782  * Assigns an 'impersonation token' to a thread so it can assume the
783  * security privileges of another thread or process.  Can also remove
784  * a previously assigned token. 
785  *
786  * PARAMS
787  *   thread          [O] Handle to thread to set the token for
788  *   token           [I] Token to set
789  *
790  * RETURNS
791  *  Success: TRUE. The threads access token is set to token
792  *  Failure: FALSE.
793  *
794  * NOTES
795  *  Only supported on NT or higher. On Win9X this function does nothing.
796  *  See SetTokenInformation.
797  */
798 BOOL WINAPI SetThreadToken(PHANDLE thread, HANDLE token)
799 {
800     return set_ntstatus( NtSetInformationThread( thread ? *thread : GetCurrentThread(),
801                                                  ThreadImpersonationToken, &token, sizeof token ));
802 }
803
804 /*************************************************************************
805  * CreateRestrictedToken [ADVAPI32.@]
806  *
807  * Create a new more restricted token from an existing token.
808  *
809  * PARAMS
810  *   baseToken       [I] Token to base the new restricted token on
811  *   flags           [I] Options
812  *   nDisableSids    [I] Length of disableSids array
813  *   disableSids     [I] Array of SIDs to disable in the new token
814  *   nDeletePrivs    [I] Length of deletePrivs array
815  *   deletePrivs     [I] Array of privileges to delete in the new token
816  *   nRestrictSids   [I] Length of restrictSids array
817  *   restrictSids    [I] Array of SIDs to restrict in the new token
818  *   newToken        [O] Address where the new token is stored
819  *
820  * RETURNS
821  *  Success: TRUE
822  *  Failure: FALSE
823  */
824 BOOL WINAPI CreateRestrictedToken(
825     HANDLE baseToken,
826     DWORD flags,
827     DWORD nDisableSids,
828     PSID_AND_ATTRIBUTES disableSids,
829     DWORD nDeletePrivs,
830     PLUID_AND_ATTRIBUTES deletePrivs,
831     DWORD nRestrictSids,
832     PSID_AND_ATTRIBUTES restrictSids,
833     PHANDLE newToken)
834 {
835     FIXME("(%p, 0x%x, %u, %p, %u, %p, %u, %p, %p): stub\n",
836           baseToken, flags, nDisableSids, disableSids,
837           nDeletePrivs, deletePrivs,
838           nRestrictSids, restrictSids,
839           newToken);
840     SetLastError(ERROR_CALL_NOT_IMPLEMENTED);
841     return FALSE;
842 }
843
844 /*      ##############################
845         ######  SID FUNCTIONS   ######
846         ##############################
847 */
848
849 /******************************************************************************
850  * AllocateAndInitializeSid [ADVAPI32.@]
851  *
852  * PARAMS
853  *   pIdentifierAuthority []
854  *   nSubAuthorityCount   []
855  *   nSubAuthority0       []
856  *   nSubAuthority1       []
857  *   nSubAuthority2       []
858  *   nSubAuthority3       []
859  *   nSubAuthority4       []
860  *   nSubAuthority5       []
861  *   nSubAuthority6       []
862  *   nSubAuthority7       []
863  *   pSid                 []
864  */
865 BOOL WINAPI
866 AllocateAndInitializeSid( PSID_IDENTIFIER_AUTHORITY pIdentifierAuthority,
867                           BYTE nSubAuthorityCount,
868                           DWORD nSubAuthority0, DWORD nSubAuthority1,
869                           DWORD nSubAuthority2, DWORD nSubAuthority3,
870                           DWORD nSubAuthority4, DWORD nSubAuthority5,
871                           DWORD nSubAuthority6, DWORD nSubAuthority7,
872                           PSID *pSid )
873 {
874     return set_ntstatus( RtlAllocateAndInitializeSid(
875                              pIdentifierAuthority, nSubAuthorityCount,
876                              nSubAuthority0, nSubAuthority1, nSubAuthority2, nSubAuthority3,
877                              nSubAuthority4, nSubAuthority5, nSubAuthority6, nSubAuthority7,
878                              pSid ));
879 }
880
881 /******************************************************************************
882  * FreeSid [ADVAPI32.@]
883  *
884  * PARAMS
885  *   pSid []
886  */
887 PVOID WINAPI
888 FreeSid( PSID pSid )
889 {
890         RtlFreeSid(pSid);
891         return NULL; /* is documented like this */
892 }
893
894 /******************************************************************************
895  * CopySid [ADVAPI32.@]
896  *
897  * PARAMS
898  *   nDestinationSidLength []
899  *   pDestinationSid       []
900  *   pSourceSid            []
901  */
902 BOOL WINAPI
903 CopySid( DWORD nDestinationSidLength, PSID pDestinationSid, PSID pSourceSid )
904 {
905         return RtlCopySid(nDestinationSidLength, pDestinationSid, pSourceSid);
906 }
907
908 /******************************************************************************
909  * CreateWellKnownSid [ADVAPI32.@]
910  */
911 BOOL WINAPI
912 CreateWellKnownSid( WELL_KNOWN_SID_TYPE WellKnownSidType,
913                     PSID DomainSid,
914                     PSID pSid,
915                     DWORD* cbSid)
916 {
917     unsigned int i;
918     TRACE("(%d, %s, %p, %p)\n", WellKnownSidType, debugstr_sid(DomainSid), pSid, cbSid);
919
920     if (cbSid == NULL || (DomainSid && !IsValidSid(DomainSid)))
921     {
922         SetLastError(ERROR_INVALID_PARAMETER);
923         return FALSE;
924     }
925
926     for (i = 0; i < sizeof(WellKnownSids)/sizeof(WellKnownSids[0]); i++) {
927         if (WellKnownSids[i].Type == WellKnownSidType) {
928             DWORD length = GetSidLengthRequired(WellKnownSids[i].Sid.SubAuthorityCount);
929
930             if (*cbSid < length)
931             {
932                 *cbSid = length;
933                 SetLastError(ERROR_INSUFFICIENT_BUFFER);
934                 return FALSE;
935             }
936             if (!pSid)
937             {
938                 SetLastError(ERROR_INVALID_PARAMETER);
939                 return FALSE;
940             }
941             CopyMemory(pSid, &WellKnownSids[i].Sid.Revision, length);
942             *cbSid = length;
943             return TRUE;
944         }
945     }
946
947     if (DomainSid == NULL || *GetSidSubAuthorityCount(DomainSid) == SID_MAX_SUB_AUTHORITIES)
948     {
949         SetLastError(ERROR_INVALID_PARAMETER);
950         return FALSE;
951     }
952
953     for (i = 0; i < sizeof(WellKnownRids)/sizeof(WellKnownRids[0]); i++)
954         if (WellKnownRids[i].Type == WellKnownSidType) {
955             UCHAR domain_subauth = *GetSidSubAuthorityCount(DomainSid);
956             DWORD domain_sid_length = GetSidLengthRequired(domain_subauth);
957             DWORD output_sid_length = GetSidLengthRequired(domain_subauth + 1);
958
959             if (*cbSid < output_sid_length)
960             {
961                 *cbSid = output_sid_length;
962                 SetLastError(ERROR_INSUFFICIENT_BUFFER);
963                 return FALSE;
964             }
965             if (!pSid)
966             {
967                 SetLastError(ERROR_INVALID_PARAMETER);
968                 return FALSE;
969             }
970             CopyMemory(pSid, DomainSid, domain_sid_length);
971             (*GetSidSubAuthorityCount(pSid))++;
972             (*GetSidSubAuthority(pSid, domain_subauth)) = WellKnownRids[i].Rid;
973             *cbSid = output_sid_length;
974             return TRUE;
975         }
976
977     SetLastError(ERROR_INVALID_PARAMETER);
978     return FALSE;
979 }
980
981 /******************************************************************************
982  * IsWellKnownSid [ADVAPI32.@]
983  */
984 BOOL WINAPI
985 IsWellKnownSid( PSID pSid, WELL_KNOWN_SID_TYPE WellKnownSidType )
986 {
987     unsigned int i;
988     TRACE("(%s, %d)\n", debugstr_sid(pSid), WellKnownSidType);
989
990     for (i = 0; i < sizeof(WellKnownSids)/sizeof(WellKnownSids[0]); i++)
991         if (WellKnownSids[i].Type == WellKnownSidType)
992             if (EqualSid(pSid, (PSID)&(WellKnownSids[i].Sid.Revision)))
993                 return TRUE;
994
995     return FALSE;
996 }
997
998 BOOL WINAPI
999 IsTokenRestricted( HANDLE TokenHandle )
1000 {
1001     TOKEN_GROUPS *groups;
1002     DWORD size;
1003     NTSTATUS status;
1004     BOOL restricted;
1005
1006     TRACE("(%p)\n", TokenHandle);
1007  
1008     status = NtQueryInformationToken(TokenHandle, TokenRestrictedSids, NULL, 0, &size);
1009     if (status != STATUS_BUFFER_TOO_SMALL)
1010         return FALSE;
1011  
1012     groups = HeapAlloc(GetProcessHeap(), 0, size);
1013     if (!groups)
1014     {
1015         SetLastError(ERROR_OUTOFMEMORY);
1016         return FALSE;
1017     }
1018  
1019     status = NtQueryInformationToken(TokenHandle, TokenRestrictedSids, groups, size, &size);
1020     if (status != STATUS_SUCCESS)
1021     {
1022         HeapFree(GetProcessHeap(), 0, groups);
1023         return set_ntstatus(status);
1024     }
1025  
1026     if (groups->GroupCount)
1027         restricted = TRUE;
1028     else
1029         restricted = FALSE;
1030      
1031     HeapFree(GetProcessHeap(), 0, groups);
1032  
1033     return restricted;
1034 }
1035
1036 /******************************************************************************
1037  * IsValidSid [ADVAPI32.@]
1038  *
1039  * PARAMS
1040  *   pSid []
1041  */
1042 BOOL WINAPI
1043 IsValidSid( PSID pSid )
1044 {
1045         return RtlValidSid( pSid );
1046 }
1047
1048 /******************************************************************************
1049  * EqualSid [ADVAPI32.@]
1050  *
1051  * PARAMS
1052  *   pSid1 []
1053  *   pSid2 []
1054  */
1055 BOOL WINAPI
1056 EqualSid( PSID pSid1, PSID pSid2 )
1057 {
1058         BOOL ret = RtlEqualSid( pSid1, pSid2 );
1059         SetLastError(ERROR_SUCCESS);
1060         return ret;
1061 }
1062
1063 /******************************************************************************
1064  * EqualPrefixSid [ADVAPI32.@]
1065  */
1066 BOOL WINAPI EqualPrefixSid (PSID pSid1, PSID pSid2)
1067 {
1068         return RtlEqualPrefixSid(pSid1, pSid2);
1069 }
1070
1071 /******************************************************************************
1072  * GetSidLengthRequired [ADVAPI32.@]
1073  *
1074  * PARAMS
1075  *   nSubAuthorityCount []
1076  */
1077 DWORD WINAPI
1078 GetSidLengthRequired( BYTE nSubAuthorityCount )
1079 {
1080         return RtlLengthRequiredSid(nSubAuthorityCount);
1081 }
1082
1083 /******************************************************************************
1084  * InitializeSid [ADVAPI32.@]
1085  *
1086  * PARAMS
1087  *   pIdentifierAuthority []
1088  */
1089 BOOL WINAPI
1090 InitializeSid (
1091         PSID pSid,
1092         PSID_IDENTIFIER_AUTHORITY pIdentifierAuthority,
1093         BYTE nSubAuthorityCount)
1094 {
1095         return RtlInitializeSid(pSid, pIdentifierAuthority, nSubAuthorityCount);
1096 }
1097
1098 DWORD WINAPI
1099 GetEffectiveRightsFromAclA( PACL pacl, PTRUSTEEA pTrustee, PACCESS_MASK pAccessRights )
1100 {
1101     FIXME("%p %p %p - stub\n", pacl, pTrustee, pAccessRights);
1102
1103     *pAccessRights = STANDARD_RIGHTS_ALL | SPECIFIC_RIGHTS_ALL;
1104     return 0;
1105 }
1106
1107 DWORD WINAPI
1108 GetEffectiveRightsFromAclW( PACL pacl, PTRUSTEEW pTrustee, PACCESS_MASK pAccessRights )
1109 {
1110     FIXME("%p %p %p - stub\n", pacl, pTrustee, pAccessRights);
1111
1112     return 1;
1113 }
1114
1115 /******************************************************************************
1116  * GetSidIdentifierAuthority [ADVAPI32.@]
1117  *
1118  * PARAMS
1119  *   pSid []
1120  */
1121 PSID_IDENTIFIER_AUTHORITY WINAPI
1122 GetSidIdentifierAuthority( PSID pSid )
1123 {
1124         return RtlIdentifierAuthoritySid(pSid);
1125 }
1126
1127 /******************************************************************************
1128  * GetSidSubAuthority [ADVAPI32.@]
1129  *
1130  * PARAMS
1131  *   pSid          []
1132  *   nSubAuthority []
1133  */
1134 PDWORD WINAPI
1135 GetSidSubAuthority( PSID pSid, DWORD nSubAuthority )
1136 {
1137         SetLastError(ERROR_SUCCESS);
1138         return RtlSubAuthoritySid(pSid, nSubAuthority);
1139 }
1140
1141 /******************************************************************************
1142  * GetSidSubAuthorityCount [ADVAPI32.@]
1143  *
1144  * PARAMS
1145  *   pSid []
1146  */
1147 PUCHAR WINAPI
1148 GetSidSubAuthorityCount (PSID pSid)
1149 {
1150         SetLastError(ERROR_SUCCESS);
1151         return RtlSubAuthorityCountSid(pSid);
1152 }
1153
1154 /******************************************************************************
1155  * GetLengthSid [ADVAPI32.@]
1156  *
1157  * PARAMS
1158  *   pSid []
1159  */
1160 DWORD WINAPI
1161 GetLengthSid (PSID pSid)
1162 {
1163         return RtlLengthSid(pSid);
1164 }
1165
1166 /*      ##############################################
1167         ######  SECURITY DESCRIPTOR FUNCTIONS   ######
1168         ##############################################
1169 */
1170
1171  /****************************************************************************** 
1172  * BuildSecurityDescriptorA [ADVAPI32.@]
1173  *
1174  * Builds a SD from 
1175  *
1176  * PARAMS
1177  *  pOwner                [I]
1178  *  pGroup                [I]
1179  *  cCountOfAccessEntries [I]
1180  *  pListOfAccessEntries  [I]
1181  *  cCountOfAuditEntries  [I]
1182  *  pListofAuditEntries   [I]
1183  *  pOldSD                [I]
1184  *  lpdwBufferLength      [I/O]
1185  *  pNewSD                [O]
1186  *
1187  * RETURNS
1188  *  Success: ERROR_SUCCESS
1189  *  Failure: nonzero error code from Winerror.h
1190  */
1191 DWORD WINAPI BuildSecurityDescriptorA(
1192     IN PTRUSTEEA pOwner,
1193     IN PTRUSTEEA pGroup,
1194     IN ULONG cCountOfAccessEntries,
1195     IN PEXPLICIT_ACCESSA pListOfAccessEntries,
1196     IN ULONG cCountOfAuditEntries,
1197     IN PEXPLICIT_ACCESSA pListofAuditEntries,
1198     IN PSECURITY_DESCRIPTOR pOldSD,
1199     IN OUT PULONG lpdwBufferLength,
1200     OUT PSECURITY_DESCRIPTOR* pNewSD)
1201
1202     FIXME("(%p,%p,%d,%p,%d,%p,%p,%p,%p) stub!\n",pOwner,pGroup,
1203           cCountOfAccessEntries,pListOfAccessEntries,cCountOfAuditEntries,
1204           pListofAuditEntries,pOldSD,lpdwBufferLength,pNewSD);
1205  
1206     return ERROR_CALL_NOT_IMPLEMENTED;
1207
1208  
1209 /******************************************************************************
1210  * BuildSecurityDescriptorW [ADVAPI32.@]
1211  *
1212  * See BuildSecurityDescriptorA.
1213  */
1214 DWORD WINAPI BuildSecurityDescriptorW(
1215     IN PTRUSTEEW pOwner,
1216     IN PTRUSTEEW pGroup,
1217     IN ULONG cCountOfAccessEntries,
1218     IN PEXPLICIT_ACCESSW pListOfAccessEntries,
1219     IN ULONG cCountOfAuditEntries,
1220     IN PEXPLICIT_ACCESSW pListofAuditEntries,
1221     IN PSECURITY_DESCRIPTOR pOldSD,
1222     IN OUT PULONG lpdwBufferLength,
1223     OUT PSECURITY_DESCRIPTOR* pNewSD)
1224
1225     FIXME("(%p,%p,%d,%p,%d,%p,%p,%p,%p) stub!\n",pOwner,pGroup,
1226           cCountOfAccessEntries,pListOfAccessEntries,cCountOfAuditEntries,
1227           pListofAuditEntries,pOldSD,lpdwBufferLength,pNewSD);
1228  
1229     return ERROR_CALL_NOT_IMPLEMENTED;
1230
1231
1232 /******************************************************************************
1233  * InitializeSecurityDescriptor [ADVAPI32.@]
1234  *
1235  * PARAMS
1236  *   pDescr   []
1237  *   revision []
1238  */
1239 BOOL WINAPI
1240 InitializeSecurityDescriptor( PSECURITY_DESCRIPTOR pDescr, DWORD revision )
1241 {
1242         return set_ntstatus( RtlCreateSecurityDescriptor(pDescr, revision ));
1243 }
1244
1245
1246 /******************************************************************************
1247  * MakeAbsoluteSD [ADVAPI32.@]
1248  */
1249 BOOL WINAPI MakeAbsoluteSD (
1250         IN PSECURITY_DESCRIPTOR pSelfRelativeSecurityDescriptor,
1251         OUT PSECURITY_DESCRIPTOR pAbsoluteSecurityDescriptor,
1252         OUT LPDWORD lpdwAbsoluteSecurityDescriptorSize,
1253         OUT PACL pDacl,
1254         OUT LPDWORD lpdwDaclSize,
1255         OUT PACL pSacl,
1256         OUT LPDWORD lpdwSaclSize,
1257         OUT PSID pOwner,
1258         OUT LPDWORD lpdwOwnerSize,
1259         OUT PSID pPrimaryGroup,
1260         OUT LPDWORD lpdwPrimaryGroupSize)
1261 {
1262     return set_ntstatus( RtlSelfRelativeToAbsoluteSD(pSelfRelativeSecurityDescriptor,
1263                                                      pAbsoluteSecurityDescriptor,
1264                                                      lpdwAbsoluteSecurityDescriptorSize,
1265                                                      pDacl, lpdwDaclSize, pSacl, lpdwSaclSize,
1266                                                      pOwner, lpdwOwnerSize,
1267                                                      pPrimaryGroup, lpdwPrimaryGroupSize));
1268 }
1269
1270 /******************************************************************************
1271  * GetKernelObjectSecurity [ADVAPI32.@]
1272  */
1273 BOOL WINAPI GetKernelObjectSecurity(
1274         HANDLE Handle,
1275         SECURITY_INFORMATION RequestedInformation,
1276         PSECURITY_DESCRIPTOR pSecurityDescriptor,
1277         DWORD nLength,
1278         LPDWORD lpnLengthNeeded )
1279 {
1280     TRACE("(%p,0x%08x,%p,0x%08x,%p)\n", Handle, RequestedInformation,
1281           pSecurityDescriptor, nLength, lpnLengthNeeded);
1282
1283     return set_ntstatus( NtQuerySecurityObject(Handle, RequestedInformation, pSecurityDescriptor,
1284                                                nLength, lpnLengthNeeded ));
1285 }
1286
1287 /******************************************************************************
1288  * GetPrivateObjectSecurity [ADVAPI32.@]
1289  */
1290 BOOL WINAPI GetPrivateObjectSecurity(
1291         PSECURITY_DESCRIPTOR ObjectDescriptor,
1292         SECURITY_INFORMATION SecurityInformation,
1293         PSECURITY_DESCRIPTOR ResultantDescriptor,
1294         DWORD DescriptorLength,
1295         PDWORD ReturnLength )
1296 {
1297     SECURITY_DESCRIPTOR desc;
1298     BOOL defaulted, present;
1299     PACL pacl;
1300     PSID psid;
1301
1302     TRACE("(%p,0x%08x,%p,0x%08x,%p)\n", ObjectDescriptor, SecurityInformation,
1303           ResultantDescriptor, DescriptorLength, ReturnLength);
1304
1305     if (!InitializeSecurityDescriptor(&desc, SECURITY_DESCRIPTOR_REVISION))
1306         return FALSE;
1307
1308     if (SecurityInformation & OWNER_SECURITY_INFORMATION)
1309     {
1310         if (!GetSecurityDescriptorOwner(ObjectDescriptor, &psid, &defaulted))
1311             return FALSE;
1312         SetSecurityDescriptorOwner(&desc, psid, defaulted);
1313     }
1314
1315     if (SecurityInformation & GROUP_SECURITY_INFORMATION)
1316     {
1317         if (!GetSecurityDescriptorGroup(ObjectDescriptor, &psid, &defaulted))
1318             return FALSE;
1319         SetSecurityDescriptorGroup(&desc, psid, defaulted);
1320     }
1321
1322     if (SecurityInformation & DACL_SECURITY_INFORMATION)
1323     {
1324         if (!GetSecurityDescriptorDacl(ObjectDescriptor, &present, &pacl, &defaulted))
1325             return FALSE;
1326         SetSecurityDescriptorDacl(&desc, present, pacl, defaulted);
1327     }
1328
1329     if (SecurityInformation & SACL_SECURITY_INFORMATION)
1330     {
1331         if (!GetSecurityDescriptorSacl(ObjectDescriptor, &present, &pacl, &defaulted))
1332             return FALSE;
1333         SetSecurityDescriptorSacl(&desc, present, pacl, defaulted);
1334     }
1335
1336     *ReturnLength = DescriptorLength;
1337     return MakeSelfRelativeSD(&desc, ResultantDescriptor, ReturnLength);
1338 }
1339
1340 /******************************************************************************
1341  * GetSecurityDescriptorLength [ADVAPI32.@]
1342  */
1343 DWORD WINAPI GetSecurityDescriptorLength( PSECURITY_DESCRIPTOR pDescr)
1344 {
1345         return RtlLengthSecurityDescriptor(pDescr);
1346 }
1347
1348 /******************************************************************************
1349  * GetSecurityDescriptorOwner [ADVAPI32.@]
1350  *
1351  * PARAMS
1352  *   pOwner            []
1353  *   lpbOwnerDefaulted []
1354  */
1355 BOOL WINAPI
1356 GetSecurityDescriptorOwner( PSECURITY_DESCRIPTOR pDescr, PSID *pOwner,
1357                             LPBOOL lpbOwnerDefaulted )
1358 {
1359     BOOLEAN defaulted;
1360     BOOL ret = set_ntstatus( RtlGetOwnerSecurityDescriptor( pDescr, pOwner, &defaulted ));
1361     *lpbOwnerDefaulted = defaulted;
1362     return ret;
1363 }
1364
1365 /******************************************************************************
1366  * SetSecurityDescriptorOwner [ADVAPI32.@]
1367  *
1368  * PARAMS
1369  */
1370 BOOL WINAPI SetSecurityDescriptorOwner( PSECURITY_DESCRIPTOR pSecurityDescriptor,
1371                                    PSID pOwner, BOOL bOwnerDefaulted)
1372 {
1373     return set_ntstatus( RtlSetOwnerSecurityDescriptor(pSecurityDescriptor, pOwner, bOwnerDefaulted));
1374 }
1375 /******************************************************************************
1376  * GetSecurityDescriptorGroup                   [ADVAPI32.@]
1377  */
1378 BOOL WINAPI GetSecurityDescriptorGroup(
1379         PSECURITY_DESCRIPTOR SecurityDescriptor,
1380         PSID *Group,
1381         LPBOOL GroupDefaulted)
1382 {
1383     BOOLEAN defaulted;
1384     BOOL ret = set_ntstatus( RtlGetGroupSecurityDescriptor(SecurityDescriptor, Group, &defaulted ));
1385     *GroupDefaulted = defaulted;
1386     return ret;
1387 }
1388 /******************************************************************************
1389  * SetSecurityDescriptorGroup [ADVAPI32.@]
1390  */
1391 BOOL WINAPI SetSecurityDescriptorGroup ( PSECURITY_DESCRIPTOR SecurityDescriptor,
1392                                            PSID Group, BOOL GroupDefaulted)
1393 {
1394     return set_ntstatus( RtlSetGroupSecurityDescriptor( SecurityDescriptor, Group, GroupDefaulted));
1395 }
1396
1397 /******************************************************************************
1398  * IsValidSecurityDescriptor [ADVAPI32.@]
1399  *
1400  * PARAMS
1401  *   lpsecdesc []
1402  */
1403 BOOL WINAPI
1404 IsValidSecurityDescriptor( PSECURITY_DESCRIPTOR SecurityDescriptor )
1405 {
1406     return set_ntstatus( RtlValidSecurityDescriptor(SecurityDescriptor));
1407 }
1408
1409 /******************************************************************************
1410  *  GetSecurityDescriptorDacl                   [ADVAPI32.@]
1411  */
1412 BOOL WINAPI GetSecurityDescriptorDacl(
1413         IN PSECURITY_DESCRIPTOR pSecurityDescriptor,
1414         OUT LPBOOL lpbDaclPresent,
1415         OUT PACL *pDacl,
1416         OUT LPBOOL lpbDaclDefaulted)
1417 {
1418     BOOLEAN present, defaulted;
1419     BOOL ret = set_ntstatus( RtlGetDaclSecurityDescriptor(pSecurityDescriptor, &present, pDacl, &defaulted));
1420     *lpbDaclPresent = present;
1421     *lpbDaclDefaulted = defaulted;
1422     return ret;
1423 }
1424
1425 /******************************************************************************
1426  *  SetSecurityDescriptorDacl                   [ADVAPI32.@]
1427  */
1428 BOOL WINAPI
1429 SetSecurityDescriptorDacl (
1430         PSECURITY_DESCRIPTOR lpsd,
1431         BOOL daclpresent,
1432         PACL dacl,
1433         BOOL dacldefaulted )
1434 {
1435     return set_ntstatus( RtlSetDaclSecurityDescriptor (lpsd, daclpresent, dacl, dacldefaulted ) );
1436 }
1437 /******************************************************************************
1438  *  GetSecurityDescriptorSacl                   [ADVAPI32.@]
1439  */
1440 BOOL WINAPI GetSecurityDescriptorSacl(
1441         IN PSECURITY_DESCRIPTOR lpsd,
1442         OUT LPBOOL lpbSaclPresent,
1443         OUT PACL *pSacl,
1444         OUT LPBOOL lpbSaclDefaulted)
1445 {
1446     BOOLEAN present, defaulted;
1447     BOOL ret = set_ntstatus( RtlGetSaclSecurityDescriptor(lpsd, &present, pSacl, &defaulted) );
1448     *lpbSaclPresent = present;
1449     *lpbSaclDefaulted = defaulted;
1450     return ret;
1451 }
1452
1453 /**************************************************************************
1454  * SetSecurityDescriptorSacl                    [ADVAPI32.@]
1455  */
1456 BOOL WINAPI SetSecurityDescriptorSacl (
1457         PSECURITY_DESCRIPTOR lpsd,
1458         BOOL saclpresent,
1459         PACL lpsacl,
1460         BOOL sacldefaulted)
1461 {
1462     return set_ntstatus (RtlSetSaclSecurityDescriptor(lpsd, saclpresent, lpsacl, sacldefaulted));
1463 }
1464 /******************************************************************************
1465  * MakeSelfRelativeSD [ADVAPI32.@]
1466  *
1467  * PARAMS
1468  *   lpabssecdesc  []
1469  *   lpselfsecdesc []
1470  *   lpbuflen      []
1471  */
1472 BOOL WINAPI
1473 MakeSelfRelativeSD(
1474         IN PSECURITY_DESCRIPTOR pAbsoluteSecurityDescriptor,
1475         IN PSECURITY_DESCRIPTOR pSelfRelativeSecurityDescriptor,
1476         IN OUT LPDWORD lpdwBufferLength)
1477 {
1478     return set_ntstatus( RtlMakeSelfRelativeSD( pAbsoluteSecurityDescriptor,
1479                                                 pSelfRelativeSecurityDescriptor, lpdwBufferLength));
1480 }
1481
1482 /******************************************************************************
1483  * GetSecurityDescriptorControl                 [ADVAPI32.@]
1484  */
1485
1486 BOOL WINAPI GetSecurityDescriptorControl ( PSECURITY_DESCRIPTOR  pSecurityDescriptor,
1487                  PSECURITY_DESCRIPTOR_CONTROL pControl, LPDWORD lpdwRevision)
1488 {
1489     return set_ntstatus( RtlGetControlSecurityDescriptor(pSecurityDescriptor,pControl,lpdwRevision));
1490 }
1491
1492 /******************************************************************************
1493  * SetSecurityDescriptorControl                 [ADVAPI32.@]
1494  */
1495 BOOL WINAPI SetSecurityDescriptorControl( PSECURITY_DESCRIPTOR pSecurityDescriptor,
1496   SECURITY_DESCRIPTOR_CONTROL ControlBitsOfInterest,
1497   SECURITY_DESCRIPTOR_CONTROL ControlBitsToSet )
1498 {
1499     return set_ntstatus( RtlSetControlSecurityDescriptor(
1500         pSecurityDescriptor, ControlBitsOfInterest, ControlBitsToSet ) );
1501 }
1502
1503 /*      ##############################
1504         ######  ACL FUNCTIONS   ######
1505         ##############################
1506 */
1507
1508 /*************************************************************************
1509  * InitializeAcl [ADVAPI32.@]
1510  */
1511 BOOL WINAPI InitializeAcl(PACL acl, DWORD size, DWORD rev)
1512 {
1513     return set_ntstatus( RtlCreateAcl(acl, size, rev));
1514 }
1515
1516 BOOL WINAPI ImpersonateNamedPipeClient( HANDLE hNamedPipe )
1517 {
1518     IO_STATUS_BLOCK io_block;
1519
1520     TRACE("(%p)\n", hNamedPipe);
1521
1522     return set_ntstatus( NtFsControlFile(hNamedPipe, NULL, NULL, NULL,
1523                          &io_block, FSCTL_PIPE_IMPERSONATE, NULL, 0, NULL, 0) );
1524 }
1525
1526 /******************************************************************************
1527  *  AddAccessAllowedAce [ADVAPI32.@]
1528  */
1529 BOOL WINAPI AddAccessAllowedAce(
1530         IN OUT PACL pAcl,
1531         IN DWORD dwAceRevision,
1532         IN DWORD AccessMask,
1533         IN PSID pSid)
1534 {
1535     return set_ntstatus(RtlAddAccessAllowedAce(pAcl, dwAceRevision, AccessMask, pSid));
1536 }
1537
1538 /******************************************************************************
1539  *  AddAccessAllowedAceEx [ADVAPI32.@]
1540  */
1541 BOOL WINAPI AddAccessAllowedAceEx(
1542         IN OUT PACL pAcl,
1543         IN DWORD dwAceRevision,
1544         IN DWORD AceFlags,
1545         IN DWORD AccessMask,
1546         IN PSID pSid)
1547 {
1548     return set_ntstatus(RtlAddAccessAllowedAceEx(pAcl, dwAceRevision, AceFlags, AccessMask, pSid));
1549 }
1550
1551 /******************************************************************************
1552  *  AddAccessDeniedAce [ADVAPI32.@]
1553  */
1554 BOOL WINAPI AddAccessDeniedAce(
1555         IN OUT PACL pAcl,
1556         IN DWORD dwAceRevision,
1557         IN DWORD AccessMask,
1558         IN PSID pSid)
1559 {
1560     return set_ntstatus(RtlAddAccessDeniedAce(pAcl, dwAceRevision, AccessMask, pSid));
1561 }
1562
1563 /******************************************************************************
1564  *  AddAccessDeniedAceEx [ADVAPI32.@]
1565  */
1566 BOOL WINAPI AddAccessDeniedAceEx(
1567         IN OUT PACL pAcl,
1568         IN DWORD dwAceRevision,
1569         IN DWORD AceFlags,
1570         IN DWORD AccessMask,
1571         IN PSID pSid)
1572 {
1573     return set_ntstatus(RtlAddAccessDeniedAceEx(pAcl, dwAceRevision, AceFlags, AccessMask, pSid));
1574 }
1575
1576 /******************************************************************************
1577  *  AddAce [ADVAPI32.@]
1578  */
1579 BOOL WINAPI AddAce(
1580         IN OUT PACL pAcl,
1581         IN DWORD dwAceRevision,
1582         IN DWORD dwStartingAceIndex,
1583         LPVOID pAceList,
1584         DWORD nAceListLength)
1585 {
1586     return set_ntstatus(RtlAddAce(pAcl, dwAceRevision, dwStartingAceIndex, pAceList, nAceListLength));
1587 }
1588
1589 /******************************************************************************
1590  * DeleteAce [ADVAPI32.@]
1591  */
1592 BOOL WINAPI DeleteAce(PACL pAcl, DWORD dwAceIndex)
1593 {
1594     return set_ntstatus(RtlDeleteAce(pAcl, dwAceIndex));
1595 }
1596
1597 /******************************************************************************
1598  *  FindFirstFreeAce [ADVAPI32.@]
1599  */
1600 BOOL WINAPI FindFirstFreeAce(IN PACL pAcl, LPVOID * pAce)
1601 {
1602         return RtlFirstFreeAce(pAcl, (PACE_HEADER *)pAce);
1603 }
1604
1605 /******************************************************************************
1606  * GetAce [ADVAPI32.@]
1607  */
1608 BOOL WINAPI GetAce(PACL pAcl,DWORD dwAceIndex,LPVOID *pAce )
1609 {
1610     return set_ntstatus(RtlGetAce(pAcl, dwAceIndex, pAce));
1611 }
1612
1613 /******************************************************************************
1614  * GetAclInformation [ADVAPI32.@]
1615  */
1616 BOOL WINAPI GetAclInformation(
1617   PACL pAcl,
1618   LPVOID pAclInformation,
1619   DWORD nAclInformationLength,
1620   ACL_INFORMATION_CLASS dwAclInformationClass)
1621 {
1622     return set_ntstatus(RtlQueryInformationAcl(pAcl, pAclInformation,
1623                                                nAclInformationLength, dwAclInformationClass));
1624 }
1625
1626 /******************************************************************************
1627  *  IsValidAcl [ADVAPI32.@]
1628  */
1629 BOOL WINAPI IsValidAcl(IN PACL pAcl)
1630 {
1631         return RtlValidAcl(pAcl);
1632 }
1633
1634 /*      ##############################
1635         ######  MISC FUNCTIONS  ######
1636         ##############################
1637 */
1638
1639 /******************************************************************************
1640  * AllocateLocallyUniqueId [ADVAPI32.@]
1641  *
1642  * PARAMS
1643  *   lpLuid []
1644  */
1645 BOOL WINAPI AllocateLocallyUniqueId( PLUID lpLuid )
1646 {
1647     return set_ntstatus(NtAllocateLocallyUniqueId(lpLuid));
1648 }
1649
1650 static const WCHAR SE_CREATE_TOKEN_NAME_W[] =
1651  { 'S','e','C','r','e','a','t','e','T','o','k','e','n','P','r','i','v','i','l','e','g','e',0 };
1652 static const WCHAR SE_ASSIGNPRIMARYTOKEN_NAME_W[] =
1653  { 'S','e','A','s','s','i','g','n','P','r','i','m','a','r','y','T','o','k','e','n','P','r','i','v','i','l','e','g','e',0 };
1654 static const WCHAR SE_LOCK_MEMORY_NAME_W[] =
1655  { 'S','e','L','o','c','k','M','e','m','o','r','y','P','r','i','v','i','l','e','g','e',0 };
1656 static const WCHAR SE_INCREASE_QUOTA_NAME_W[] =
1657  { 'S','e','I','n','c','r','e','a','s','e','Q','u','o','t','a','P','r','i','v','i','l','e','g','e',0 };
1658 static const WCHAR SE_MACHINE_ACCOUNT_NAME_W[] =
1659  { 'S','e','M','a','c','h','i','n','e','A','c','c','o','u','n','t','P','r','i','v','i','l','e','g','e',0 };
1660 static const WCHAR SE_TCB_NAME_W[] =
1661  { 'S','e','T','c','b','P','r','i','v','i','l','e','g','e',0 };
1662 static const WCHAR SE_SECURITY_NAME_W[] =
1663  { 'S','e','S','e','c','u','r','i','t','y','P','r','i','v','i','l','e','g','e',0 };
1664 static const WCHAR SE_TAKE_OWNERSHIP_NAME_W[] =
1665  { 'S','e','T','a','k','e','O','w','n','e','r','s','h','i','p','P','r','i','v','i','l','e','g','e',0 };
1666 static const WCHAR SE_LOAD_DRIVER_NAME_W[] =
1667  { 'S','e','L','o','a','d','D','r','i','v','e','r','P','r','i','v','i','l','e','g','e',0 };
1668 static const WCHAR SE_SYSTEM_PROFILE_NAME_W[] =
1669  { 'S','e','S','y','s','t','e','m','P','r','o','f','i','l','e','P','r','i','v','i','l','e','g','e',0 };
1670 static const WCHAR SE_SYSTEMTIME_NAME_W[] =
1671  { 'S','e','S','y','s','t','e','m','t','i','m','e','P','r','i','v','i','l','e','g','e',0 };
1672 static const WCHAR SE_PROF_SINGLE_PROCESS_NAME_W[] =
1673  { 'S','e','P','r','o','f','i','l','e','S','i','n','g','l','e','P','r','o','c','e','s','s','P','r','i','v','i','l','e','g','e',0 };
1674 static const WCHAR SE_INC_BASE_PRIORITY_NAME_W[] =
1675  { 'S','e','I','n','c','r','e','a','s','e','B','a','s','e','P','r','i','o','r','i','t','y','P','r','i','v','i','l','e','g','e',0 };
1676 static const WCHAR SE_CREATE_PAGEFILE_NAME_W[] =
1677  { 'S','e','C','r','e','a','t','e','P','a','g','e','f','i','l','e','P','r','i','v','i','l','e','g','e',0 };
1678 static const WCHAR SE_CREATE_PERMANENT_NAME_W[] =
1679  { 'S','e','C','r','e','a','t','e','P','e','r','m','a','n','e','n','t','P','r','i','v','i','l','e','g','e',0 };
1680 static const WCHAR SE_BACKUP_NAME_W[] =
1681  { 'S','e','B','a','c','k','u','p','P','r','i','v','i','l','e','g','e',0 };
1682 static const WCHAR SE_RESTORE_NAME_W[] =
1683  { 'S','e','R','e','s','t','o','r','e','P','r','i','v','i','l','e','g','e',0 };
1684 static const WCHAR SE_SHUTDOWN_NAME_W[] =
1685  { 'S','e','S','h','u','t','d','o','w','n','P','r','i','v','i','l','e','g','e',0 };
1686 static const WCHAR SE_DEBUG_NAME_W[] =
1687  { 'S','e','D','e','b','u','g','P','r','i','v','i','l','e','g','e',0 };
1688 static const WCHAR SE_AUDIT_NAME_W[] =
1689  { 'S','e','A','u','d','i','t','P','r','i','v','i','l','e','g','e',0 };
1690 static const WCHAR SE_SYSTEM_ENVIRONMENT_NAME_W[] =
1691  { 'S','e','S','y','s','t','e','m','E','n','v','i','r','o','n','m','e','n','t','P','r','i','v','i','l','e','g','e',0 };
1692 static const WCHAR SE_CHANGE_NOTIFY_NAME_W[] =
1693  { 'S','e','C','h','a','n','g','e','N','o','t','i','f','y','P','r','i','v','i','l','e','g','e',0 };
1694 static const WCHAR SE_REMOTE_SHUTDOWN_NAME_W[] =
1695  { 'S','e','R','e','m','o','t','e','S','h','u','t','d','o','w','n','P','r','i','v','i','l','e','g','e',0 };
1696 static const WCHAR SE_UNDOCK_NAME_W[] =
1697  { 'S','e','U','n','d','o','c','k','P','r','i','v','i','l','e','g','e',0 };
1698 static const WCHAR SE_SYNC_AGENT_NAME_W[] =
1699  { 'S','e','S','y','n','c','A','g','e','n','t','P','r','i','v','i','l','e','g','e',0 };
1700 static const WCHAR SE_ENABLE_DELEGATION_NAME_W[] =
1701  { 'S','e','E','n','a','b','l','e','D','e','l','e','g','a','t','i','o','n','P','r','i','v','i','l','e','g','e',0 };
1702 static const WCHAR SE_MANAGE_VOLUME_NAME_W[] =
1703  { 'S','e','M','a','n','a','g','e','V','o','l','u','m','e','P','r','i','v','i','l','e','g','e',0 };
1704 static const WCHAR SE_IMPERSONATE_NAME_W[] =
1705  { 'S','e','I','m','p','e','r','s','o','n','a','t','e','P','r','i','v','i','l','e','g','e',0 };
1706 static const WCHAR SE_CREATE_GLOBAL_NAME_W[] =
1707  { 'S','e','C','r','e','a','t','e','G','l','o','b','a','l','P','r','i','v','i','l','e','g','e',0 };
1708
1709 static const WCHAR * const WellKnownPrivNames[SE_MAX_WELL_KNOWN_PRIVILEGE + 1] =
1710 {
1711     NULL,
1712     NULL,
1713     SE_CREATE_TOKEN_NAME_W,
1714     SE_ASSIGNPRIMARYTOKEN_NAME_W,
1715     SE_LOCK_MEMORY_NAME_W,
1716     SE_INCREASE_QUOTA_NAME_W,
1717     SE_MACHINE_ACCOUNT_NAME_W,
1718     SE_TCB_NAME_W,
1719     SE_SECURITY_NAME_W,
1720     SE_TAKE_OWNERSHIP_NAME_W,
1721     SE_LOAD_DRIVER_NAME_W,
1722     SE_SYSTEM_PROFILE_NAME_W,
1723     SE_SYSTEMTIME_NAME_W,
1724     SE_PROF_SINGLE_PROCESS_NAME_W,
1725     SE_INC_BASE_PRIORITY_NAME_W,
1726     SE_CREATE_PAGEFILE_NAME_W,
1727     SE_CREATE_PERMANENT_NAME_W,
1728     SE_BACKUP_NAME_W,
1729     SE_RESTORE_NAME_W,
1730     SE_SHUTDOWN_NAME_W,
1731     SE_DEBUG_NAME_W,
1732     SE_AUDIT_NAME_W,
1733     SE_SYSTEM_ENVIRONMENT_NAME_W,
1734     SE_CHANGE_NOTIFY_NAME_W,
1735     SE_REMOTE_SHUTDOWN_NAME_W,
1736     SE_UNDOCK_NAME_W,
1737     SE_SYNC_AGENT_NAME_W,
1738     SE_ENABLE_DELEGATION_NAME_W,
1739     SE_MANAGE_VOLUME_NAME_W,
1740     SE_IMPERSONATE_NAME_W,
1741     SE_CREATE_GLOBAL_NAME_W,
1742 };
1743
1744 /******************************************************************************
1745  * LookupPrivilegeValueW                        [ADVAPI32.@]
1746  *
1747  * See LookupPrivilegeValueA.
1748  */
1749 BOOL WINAPI
1750 LookupPrivilegeValueW( LPCWSTR lpSystemName, LPCWSTR lpName, PLUID lpLuid )
1751 {
1752     UINT i;
1753
1754     TRACE("%s,%s,%p\n",debugstr_w(lpSystemName), debugstr_w(lpName), lpLuid);
1755
1756     if (!ADVAPI_IsLocalComputer(lpSystemName))
1757     {
1758         SetLastError(RPC_S_SERVER_UNAVAILABLE);
1759         return FALSE;
1760     }
1761     if (!lpName)
1762     {
1763         SetLastError(ERROR_NO_SUCH_PRIVILEGE);
1764         return FALSE;
1765     }
1766     for( i=SE_MIN_WELL_KNOWN_PRIVILEGE; i<=SE_MAX_WELL_KNOWN_PRIVILEGE; i++ )
1767     {
1768         if( !WellKnownPrivNames[i] )
1769             continue;
1770         if( strcmpiW( WellKnownPrivNames[i], lpName) )
1771             continue;
1772         lpLuid->LowPart = i;
1773         lpLuid->HighPart = 0;
1774         TRACE( "%s -> %08x-%08x\n",debugstr_w( lpSystemName ),
1775                lpLuid->HighPart, lpLuid->LowPart );
1776         return TRUE;
1777     }
1778     SetLastError(ERROR_NO_SUCH_PRIVILEGE);
1779     return FALSE;
1780 }
1781
1782 /******************************************************************************
1783  * LookupPrivilegeValueA                        [ADVAPI32.@]
1784  *
1785  * Retrieves LUID used on a system to represent the privilege name.
1786  *
1787  * PARAMS
1788  *  lpSystemName [I] Name of the system
1789  *  lpName       [I] Name of the privilege
1790  *  lpLuid       [O] Destination for the resulting LUID
1791  *
1792  * RETURNS
1793  *  Success: TRUE. lpLuid contains the requested LUID.
1794  *  Failure: FALSE.
1795  */
1796 BOOL WINAPI
1797 LookupPrivilegeValueA( LPCSTR lpSystemName, LPCSTR lpName, PLUID lpLuid )
1798 {
1799     UNICODE_STRING lpSystemNameW;
1800     UNICODE_STRING lpNameW;
1801     BOOL ret;
1802
1803     RtlCreateUnicodeStringFromAsciiz(&lpSystemNameW, lpSystemName);
1804     RtlCreateUnicodeStringFromAsciiz(&lpNameW,lpName);
1805     ret = LookupPrivilegeValueW(lpSystemNameW.Buffer, lpNameW.Buffer, lpLuid);
1806     RtlFreeUnicodeString(&lpNameW);
1807     RtlFreeUnicodeString(&lpSystemNameW);
1808     return ret;
1809 }
1810
1811 BOOL WINAPI LookupPrivilegeDisplayNameA( LPCSTR lpSystemName, LPCSTR lpName, LPSTR lpDisplayName,
1812                                          LPDWORD cchDisplayName, LPDWORD lpLanguageId )
1813 {
1814     FIXME("%s %s %s %p %p - stub\n", debugstr_a(lpSystemName), debugstr_a(lpName),
1815           debugstr_a(lpDisplayName), cchDisplayName, lpLanguageId);
1816
1817     return FALSE;
1818 }
1819
1820 BOOL WINAPI LookupPrivilegeDisplayNameW( LPCWSTR lpSystemName, LPCWSTR lpName, LPWSTR lpDisplayName,
1821                                          LPDWORD cchDisplayName, LPDWORD lpLanguageId )
1822 {
1823     FIXME("%s %s %s %p %p - stub\n", debugstr_w(lpSystemName), debugstr_w(lpName),
1824           debugstr_w(lpDisplayName), cchDisplayName, lpLanguageId);
1825
1826     return FALSE;
1827 }
1828
1829 /******************************************************************************
1830  * LookupPrivilegeNameA                 [ADVAPI32.@]
1831  *
1832  * See LookupPrivilegeNameW.
1833  */
1834 BOOL WINAPI
1835 LookupPrivilegeNameA( LPCSTR lpSystemName, PLUID lpLuid, LPSTR lpName,
1836  LPDWORD cchName)
1837 {
1838     UNICODE_STRING lpSystemNameW;
1839     BOOL ret;
1840     DWORD wLen = 0;
1841
1842     TRACE("%s %p %p %p\n", debugstr_a(lpSystemName), lpLuid, lpName, cchName);
1843
1844     RtlCreateUnicodeStringFromAsciiz(&lpSystemNameW, lpSystemName);
1845     ret = LookupPrivilegeNameW(lpSystemNameW.Buffer, lpLuid, NULL, &wLen);
1846     if (!ret && GetLastError() == ERROR_INSUFFICIENT_BUFFER)
1847     {
1848         LPWSTR lpNameW = HeapAlloc(GetProcessHeap(), 0, wLen * sizeof(WCHAR));
1849
1850         ret = LookupPrivilegeNameW(lpSystemNameW.Buffer, lpLuid, lpNameW,
1851          &wLen);
1852         if (ret)
1853         {
1854             /* Windows crashes if cchName is NULL, so will I */
1855             unsigned int len = WideCharToMultiByte(CP_ACP, 0, lpNameW, -1, lpName,
1856              *cchName, NULL, NULL);
1857
1858             if (len == 0)
1859             {
1860                 /* WideCharToMultiByte failed */
1861                 ret = FALSE;
1862             }
1863             else if (len > *cchName)
1864             {
1865                 *cchName = len;
1866                 SetLastError(ERROR_INSUFFICIENT_BUFFER);
1867                 ret = FALSE;
1868             }
1869             else
1870             {
1871                 /* WideCharToMultiByte succeeded, output length needs to be
1872                  * length not including NULL terminator
1873                  */
1874                 *cchName = len - 1;
1875             }
1876         }
1877         HeapFree(GetProcessHeap(), 0, lpNameW);
1878     }
1879     RtlFreeUnicodeString(&lpSystemNameW);
1880     return ret;
1881 }
1882
1883 /******************************************************************************
1884  * LookupPrivilegeNameW                 [ADVAPI32.@]
1885  *
1886  * Retrieves the privilege name referred to by the LUID lpLuid.
1887  *
1888  * PARAMS
1889  *  lpSystemName [I]   Name of the system
1890  *  lpLuid       [I]   Privilege value
1891  *  lpName       [O]   Name of the privilege
1892  *  cchName      [I/O] Number of characters in lpName.
1893  *
1894  * RETURNS
1895  *  Success: TRUE. lpName contains the name of the privilege whose value is
1896  *  *lpLuid.
1897  *  Failure: FALSE.
1898  *
1899  * REMARKS
1900  *  Only well-known privilege names (those defined in winnt.h) can be retrieved
1901  *  using this function.
1902  *  If the length of lpName is too small, on return *cchName will contain the
1903  *  number of WCHARs needed to contain the privilege, including the NULL
1904  *  terminator, and GetLastError will return ERROR_INSUFFICIENT_BUFFER.
1905  *  On success, *cchName will contain the number of characters stored in
1906  *  lpName, NOT including the NULL terminator.
1907  */
1908 BOOL WINAPI
1909 LookupPrivilegeNameW( LPCWSTR lpSystemName, PLUID lpLuid, LPWSTR lpName,
1910  LPDWORD cchName)
1911 {
1912     size_t privNameLen;
1913
1914     TRACE("%s,%p,%p,%p\n",debugstr_w(lpSystemName), lpLuid, lpName, cchName);
1915
1916     if (!ADVAPI_IsLocalComputer(lpSystemName))
1917     {
1918         SetLastError(RPC_S_SERVER_UNAVAILABLE);
1919         return FALSE;
1920     }
1921     if (lpLuid->HighPart || (lpLuid->LowPart < SE_MIN_WELL_KNOWN_PRIVILEGE ||
1922      lpLuid->LowPart > SE_MAX_WELL_KNOWN_PRIVILEGE))
1923     {
1924         SetLastError(ERROR_NO_SUCH_PRIVILEGE);
1925         return FALSE;
1926     }
1927     privNameLen = strlenW(WellKnownPrivNames[lpLuid->LowPart]);
1928     /* Windows crashes if cchName is NULL, so will I */
1929     if (*cchName <= privNameLen)
1930     {
1931         *cchName = privNameLen + 1;
1932         SetLastError(ERROR_INSUFFICIENT_BUFFER);
1933         return FALSE;
1934     }
1935     else
1936     {
1937         strcpyW(lpName, WellKnownPrivNames[lpLuid->LowPart]);
1938         *cchName = privNameLen;
1939         return TRUE;
1940     }
1941 }
1942
1943 /******************************************************************************
1944  * GetFileSecurityA [ADVAPI32.@]
1945  *
1946  * Obtains Specified information about the security of a file or directory.
1947  *
1948  * PARAMS
1949  *  lpFileName           [I] Name of the file to get info for
1950  *  RequestedInformation [I] SE_ flags from "winnt.h"
1951  *  pSecurityDescriptor  [O] Destination for security information
1952  *  nLength              [I] Length of pSecurityDescriptor
1953  *  lpnLengthNeeded      [O] Destination for length of returned security information
1954  *
1955  * RETURNS
1956  *  Success: TRUE. pSecurityDescriptor contains the requested information.
1957  *  Failure: FALSE. lpnLengthNeeded contains the required space to return the info. 
1958  *
1959  * NOTES
1960  *  The information returned is constrained by the callers access rights and
1961  *  privileges.
1962  */
1963 BOOL WINAPI
1964 GetFileSecurityA( LPCSTR lpFileName,
1965                     SECURITY_INFORMATION RequestedInformation,
1966                     PSECURITY_DESCRIPTOR pSecurityDescriptor,
1967                     DWORD nLength, LPDWORD lpnLengthNeeded )
1968 {
1969     DWORD len;
1970     BOOL r;
1971     LPWSTR name = NULL;
1972
1973     if( lpFileName )
1974     {
1975         len = MultiByteToWideChar( CP_ACP, 0, lpFileName, -1, NULL, 0 );
1976         name = HeapAlloc( GetProcessHeap(), 0, len*sizeof(WCHAR) );
1977         MultiByteToWideChar( CP_ACP, 0, lpFileName, -1, name, len );
1978     }
1979
1980     r = GetFileSecurityW( name, RequestedInformation, pSecurityDescriptor,
1981                           nLength, lpnLengthNeeded );
1982     HeapFree( GetProcessHeap(), 0, name );
1983
1984     return r;
1985 }
1986
1987 /******************************************************************************
1988  * GetFileSecurityW [ADVAPI32.@]
1989  *
1990  * See GetFileSecurityA.
1991  */
1992 BOOL WINAPI
1993 GetFileSecurityW( LPCWSTR lpFileName,
1994                     SECURITY_INFORMATION RequestedInformation,
1995                     PSECURITY_DESCRIPTOR pSecurityDescriptor,
1996                     DWORD nLength, LPDWORD lpnLengthNeeded )
1997 {
1998     HANDLE hfile;
1999     NTSTATUS status;
2000     DWORD access = 0;
2001
2002     TRACE("(%s,%d,%p,%d,%p)\n", debugstr_w(lpFileName),
2003           RequestedInformation, pSecurityDescriptor,
2004           nLength, lpnLengthNeeded);
2005
2006     if (RequestedInformation & (OWNER_SECURITY_INFORMATION|GROUP_SECURITY_INFORMATION|
2007                                 DACL_SECURITY_INFORMATION))
2008         access |= READ_CONTROL;
2009     if (RequestedInformation & SACL_SECURITY_INFORMATION)
2010         access |= ACCESS_SYSTEM_SECURITY;
2011
2012     hfile = CreateFileW( lpFileName, access, FILE_SHARE_READ|FILE_SHARE_WRITE|FILE_SHARE_DELETE,
2013                          NULL, OPEN_EXISTING, FILE_FLAG_BACKUP_SEMANTICS, 0 );
2014     if ( hfile == INVALID_HANDLE_VALUE )
2015         return FALSE;
2016
2017     status = NtQuerySecurityObject( hfile, RequestedInformation, pSecurityDescriptor,
2018                                     nLength, lpnLengthNeeded );
2019     CloseHandle( hfile );
2020     return set_ntstatus( status );
2021 }
2022
2023
2024 /******************************************************************************
2025  * LookupAccountSidA [ADVAPI32.@]
2026  */
2027 BOOL WINAPI
2028 LookupAccountSidA(
2029         IN LPCSTR system,
2030         IN PSID sid,
2031         OUT LPSTR account,
2032         IN OUT LPDWORD accountSize,
2033         OUT LPSTR domain,
2034         IN OUT LPDWORD domainSize,
2035         OUT PSID_NAME_USE name_use )
2036 {
2037     DWORD len;
2038     BOOL r;
2039     LPWSTR systemW = NULL;
2040     LPWSTR accountW = NULL;
2041     LPWSTR domainW = NULL;
2042     DWORD accountSizeW = *accountSize;
2043     DWORD domainSizeW = *domainSize;
2044
2045     if (system) {
2046         len = MultiByteToWideChar( CP_ACP, 0, system, -1, NULL, 0 );
2047         systemW = HeapAlloc( GetProcessHeap(), 0, len * sizeof(WCHAR) );
2048         MultiByteToWideChar( CP_ACP, 0, system, -1, systemW, len );
2049     }
2050     if (account)
2051         accountW = HeapAlloc( GetProcessHeap(), 0, accountSizeW * sizeof(WCHAR) );
2052     if (domain)
2053         domainW = HeapAlloc( GetProcessHeap(), 0, domainSizeW * sizeof(WCHAR) );
2054
2055     r = LookupAccountSidW( systemW, sid, accountW, &accountSizeW, domainW, &domainSizeW, name_use );
2056
2057     if (r) {
2058         if (accountW && *accountSize) {
2059             len = WideCharToMultiByte( CP_ACP, 0, accountW, -1, NULL, 0, NULL, NULL );
2060             WideCharToMultiByte( CP_ACP, 0, accountW, -1, account, len, NULL, NULL );
2061             *accountSize = len;
2062         } else
2063             *accountSize = accountSizeW + 1;
2064
2065         if (domainW && *domainSize) {
2066             len = WideCharToMultiByte( CP_ACP, 0, domainW, -1, NULL, 0, NULL, NULL );
2067             WideCharToMultiByte( CP_ACP, 0, domainW, -1, domain, len, NULL, NULL );
2068             *domainSize = len;
2069         } else
2070             *domainSize = domainSizeW + 1;
2071     }
2072     else
2073     {
2074         *accountSize = accountSizeW + 1;
2075         *domainSize = domainSizeW + 1;
2076     }
2077
2078     HeapFree( GetProcessHeap(), 0, systemW );
2079     HeapFree( GetProcessHeap(), 0, accountW );
2080     HeapFree( GetProcessHeap(), 0, domainW );
2081
2082     return r;
2083 }
2084
2085 /******************************************************************************
2086  * LookupAccountSidW [ADVAPI32.@]
2087  *
2088  * PARAMS
2089  *   system      []
2090  *   sid         []
2091  *   account     []
2092  *   accountSize []
2093  *   domain      []
2094  *   domainSize  []
2095  *   name_use    []
2096  */
2097
2098 BOOL WINAPI
2099 LookupAccountSidW(
2100         IN LPCWSTR system,
2101         IN PSID sid,
2102         OUT LPWSTR account,
2103         IN OUT LPDWORD accountSize,
2104         OUT LPWSTR domain,
2105         IN OUT LPDWORD domainSize,
2106         OUT PSID_NAME_USE name_use )
2107 {
2108     unsigned int i, j;
2109     const WCHAR * ac = NULL;
2110     const WCHAR * dm = NULL;
2111     SID_NAME_USE use = 0;
2112     LPWSTR computer_name = NULL;
2113     LPWSTR account_name = NULL;
2114
2115     TRACE("(%s,sid=%s,%p,%p(%u),%p,%p(%u),%p)\n",
2116           debugstr_w(system),debugstr_sid(sid),
2117           account,accountSize,accountSize?*accountSize:0,
2118           domain,domainSize,domainSize?*domainSize:0,
2119           name_use);
2120
2121     if (!ADVAPI_IsLocalComputer(system)) {
2122         FIXME("Only local computer supported!\n");
2123         SetLastError(RPC_S_SERVER_UNAVAILABLE);
2124         return FALSE;
2125     }
2126
2127     /* check the well known SIDs first */
2128     for (i = 0; i <= 60; i++) {
2129         if (IsWellKnownSid(sid, i)) {
2130             for (j = 0; j < (sizeof(ACCOUNT_SIDS) / sizeof(ACCOUNT_SIDS[0])); j++) {
2131                 if (ACCOUNT_SIDS[j].type == i) {
2132                     ac = ACCOUNT_SIDS[j].account;
2133                     dm = ACCOUNT_SIDS[j].domain;
2134                     use = ACCOUNT_SIDS[j].name_use;
2135                 }
2136             }
2137             break;
2138         }
2139     }
2140
2141     if (dm == NULL) {
2142         MAX_SID local;
2143
2144         /* check for the local computer next */
2145         if (ADVAPI_GetComputerSid(&local)) {
2146             DWORD size = MAX_COMPUTERNAME_LENGTH + 1;
2147             BOOL result;
2148
2149             computer_name = HeapAlloc(GetProcessHeap(), 0, size * sizeof(WCHAR));
2150             result = GetComputerNameW(computer_name,  &size);
2151
2152             if (result) {
2153                 if (EqualSid(sid, &local)) {
2154                     dm = computer_name;
2155                     ac = Blank;
2156                     use = 3;
2157                 } else {
2158                     local.SubAuthorityCount++;
2159
2160                     if (EqualPrefixSid(sid, &local)) {
2161                         dm = computer_name;
2162                         use = 1;
2163                         switch (((MAX_SID *)sid)->SubAuthority[4]) {
2164                         case DOMAIN_USER_RID_ADMIN:
2165                             ac = Administrator;
2166                             break;
2167                         case DOMAIN_USER_RID_GUEST:
2168                             ac = Guest;
2169                             break;
2170                         case DOMAIN_GROUP_RID_ADMINS:
2171                             ac = Domain_Admins;
2172                             break;
2173                         case DOMAIN_GROUP_RID_USERS:
2174                             ac = Domain_Users;
2175                             break;
2176                         case DOMAIN_GROUP_RID_GUESTS:
2177                             ac = Domain_Guests;
2178                             break;
2179                         case DOMAIN_GROUP_RID_COMPUTERS:
2180                             ac = Domain_Computers;
2181                             break;
2182                         case DOMAIN_GROUP_RID_CONTROLLERS:
2183                             ac = Domain_Controllers;
2184                             break;
2185                         case DOMAIN_GROUP_RID_CERT_ADMINS:
2186                             ac = Cert_Publishers;
2187                             break;
2188                         case DOMAIN_GROUP_RID_SCHEMA_ADMINS:
2189                             ac = Schema_Admins;
2190                             break;
2191                         case DOMAIN_GROUP_RID_ENTERPRISE_ADMINS:
2192                             ac = Enterprise_Admins;
2193                             break;
2194                         case DOMAIN_GROUP_RID_POLICY_ADMINS:
2195                             ac = Group_Policy_Creator_Owners;
2196                             break;
2197                         case DOMAIN_ALIAS_RID_RAS_SERVERS:
2198                             ac = RAS_and_IAS_Servers;
2199                             break;
2200                         case 1000:      /* first user account */
2201                             size = UNLEN + 1;
2202                             account_name = HeapAlloc(
2203                                 GetProcessHeap(), 0, size * sizeof(WCHAR));
2204                             if (GetUserNameW(account_name, &size))
2205                                 ac = account_name;
2206                             else
2207                                 dm = NULL;
2208
2209                             break;
2210                         default:
2211                             dm = NULL;
2212                             break;
2213                         }
2214                     }
2215                 }
2216             }
2217         }
2218     }
2219
2220     if (dm) {
2221         DWORD ac_len = lstrlenW(ac);
2222         DWORD dm_len = lstrlenW(dm);
2223         BOOL status = TRUE;
2224
2225         if (*accountSize > ac_len) {
2226             if (account)
2227                 lstrcpyW(account, ac);
2228         }
2229         if (*domainSize > dm_len) {
2230             if (domain)
2231                 lstrcpyW(domain, dm);
2232         }
2233         if ((*accountSize && *accountSize < ac_len) ||
2234             (!account && !*accountSize && ac_len)   ||
2235             (*domainSize && *domainSize < dm_len)   ||
2236             (!domain && !*domainSize && dm_len))
2237         {
2238             SetLastError(ERROR_INSUFFICIENT_BUFFER);
2239             status = FALSE;
2240         }
2241         if (*domainSize)
2242             *domainSize = dm_len;
2243         else
2244             *domainSize = dm_len + 1;
2245         if (*accountSize)
2246             *accountSize = ac_len;
2247         else
2248             *accountSize = ac_len + 1;
2249
2250         HeapFree(GetProcessHeap(), 0, account_name);
2251         HeapFree(GetProcessHeap(), 0, computer_name);
2252         if (status) *name_use = use;
2253         return status;
2254     }
2255
2256     HeapFree(GetProcessHeap(), 0, account_name);
2257     HeapFree(GetProcessHeap(), 0, computer_name);
2258     SetLastError(ERROR_NONE_MAPPED);
2259     return FALSE;
2260 }
2261
2262 /******************************************************************************
2263  * SetFileSecurityA [ADVAPI32.@]
2264  *
2265  * See SetFileSecurityW.
2266  */
2267 BOOL WINAPI SetFileSecurityA( LPCSTR lpFileName,
2268                                 SECURITY_INFORMATION RequestedInformation,
2269                                 PSECURITY_DESCRIPTOR pSecurityDescriptor)
2270 {
2271     DWORD len;
2272     BOOL r;
2273     LPWSTR name = NULL;
2274
2275     if( lpFileName )
2276     {
2277         len = MultiByteToWideChar( CP_ACP, 0, lpFileName, -1, NULL, 0 );
2278         name = HeapAlloc( GetProcessHeap(), 0, len*sizeof(WCHAR) );
2279         MultiByteToWideChar( CP_ACP, 0, lpFileName, -1, name, len );
2280     }
2281
2282     r = SetFileSecurityW( name, RequestedInformation, pSecurityDescriptor );
2283     HeapFree( GetProcessHeap(), 0, name );
2284
2285     return r;
2286 }
2287
2288 /******************************************************************************
2289  * SetFileSecurityW [ADVAPI32.@]
2290  *
2291  * Sets the security of a file or directory.
2292  *
2293  * PARAMS
2294  *   lpFileName           []
2295  *   RequestedInformation []
2296  *   pSecurityDescriptor  []
2297  *
2298  * RETURNS
2299  *  Success: TRUE.
2300  *  Failure: FALSE.
2301  */
2302 BOOL WINAPI
2303 SetFileSecurityW( LPCWSTR lpFileName,
2304                     SECURITY_INFORMATION RequestedInformation,
2305                     PSECURITY_DESCRIPTOR pSecurityDescriptor )
2306 {
2307     HANDLE file;
2308     DWORD access = 0;
2309     NTSTATUS status;
2310
2311     TRACE("(%s, 0x%x, %p)\n", debugstr_w(lpFileName), RequestedInformation,
2312           pSecurityDescriptor );
2313
2314     if (RequestedInformation & OWNER_SECURITY_INFORMATION ||
2315         RequestedInformation & GROUP_SECURITY_INFORMATION)
2316         access |= WRITE_OWNER;
2317     if (RequestedInformation & SACL_SECURITY_INFORMATION)
2318         access |= ACCESS_SYSTEM_SECURITY;
2319     if (RequestedInformation & DACL_SECURITY_INFORMATION)
2320         access |= WRITE_DAC;
2321
2322     file = CreateFileW( lpFileName, access, FILE_SHARE_READ|FILE_SHARE_WRITE|FILE_SHARE_DELETE,
2323                         NULL, OPEN_EXISTING, FILE_FLAG_BACKUP_SEMANTICS, NULL );
2324     if (file == INVALID_HANDLE_VALUE)
2325         return FALSE;
2326
2327     status = NtSetSecurityObject( file, RequestedInformation, pSecurityDescriptor );
2328     CloseHandle( file );
2329     return set_ntstatus( status );
2330 }
2331
2332 /******************************************************************************
2333  * QueryWindows31FilesMigration [ADVAPI32.@]
2334  *
2335  * PARAMS
2336  *   x1 []
2337  */
2338 BOOL WINAPI
2339 QueryWindows31FilesMigration( DWORD x1 )
2340 {
2341         FIXME("(%d):stub\n",x1);
2342         return TRUE;
2343 }
2344
2345 /******************************************************************************
2346  * SynchronizeWindows31FilesAndWindowsNTRegistry [ADVAPI32.@]
2347  *
2348  * PARAMS
2349  *   x1 []
2350  *   x2 []
2351  *   x3 []
2352  *   x4 []
2353  */
2354 BOOL WINAPI
2355 SynchronizeWindows31FilesAndWindowsNTRegistry( DWORD x1, DWORD x2, DWORD x3,
2356                                                DWORD x4 )
2357 {
2358         FIXME("(0x%08x,0x%08x,0x%08x,0x%08x):stub\n",x1,x2,x3,x4);
2359         return TRUE;
2360 }
2361
2362 /******************************************************************************
2363  * NotifyBootConfigStatus [ADVAPI32.@]
2364  *
2365  * PARAMS
2366  *   x1 []
2367  */
2368 BOOL WINAPI
2369 NotifyBootConfigStatus( BOOL x1 )
2370 {
2371         FIXME("(0x%08d):stub\n",x1);
2372         return 1;
2373 }
2374
2375 /******************************************************************************
2376  * RevertToSelf [ADVAPI32.@]
2377  *
2378  * Ends the impersonation of a user.
2379  *
2380  * PARAMS
2381  *   void []
2382  *
2383  * RETURNS
2384  *  Success: TRUE.
2385  *  Failure: FALSE.
2386  */
2387 BOOL WINAPI
2388 RevertToSelf( void )
2389 {
2390     HANDLE Token = NULL;
2391     return set_ntstatus( NtSetInformationThread( GetCurrentThread(),
2392         ThreadImpersonationToken, &Token, sizeof(Token) ) );
2393 }
2394
2395 /******************************************************************************
2396  * ImpersonateSelf [ADVAPI32.@]
2397  *
2398  * Makes an impersonation token that represents the process user and assigns
2399  * to the current thread.
2400  *
2401  * PARAMS
2402  *  ImpersonationLevel [I] Level at which to impersonate.
2403  *
2404  * RETURNS
2405  *  Success: TRUE.
2406  *  Failure: FALSE.
2407  */
2408 BOOL WINAPI
2409 ImpersonateSelf(SECURITY_IMPERSONATION_LEVEL ImpersonationLevel)
2410 {
2411     return set_ntstatus( RtlImpersonateSelf( ImpersonationLevel ) );
2412 }
2413
2414 /******************************************************************************
2415  * ImpersonateLoggedOnUser [ADVAPI32.@]
2416  */
2417 BOOL WINAPI ImpersonateLoggedOnUser(HANDLE hToken)
2418 {
2419     DWORD size;
2420     NTSTATUS Status;
2421     HANDLE ImpersonationToken;
2422     TOKEN_TYPE Type;
2423     static BOOL warn = TRUE;
2424
2425     if (warn)
2426     {
2427         FIXME( "(%p)\n", hToken );
2428         warn = FALSE;
2429     }
2430     if (!GetTokenInformation( hToken, TokenType, &Type,
2431                               sizeof(TOKEN_TYPE), &size ))
2432         return FALSE;
2433
2434     if (Type == TokenPrimary)
2435     {
2436         OBJECT_ATTRIBUTES ObjectAttributes;
2437
2438         InitializeObjectAttributes( &ObjectAttributes, NULL, 0, NULL, NULL );
2439
2440         Status = NtDuplicateToken( hToken,
2441                                    TOKEN_IMPERSONATE | TOKEN_QUERY,
2442                                    &ObjectAttributes,
2443                                    SecurityImpersonation,
2444                                    TokenImpersonation,
2445                                    &ImpersonationToken );
2446         if (Status != STATUS_SUCCESS)
2447         {
2448             ERR( "NtDuplicateToken failed with error 0x%08x\n", Status );
2449             SetLastError( RtlNtStatusToDosError( Status ) );
2450             return FALSE;
2451         }
2452     }
2453     else
2454         ImpersonationToken = hToken;
2455
2456     Status = NtSetInformationThread( GetCurrentThread(),
2457                                      ThreadImpersonationToken,
2458                                      &ImpersonationToken,
2459                                      sizeof(ImpersonationToken) );
2460
2461     if (Type == TokenPrimary)
2462         NtClose( ImpersonationToken );
2463
2464     if (Status != STATUS_SUCCESS)
2465     {
2466         ERR( "NtSetInformationThread failed with error 0x%08x\n", Status );
2467         SetLastError( RtlNtStatusToDosError( Status ) );
2468         return FALSE;
2469     }
2470
2471     return TRUE;
2472 }
2473
2474 /******************************************************************************
2475  * AccessCheck [ADVAPI32.@]
2476  */
2477 BOOL WINAPI
2478 AccessCheck(
2479         PSECURITY_DESCRIPTOR SecurityDescriptor,
2480         HANDLE ClientToken,
2481         DWORD DesiredAccess,
2482         PGENERIC_MAPPING GenericMapping,
2483         PPRIVILEGE_SET PrivilegeSet,
2484         LPDWORD PrivilegeSetLength,
2485         LPDWORD GrantedAccess,
2486         LPBOOL AccessStatus)
2487 {
2488     NTSTATUS access_status;
2489     BOOL ret = set_ntstatus( NtAccessCheck(SecurityDescriptor, ClientToken, DesiredAccess,
2490                                            GenericMapping, PrivilegeSet, PrivilegeSetLength,
2491                                            GrantedAccess, &access_status) );
2492     if (ret) *AccessStatus = set_ntstatus( access_status );
2493     return ret;
2494 }
2495
2496
2497 /******************************************************************************
2498  * AccessCheckByType [ADVAPI32.@]
2499  */
2500 BOOL WINAPI AccessCheckByType(
2501     PSECURITY_DESCRIPTOR pSecurityDescriptor, 
2502     PSID PrincipalSelfSid,
2503     HANDLE ClientToken, 
2504     DWORD DesiredAccess, 
2505     POBJECT_TYPE_LIST ObjectTypeList,
2506     DWORD ObjectTypeListLength,
2507     PGENERIC_MAPPING GenericMapping,
2508     PPRIVILEGE_SET PrivilegeSet,
2509     LPDWORD PrivilegeSetLength, 
2510     LPDWORD GrantedAccess,
2511     LPBOOL AccessStatus)
2512 {
2513         FIXME("stub\n");
2514
2515         *AccessStatus = TRUE;
2516
2517         return !*AccessStatus;
2518 }
2519
2520 /******************************************************************************
2521  * MapGenericMask [ADVAPI32.@]
2522  *
2523  * Maps generic access rights into specific access rights according to the
2524  * supplied mapping.
2525  *
2526  * PARAMS
2527  *  AccessMask     [I/O] Access rights.
2528  *  GenericMapping [I] The mapping between generic and specific rights.
2529  *
2530  * RETURNS
2531  *  Nothing.
2532  */
2533 VOID WINAPI MapGenericMask( PDWORD AccessMask, PGENERIC_MAPPING GenericMapping )
2534 {
2535     RtlMapGenericMask( AccessMask, GenericMapping );
2536 }
2537
2538 /*************************************************************************
2539  * SetKernelObjectSecurity [ADVAPI32.@]
2540  */
2541 BOOL WINAPI SetKernelObjectSecurity (
2542         IN HANDLE Handle,
2543         IN SECURITY_INFORMATION SecurityInformation,
2544         IN PSECURITY_DESCRIPTOR SecurityDescriptor )
2545 {
2546     return set_ntstatus (NtSetSecurityObject (Handle, SecurityInformation, SecurityDescriptor));
2547 }
2548
2549
2550 /******************************************************************************
2551  *  AddAuditAccessAce [ADVAPI32.@]
2552  */
2553 BOOL WINAPI AddAuditAccessAce(
2554     IN OUT PACL pAcl, 
2555     IN DWORD dwAceRevision, 
2556     IN DWORD dwAccessMask, 
2557     IN PSID pSid, 
2558     IN BOOL bAuditSuccess, 
2559     IN BOOL bAuditFailure) 
2560 {
2561     return set_ntstatus( RtlAddAuditAccessAce(pAcl, dwAceRevision, dwAccessMask, pSid, 
2562                                               bAuditSuccess, bAuditFailure) ); 
2563 }
2564
2565 /******************************************************************************
2566  *  AddAuditAccessAce [ADVAPI32.@]
2567  */
2568 BOOL WINAPI AddAuditAccessAceEx(
2569     IN OUT PACL pAcl,
2570     IN DWORD dwAceRevision,
2571     IN DWORD dwAceFlags,
2572     IN DWORD dwAccessMask,
2573     IN PSID pSid,
2574     IN BOOL bAuditSuccess,
2575     IN BOOL bAuditFailure)
2576 {
2577     return set_ntstatus( RtlAddAuditAccessAceEx(pAcl, dwAceRevision, dwAceFlags, dwAccessMask, pSid,
2578                                               bAuditSuccess, bAuditFailure) );
2579 }
2580
2581 /******************************************************************************
2582  * LookupAccountNameA [ADVAPI32.@]
2583  */
2584 BOOL WINAPI
2585 LookupAccountNameA(
2586         IN LPCSTR system,
2587         IN LPCSTR account,
2588         OUT PSID sid,
2589         OUT LPDWORD cbSid,
2590         LPSTR ReferencedDomainName,
2591         IN OUT LPDWORD cbReferencedDomainName,
2592         OUT PSID_NAME_USE name_use )
2593 {
2594     BOOL ret;
2595     UNICODE_STRING lpSystemW;
2596     UNICODE_STRING lpAccountW;
2597     LPWSTR lpReferencedDomainNameW = NULL;
2598
2599     RtlCreateUnicodeStringFromAsciiz(&lpSystemW, system);
2600     RtlCreateUnicodeStringFromAsciiz(&lpAccountW, account);
2601
2602     if (ReferencedDomainName)
2603         lpReferencedDomainNameW = HeapAlloc(GetProcessHeap(), 0, *cbReferencedDomainName * sizeof(WCHAR));
2604
2605     ret = LookupAccountNameW(lpSystemW.Buffer, lpAccountW.Buffer, sid, cbSid, lpReferencedDomainNameW,
2606         cbReferencedDomainName, name_use);
2607
2608     if (ret && lpReferencedDomainNameW)
2609     {
2610         WideCharToMultiByte(CP_ACP, 0, lpReferencedDomainNameW, -1,
2611             ReferencedDomainName, *cbReferencedDomainName+1, NULL, NULL);
2612     }
2613
2614     RtlFreeUnicodeString(&lpSystemW);
2615     RtlFreeUnicodeString(&lpAccountW);
2616     HeapFree(GetProcessHeap(), 0, lpReferencedDomainNameW);
2617
2618     return ret;
2619 }
2620
2621 /******************************************************************************
2622  * lookup_user_account_name
2623  */
2624 static BOOL lookup_user_account_name(PSID Sid, PDWORD cbSid, LPWSTR ReferencedDomainName,
2625                                      LPDWORD cchReferencedDomainName, PSID_NAME_USE peUse )
2626 {
2627     char buffer[sizeof(TOKEN_USER) + sizeof(SID) + sizeof(DWORD)*SID_MAX_SUB_AUTHORITIES];
2628     DWORD len = sizeof(buffer);
2629     HANDLE token;
2630     BOOL ret;
2631     PSID pSid;
2632     WCHAR domainName[MAX_COMPUTERNAME_LENGTH + 1];
2633     DWORD nameLen;
2634
2635     if (!OpenThreadToken(GetCurrentThread(), TOKEN_READ, TRUE, &token))
2636     {
2637         if (GetLastError() != ERROR_NO_TOKEN) return FALSE;
2638         if (!OpenProcessToken(GetCurrentProcess(), TOKEN_READ, &token)) return FALSE;
2639     }
2640
2641     ret = GetTokenInformation(token, TokenUser, buffer, len, &len);
2642     CloseHandle( token );
2643
2644     if (!ret) return FALSE;
2645
2646     pSid = ((TOKEN_USER *)buffer)->User.Sid;
2647
2648     if (Sid != NULL && (*cbSid >= GetLengthSid(pSid)))
2649        CopySid(*cbSid, Sid, pSid);
2650     if (*cbSid < GetLengthSid(pSid))
2651     {
2652        SetLastError(ERROR_INSUFFICIENT_BUFFER);
2653        ret = FALSE;
2654     }
2655     *cbSid = GetLengthSid(pSid);
2656
2657     nameLen = MAX_COMPUTERNAME_LENGTH + 1;
2658     if (!GetComputerNameW(domainName, &nameLen))
2659     {
2660         domainName[0] = 0;
2661         nameLen = 0;
2662     }
2663     if (*cchReferencedDomainName <= nameLen || !ret)
2664     {
2665         SetLastError(ERROR_INSUFFICIENT_BUFFER);
2666         nameLen += 1;
2667         ret = FALSE;
2668     }
2669     else if (ReferencedDomainName)
2670         strcpyW(ReferencedDomainName, domainName);
2671
2672     *cchReferencedDomainName = nameLen;
2673
2674     if (ret)
2675         *peUse = SidTypeUser;
2676
2677     return ret;
2678 }
2679
2680 /******************************************************************************
2681  * lookup_computer_account_name
2682  */
2683 static BOOL lookup_computer_account_name(PSID Sid, PDWORD cbSid, LPWSTR ReferencedDomainName,
2684                                          LPDWORD cchReferencedDomainName, PSID_NAME_USE peUse )
2685 {
2686     MAX_SID local;
2687     BOOL ret;
2688     WCHAR domainName[MAX_COMPUTERNAME_LENGTH + 1];
2689     DWORD nameLen;
2690
2691     if ((ret = ADVAPI_GetComputerSid(&local)))
2692     {
2693         if (Sid != NULL && (*cbSid >= GetLengthSid(&local)))
2694            CopySid(*cbSid, Sid, &local);
2695         if (*cbSid < GetLengthSid(&local))
2696         {
2697            SetLastError(ERROR_INSUFFICIENT_BUFFER);
2698            ret = FALSE;
2699         }
2700         *cbSid = GetLengthSid(&local);
2701     }
2702
2703     nameLen = MAX_COMPUTERNAME_LENGTH + 1;
2704     if (!GetComputerNameW(domainName, &nameLen))
2705     {
2706         domainName[0] = 0;
2707         nameLen = 0;
2708     }
2709     if (*cchReferencedDomainName <= nameLen || !ret)
2710     {
2711         SetLastError(ERROR_INSUFFICIENT_BUFFER);
2712         nameLen += 1;
2713         ret = FALSE;
2714     }
2715     else if (ReferencedDomainName)
2716         strcpyW(ReferencedDomainName, domainName);
2717
2718     *cchReferencedDomainName = nameLen;
2719
2720     if (ret)
2721         *peUse = SidTypeDomain;
2722
2723     return ret;
2724 }
2725
2726 static void split_domain_account( const LSA_UNICODE_STRING *str, LSA_UNICODE_STRING *account,
2727                                   LSA_UNICODE_STRING *domain )
2728 {
2729     WCHAR *p = str->Buffer + str->Length / sizeof(WCHAR) - 1;
2730
2731     while (p > str->Buffer && *p != '\\') p--;
2732
2733     if (*p == '\\')
2734     {
2735         domain->Buffer = str->Buffer;
2736         domain->Length = (p - str->Buffer) * sizeof(WCHAR);
2737
2738         account->Buffer = p + 1;
2739         account->Length = str->Length - ((p - str->Buffer + 1) * sizeof(WCHAR));
2740     }
2741     else
2742     {
2743         domain->Buffer = NULL;
2744         domain->Length = 0;
2745
2746         account->Buffer = str->Buffer;
2747         account->Length = str->Length;
2748     }
2749 }
2750
2751 static BOOL match_domain( ULONG idx, const LSA_UNICODE_STRING *domain )
2752 {
2753     ULONG len = strlenW( ACCOUNT_SIDS[idx].domain );
2754
2755     if (len == domain->Length / sizeof(WCHAR) && !strncmpiW( domain->Buffer, ACCOUNT_SIDS[idx].domain, len ))
2756         return TRUE;
2757
2758     return FALSE;
2759 }
2760
2761 static BOOL match_account( ULONG idx, const LSA_UNICODE_STRING *account )
2762 {
2763     ULONG len = strlenW( ACCOUNT_SIDS[idx].account );
2764
2765     if (len == account->Length / sizeof(WCHAR) && !strncmpiW( account->Buffer, ACCOUNT_SIDS[idx].account, len ))
2766         return TRUE;
2767
2768     if (ACCOUNT_SIDS[idx].alias)
2769     {
2770         len = strlenW( ACCOUNT_SIDS[idx].alias );
2771         if (len == account->Length / sizeof(WCHAR) && !strncmpiW( account->Buffer, ACCOUNT_SIDS[idx].alias, len ))
2772             return TRUE;
2773     }
2774     return FALSE;
2775 }
2776
2777 /*
2778  * Helper function for LookupAccountNameW
2779  */
2780 BOOL lookup_local_wellknown_name( const LSA_UNICODE_STRING *account_and_domain,
2781                                   PSID Sid, LPDWORD cbSid,
2782                                   LPWSTR ReferencedDomainName,
2783                                   LPDWORD cchReferencedDomainName,
2784                                   PSID_NAME_USE peUse, BOOL *handled )
2785 {
2786     PSID pSid;
2787     LSA_UNICODE_STRING account, domain;
2788     BOOL ret = TRUE;
2789     ULONG i;
2790
2791     *handled = FALSE;
2792     split_domain_account( account_and_domain, &account, &domain );
2793
2794     for (i = 0; i < sizeof(ACCOUNT_SIDS) / sizeof(ACCOUNT_SIDS[0]); i++)
2795     {
2796         /* check domain first */
2797         if (domain.Buffer && !match_domain( i, &domain )) continue;
2798
2799         if (match_account( i, &account ))
2800         {
2801             DWORD len, sidLen = SECURITY_MAX_SID_SIZE;
2802
2803             if (!(pSid = HeapAlloc( GetProcessHeap(), 0, sidLen ))) return FALSE;
2804
2805             if ((ret = CreateWellKnownSid( ACCOUNT_SIDS[i].type, NULL, pSid, &sidLen )))
2806             {
2807                 if (*cbSid < sidLen)
2808                 {
2809                     SetLastError(ERROR_INSUFFICIENT_BUFFER);
2810                     ret = FALSE;
2811                 }
2812                 else if (Sid)
2813                 {
2814                     CopySid(*cbSid, Sid, pSid);
2815                 }
2816                 *cbSid = sidLen;
2817             }
2818
2819             len = strlenW( ACCOUNT_SIDS[i].domain );
2820             if (*cchReferencedDomainName <= len || !ret)
2821             {
2822                 SetLastError(ERROR_INSUFFICIENT_BUFFER);
2823                 len++;
2824                 ret = FALSE;
2825             }
2826             else if (ReferencedDomainName)
2827             {
2828                 strcpyW( ReferencedDomainName, ACCOUNT_SIDS[i].domain );
2829             }
2830
2831             *cchReferencedDomainName = len;
2832             if (ret)
2833                 *peUse = ACCOUNT_SIDS[i].name_use;
2834
2835             HeapFree(GetProcessHeap(), 0, pSid);
2836             *handled = TRUE;
2837             return ret;
2838         }
2839     }
2840     return ret;
2841 }
2842
2843 BOOL lookup_local_user_name( const LSA_UNICODE_STRING *account_and_domain,
2844                              PSID Sid, LPDWORD cbSid,
2845                              LPWSTR ReferencedDomainName,
2846                              LPDWORD cchReferencedDomainName,
2847                              PSID_NAME_USE peUse, BOOL *handled )
2848 {
2849     DWORD nameLen;
2850     LPWSTR userName = NULL;
2851     LSA_UNICODE_STRING account, domain;
2852     BOOL ret = TRUE;
2853
2854     *handled = FALSE;
2855     split_domain_account( account_and_domain, &account, &domain );
2856
2857     /* Let the current Unix user id masquerade as first Windows user account */
2858
2859     nameLen = UNLEN + 1;
2860     if (!(userName = HeapAlloc( GetProcessHeap(), 0, nameLen * sizeof(WCHAR) ))) return FALSE;
2861
2862     if (domain.Buffer)
2863     {
2864         /* check to make sure this account is on this computer */
2865         if (GetComputerNameW( userName, &nameLen ) &&
2866             (domain.Length / sizeof(WCHAR) != nameLen || strncmpW( domain.Buffer, userName, nameLen )))
2867         {
2868             SetLastError(ERROR_NONE_MAPPED);
2869             ret = FALSE;
2870         }
2871         nameLen = UNLEN + 1;
2872     }
2873
2874     if (GetUserNameW( userName, &nameLen ) &&
2875         account.Length / sizeof(WCHAR) == nameLen - 1 && !strncmpW( account.Buffer, userName, nameLen - 1 ))
2876     {
2877             ret = lookup_user_account_name( Sid, cbSid, ReferencedDomainName, cchReferencedDomainName, peUse );
2878             *handled = TRUE;
2879     }
2880     else
2881     {
2882         nameLen = UNLEN + 1;
2883         if (GetComputerNameW( userName, &nameLen ) &&
2884             account.Length / sizeof(WCHAR) == nameLen && !strncmpW( account.Buffer, userName , nameLen ))
2885         {
2886             ret = lookup_computer_account_name( Sid, cbSid, ReferencedDomainName, cchReferencedDomainName, peUse );
2887             *handled = TRUE;
2888         }
2889     }
2890
2891     HeapFree(GetProcessHeap(), 0, userName);
2892     return ret;
2893 }
2894
2895 /******************************************************************************
2896  * LookupAccountNameW [ADVAPI32.@]
2897  */
2898 BOOL WINAPI LookupAccountNameW( LPCWSTR lpSystemName, LPCWSTR lpAccountName, PSID Sid,
2899                                 LPDWORD cbSid, LPWSTR ReferencedDomainName,
2900                                 LPDWORD cchReferencedDomainName, PSID_NAME_USE peUse )
2901 {
2902     BOOL ret, handled;
2903     LSA_UNICODE_STRING account;
2904
2905     TRACE("%s %s %p %p %p %p %p\n", debugstr_w(lpSystemName), debugstr_w(lpAccountName),
2906           Sid, cbSid, ReferencedDomainName, cchReferencedDomainName, peUse);
2907
2908     if (!ADVAPI_IsLocalComputer( lpSystemName ))
2909     {
2910         FIXME("remote computer not supported\n");
2911         SetLastError( RPC_S_SERVER_UNAVAILABLE );
2912         return FALSE;
2913     }
2914
2915     if (!lpAccountName || !strcmpW( lpAccountName, Blank ))
2916     {
2917         lpAccountName = BUILTIN;
2918     }
2919
2920     RtlInitUnicodeString( &account, lpAccountName );
2921
2922     /* Check well known SIDs first */
2923     ret = lookup_local_wellknown_name( &account, Sid, cbSid, ReferencedDomainName,
2924                                        cchReferencedDomainName, peUse, &handled );
2925     if (handled)
2926         return ret;
2927
2928     /* Check user names */
2929     ret = lookup_local_user_name( &account, Sid, cbSid, ReferencedDomainName,
2930                                   cchReferencedDomainName, peUse, &handled);
2931     if (handled)
2932         return ret;
2933
2934     SetLastError( ERROR_NONE_MAPPED );
2935     return FALSE;
2936 }
2937
2938 /******************************************************************************
2939  * PrivilegeCheck [ADVAPI32.@]
2940  */
2941 BOOL WINAPI PrivilegeCheck( HANDLE ClientToken, PPRIVILEGE_SET RequiredPrivileges, LPBOOL pfResult)
2942 {
2943     BOOL ret;
2944     BOOLEAN Result;
2945
2946     TRACE("%p %p %p\n", ClientToken, RequiredPrivileges, pfResult);
2947
2948     ret = set_ntstatus (NtPrivilegeCheck (ClientToken, RequiredPrivileges, &Result));
2949     if (ret)
2950         *pfResult = Result;
2951     return ret;
2952 }
2953
2954 /******************************************************************************
2955  * AccessCheckAndAuditAlarmA [ADVAPI32.@]
2956  */
2957 BOOL WINAPI AccessCheckAndAuditAlarmA(LPCSTR Subsystem, LPVOID HandleId, LPSTR ObjectTypeName,
2958   LPSTR ObjectName, PSECURITY_DESCRIPTOR SecurityDescriptor, DWORD DesiredAccess,
2959   PGENERIC_MAPPING GenericMapping, BOOL ObjectCreation, LPDWORD GrantedAccess,
2960   LPBOOL AccessStatus, LPBOOL pfGenerateOnClose)
2961 {
2962         FIXME("stub (%s,%p,%s,%s,%p,%08x,%p,%x,%p,%p,%p)\n", debugstr_a(Subsystem),
2963                 HandleId, debugstr_a(ObjectTypeName), debugstr_a(ObjectName),
2964                 SecurityDescriptor, DesiredAccess, GenericMapping,
2965                 ObjectCreation, GrantedAccess, AccessStatus, pfGenerateOnClose);
2966         return TRUE;
2967 }
2968
2969 /******************************************************************************
2970  * AccessCheckAndAuditAlarmW [ADVAPI32.@]
2971  */
2972 BOOL WINAPI AccessCheckAndAuditAlarmW(LPCWSTR Subsystem, LPVOID HandleId, LPWSTR ObjectTypeName,
2973   LPWSTR ObjectName, PSECURITY_DESCRIPTOR SecurityDescriptor, DWORD DesiredAccess,
2974   PGENERIC_MAPPING GenericMapping, BOOL ObjectCreation, LPDWORD GrantedAccess,
2975   LPBOOL AccessStatus, LPBOOL pfGenerateOnClose)
2976 {
2977         FIXME("stub (%s,%p,%s,%s,%p,%08x,%p,%x,%p,%p,%p)\n", debugstr_w(Subsystem),
2978                 HandleId, debugstr_w(ObjectTypeName), debugstr_w(ObjectName),
2979                 SecurityDescriptor, DesiredAccess, GenericMapping,
2980                 ObjectCreation, GrantedAccess, AccessStatus, pfGenerateOnClose);
2981         return TRUE;
2982 }
2983
2984 BOOL WINAPI ObjectCloseAuditAlarmA(LPCSTR SubsystemName, LPVOID HandleId, BOOL GenerateOnClose)
2985 {
2986     FIXME("stub (%s,%p,%x)\n", debugstr_a(SubsystemName), HandleId, GenerateOnClose);
2987
2988     return TRUE;
2989 }
2990
2991 BOOL WINAPI ObjectCloseAuditAlarmW(LPCWSTR SubsystemName, LPVOID HandleId, BOOL GenerateOnClose)
2992 {
2993     FIXME("stub (%s,%p,%x)\n", debugstr_w(SubsystemName), HandleId, GenerateOnClose);
2994
2995     return TRUE;
2996 }
2997
2998 BOOL WINAPI ObjectDeleteAuditAlarmW(LPCWSTR SubsystemName, LPVOID HandleId, BOOL GenerateOnClose)
2999 {
3000     FIXME("stub (%s,%p,%x)\n", debugstr_w(SubsystemName), HandleId, GenerateOnClose);
3001
3002     return TRUE;
3003 }
3004
3005 BOOL WINAPI ObjectOpenAuditAlarmA(LPCSTR SubsystemName, LPVOID HandleId, LPSTR ObjectTypeName,
3006   LPSTR ObjectName, PSECURITY_DESCRIPTOR pSecurityDescriptor, HANDLE ClientToken, DWORD DesiredAccess,
3007   DWORD GrantedAccess, PPRIVILEGE_SET Privileges, BOOL ObjectCreation, BOOL AccessGranted,
3008   LPBOOL GenerateOnClose)
3009 {
3010         FIXME("stub (%s,%p,%s,%s,%p,%p,0x%08x,0x%08x,%p,%x,%x,%p)\n", debugstr_a(SubsystemName),
3011                 HandleId, debugstr_a(ObjectTypeName), debugstr_a(ObjectName), pSecurityDescriptor,
3012         ClientToken, DesiredAccess, GrantedAccess, Privileges, ObjectCreation, AccessGranted,
3013         GenerateOnClose);
3014
3015     return TRUE;
3016 }
3017
3018 BOOL WINAPI ObjectOpenAuditAlarmW(LPCWSTR SubsystemName, LPVOID HandleId, LPWSTR ObjectTypeName,
3019   LPWSTR ObjectName, PSECURITY_DESCRIPTOR pSecurityDescriptor, HANDLE ClientToken, DWORD DesiredAccess,
3020   DWORD GrantedAccess, PPRIVILEGE_SET Privileges, BOOL ObjectCreation, BOOL AccessGranted,
3021   LPBOOL GenerateOnClose)
3022 {
3023     FIXME("stub (%s,%p,%s,%s,%p,%p,0x%08x,0x%08x,%p,%x,%x,%p)\n", debugstr_w(SubsystemName),
3024         HandleId, debugstr_w(ObjectTypeName), debugstr_w(ObjectName), pSecurityDescriptor,
3025         ClientToken, DesiredAccess, GrantedAccess, Privileges, ObjectCreation, AccessGranted,
3026         GenerateOnClose);
3027
3028     return TRUE;
3029 }
3030
3031 BOOL WINAPI ObjectPrivilegeAuditAlarmA( LPCSTR SubsystemName, LPVOID HandleId, HANDLE ClientToken,
3032   DWORD DesiredAccess, PPRIVILEGE_SET Privileges, BOOL AccessGranted)
3033 {
3034     FIXME("stub (%s,%p,%p,0x%08x,%p,%x)\n", debugstr_a(SubsystemName), HandleId, ClientToken,
3035           DesiredAccess, Privileges, AccessGranted);
3036
3037     return TRUE;
3038 }
3039
3040 BOOL WINAPI ObjectPrivilegeAuditAlarmW( LPCWSTR SubsystemName, LPVOID HandleId, HANDLE ClientToken,
3041   DWORD DesiredAccess, PPRIVILEGE_SET Privileges, BOOL AccessGranted)
3042 {
3043     FIXME("stub (%s,%p,%p,0x%08x,%p,%x)\n", debugstr_w(SubsystemName), HandleId, ClientToken,
3044           DesiredAccess, Privileges, AccessGranted);
3045
3046     return TRUE;
3047 }
3048
3049 BOOL WINAPI PrivilegedServiceAuditAlarmA( LPCSTR SubsystemName, LPCSTR ServiceName, HANDLE ClientToken,
3050                                    PPRIVILEGE_SET Privileges, BOOL AccessGranted)
3051 {
3052     FIXME("stub (%s,%s,%p,%p,%x)\n", debugstr_a(SubsystemName), debugstr_a(ServiceName),
3053           ClientToken, Privileges, AccessGranted);
3054
3055     return TRUE;
3056 }
3057
3058 BOOL WINAPI PrivilegedServiceAuditAlarmW( LPCWSTR SubsystemName, LPCWSTR ServiceName, HANDLE ClientToken,
3059                                    PPRIVILEGE_SET Privileges, BOOL AccessGranted)
3060 {
3061     FIXME("stub %s,%s,%p,%p,%x)\n", debugstr_w(SubsystemName), debugstr_w(ServiceName),
3062           ClientToken, Privileges, AccessGranted);
3063
3064     return TRUE;
3065 }
3066
3067 /******************************************************************************
3068  * GetSecurityInfo [ADVAPI32.@]
3069  *
3070  * Retrieves a copy of the security descriptor associated with an object.
3071  *
3072  * PARAMS
3073  *  hObject              [I] A handle for the object.
3074  *  ObjectType           [I] The type of object.
3075  *  SecurityInfo         [I] A bitmask indicating what info to retrieve.
3076  *  ppsidOwner           [O] If non-null, receives a pointer to the owner SID.
3077  *  ppsidGroup           [O] If non-null, receives a pointer to the group SID.
3078  *  ppDacl               [O] If non-null, receives a pointer to the DACL.
3079  *  ppSacl               [O] If non-null, receives a pointer to the SACL.
3080  *  ppSecurityDescriptor [O] Receives a pointer to the security descriptor,
3081  *                           which must be freed with LocalFree.
3082  *
3083  * RETURNS
3084  *  ERROR_SUCCESS if all's well, and a WIN32 error code otherwise.
3085  */
3086 DWORD WINAPI GetSecurityInfo(
3087     HANDLE hObject, SE_OBJECT_TYPE ObjectType,
3088     SECURITY_INFORMATION SecurityInfo, PSID *ppsidOwner,
3089     PSID *ppsidGroup, PACL *ppDacl, PACL *ppSacl,
3090     PSECURITY_DESCRIPTOR *ppSecurityDescriptor
3091 )
3092 {
3093     PSECURITY_DESCRIPTOR sd;
3094     NTSTATUS status;
3095     ULONG n1, n2;
3096     BOOL present, defaulted;
3097
3098     status = NtQuerySecurityObject(hObject, SecurityInfo, NULL, 0, &n1);
3099     if (status != STATUS_BUFFER_TOO_SMALL && status != STATUS_SUCCESS)
3100         return RtlNtStatusToDosError(status);
3101
3102     sd = LocalAlloc(0, n1);
3103     if (!sd)
3104         return ERROR_NOT_ENOUGH_MEMORY;
3105
3106     status = NtQuerySecurityObject(hObject, SecurityInfo, sd, n1, &n2);
3107     if (status != STATUS_SUCCESS)
3108     {
3109         LocalFree(sd);
3110         return RtlNtStatusToDosError(status);
3111     }
3112
3113     if (ppsidOwner)
3114     {
3115         *ppsidOwner = NULL;
3116         GetSecurityDescriptorOwner(sd, ppsidOwner, &defaulted);
3117     }
3118     if (ppsidGroup)
3119     {
3120         *ppsidGroup = NULL;
3121         GetSecurityDescriptorGroup(sd, ppsidGroup, &defaulted);
3122     }
3123     if (ppDacl)
3124     {
3125         *ppDacl = NULL;
3126         GetSecurityDescriptorDacl(sd, &present, ppDacl, &defaulted);
3127     }
3128     if (ppSacl)
3129     {
3130         *ppSacl = NULL;
3131         GetSecurityDescriptorSacl(sd, &present, ppSacl, &defaulted);
3132     }
3133     if (ppSecurityDescriptor)
3134         *ppSecurityDescriptor = sd;
3135
3136     /* The security descriptor (sd) cannot be freed if ppSecurityDescriptor is
3137      * NULL, because native happily returns the SIDs and ACLs that are requested
3138      * in this case.
3139      */
3140
3141     return ERROR_SUCCESS;
3142 }
3143
3144 /******************************************************************************
3145  * GetSecurityInfoExA [ADVAPI32.@]
3146  */
3147 DWORD WINAPI GetSecurityInfoExA(
3148         HANDLE hObject, SE_OBJECT_TYPE ObjectType,
3149         SECURITY_INFORMATION SecurityInfo, LPCSTR lpProvider,
3150         LPCSTR lpProperty, PACTRL_ACCESSA *ppAccessList,
3151         PACTRL_AUDITA *ppAuditList, LPSTR *lppOwner, LPSTR *lppGroup
3152 )
3153 {
3154   FIXME("stub!\n");
3155   return ERROR_BAD_PROVIDER;
3156 }
3157
3158 /******************************************************************************
3159  * GetSecurityInfoExW [ADVAPI32.@]
3160  */
3161 DWORD WINAPI GetSecurityInfoExW(
3162         HANDLE hObject, SE_OBJECT_TYPE ObjectType, 
3163         SECURITY_INFORMATION SecurityInfo, LPCWSTR lpProvider,
3164         LPCWSTR lpProperty, PACTRL_ACCESSW *ppAccessList, 
3165         PACTRL_AUDITW *ppAuditList, LPWSTR *lppOwner, LPWSTR *lppGroup
3166 )
3167 {
3168   FIXME("stub!\n");
3169   return ERROR_BAD_PROVIDER; 
3170 }
3171
3172 /******************************************************************************
3173  * BuildExplicitAccessWithNameA [ADVAPI32.@]
3174  */
3175 VOID WINAPI BuildExplicitAccessWithNameA( PEXPLICIT_ACCESSA pExplicitAccess,
3176                                           LPSTR pTrusteeName, DWORD AccessPermissions,
3177                                           ACCESS_MODE AccessMode, DWORD Inheritance )
3178 {
3179     TRACE("%p %s 0x%08x 0x%08x 0x%08x\n", pExplicitAccess, debugstr_a(pTrusteeName),
3180           AccessPermissions, AccessMode, Inheritance);
3181
3182     pExplicitAccess->grfAccessPermissions = AccessPermissions;
3183     pExplicitAccess->grfAccessMode = AccessMode;
3184     pExplicitAccess->grfInheritance = Inheritance;
3185
3186     pExplicitAccess->Trustee.pMultipleTrustee = NULL;
3187     pExplicitAccess->Trustee.MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE;
3188     pExplicitAccess->Trustee.TrusteeForm = TRUSTEE_IS_NAME;
3189     pExplicitAccess->Trustee.TrusteeType = TRUSTEE_IS_UNKNOWN;
3190     pExplicitAccess->Trustee.ptstrName = pTrusteeName;
3191 }
3192
3193 /******************************************************************************
3194  * BuildExplicitAccessWithNameW [ADVAPI32.@]
3195  */
3196 VOID WINAPI BuildExplicitAccessWithNameW( PEXPLICIT_ACCESSW pExplicitAccess,
3197                                           LPWSTR pTrusteeName, DWORD AccessPermissions,
3198                                           ACCESS_MODE AccessMode, DWORD Inheritance )
3199 {
3200     TRACE("%p %s 0x%08x 0x%08x 0x%08x\n", pExplicitAccess, debugstr_w(pTrusteeName),
3201           AccessPermissions, AccessMode, Inheritance);
3202
3203     pExplicitAccess->grfAccessPermissions = AccessPermissions;
3204     pExplicitAccess->grfAccessMode = AccessMode;
3205     pExplicitAccess->grfInheritance = Inheritance;
3206
3207     pExplicitAccess->Trustee.pMultipleTrustee = NULL;
3208     pExplicitAccess->Trustee.MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE;
3209     pExplicitAccess->Trustee.TrusteeForm = TRUSTEE_IS_NAME;
3210     pExplicitAccess->Trustee.TrusteeType = TRUSTEE_IS_UNKNOWN;
3211     pExplicitAccess->Trustee.ptstrName = pTrusteeName;
3212 }
3213
3214 /******************************************************************************
3215  * BuildTrusteeWithObjectsAndNameA [ADVAPI32.@]
3216  */
3217 VOID WINAPI BuildTrusteeWithObjectsAndNameA( PTRUSTEEA pTrustee, POBJECTS_AND_NAME_A pObjName,
3218                                              SE_OBJECT_TYPE ObjectType, LPSTR ObjectTypeName,
3219                                              LPSTR InheritedObjectTypeName, LPSTR Name )
3220 {
3221     DWORD ObjectsPresent = 0;
3222
3223     TRACE("%p %p 0x%08x %p %p %s\n", pTrustee, pObjName,
3224           ObjectType, ObjectTypeName, InheritedObjectTypeName, debugstr_a(Name));
3225
3226     /* Fill the OBJECTS_AND_NAME structure */
3227     pObjName->ObjectType = ObjectType;
3228     if (ObjectTypeName != NULL)
3229     {
3230         ObjectsPresent |= ACE_OBJECT_TYPE_PRESENT;
3231     }
3232
3233     pObjName->InheritedObjectTypeName = InheritedObjectTypeName;
3234     if (InheritedObjectTypeName != NULL)
3235     {
3236         ObjectsPresent |= ACE_INHERITED_OBJECT_TYPE_PRESENT;
3237     }
3238
3239     pObjName->ObjectsPresent = ObjectsPresent;
3240     pObjName->ptstrName = Name;
3241
3242     /* Fill the TRUSTEE structure */
3243     pTrustee->pMultipleTrustee = NULL;
3244     pTrustee->MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE;
3245     pTrustee->TrusteeForm = TRUSTEE_IS_OBJECTS_AND_NAME;
3246     pTrustee->TrusteeType = TRUSTEE_IS_UNKNOWN;
3247     pTrustee->ptstrName = (LPSTR)pObjName;
3248 }
3249
3250 /******************************************************************************
3251  * BuildTrusteeWithObjectsAndNameW [ADVAPI32.@]
3252  */
3253 VOID WINAPI BuildTrusteeWithObjectsAndNameW( PTRUSTEEW pTrustee, POBJECTS_AND_NAME_W pObjName,
3254                                              SE_OBJECT_TYPE ObjectType, LPWSTR ObjectTypeName,
3255                                              LPWSTR InheritedObjectTypeName, LPWSTR Name )
3256 {
3257     DWORD ObjectsPresent = 0;
3258
3259     TRACE("%p %p 0x%08x %p %p %s\n", pTrustee, pObjName,
3260           ObjectType, ObjectTypeName, InheritedObjectTypeName, debugstr_w(Name));
3261
3262     /* Fill the OBJECTS_AND_NAME structure */
3263     pObjName->ObjectType = ObjectType;
3264     if (ObjectTypeName != NULL)
3265     {
3266         ObjectsPresent |= ACE_OBJECT_TYPE_PRESENT;
3267     }
3268
3269     pObjName->InheritedObjectTypeName = InheritedObjectTypeName;
3270     if (InheritedObjectTypeName != NULL)
3271     {
3272         ObjectsPresent |= ACE_INHERITED_OBJECT_TYPE_PRESENT;
3273     }
3274
3275     pObjName->ObjectsPresent = ObjectsPresent;
3276     pObjName->ptstrName = Name;
3277
3278     /* Fill the TRUSTEE structure */
3279     pTrustee->pMultipleTrustee = NULL;
3280     pTrustee->MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE;
3281     pTrustee->TrusteeForm = TRUSTEE_IS_OBJECTS_AND_NAME;
3282     pTrustee->TrusteeType = TRUSTEE_IS_UNKNOWN;
3283     pTrustee->ptstrName = (LPWSTR)pObjName;
3284 }
3285
3286 /******************************************************************************
3287  * BuildTrusteeWithObjectsAndSidA [ADVAPI32.@]
3288  */
3289 VOID WINAPI BuildTrusteeWithObjectsAndSidA( PTRUSTEEA pTrustee, POBJECTS_AND_SID pObjSid,
3290                                             GUID* pObjectGuid, GUID* pInheritedObjectGuid, PSID pSid )
3291 {
3292     DWORD ObjectsPresent = 0;
3293
3294     TRACE("%p %p %p %p %p\n", pTrustee, pObjSid, pObjectGuid, pInheritedObjectGuid, pSid);
3295
3296     /* Fill the OBJECTS_AND_SID structure */
3297     if (pObjectGuid != NULL)
3298     {
3299         pObjSid->ObjectTypeGuid = *pObjectGuid;
3300         ObjectsPresent |= ACE_OBJECT_TYPE_PRESENT;
3301     }
3302     else
3303     {
3304         ZeroMemory(&pObjSid->ObjectTypeGuid,
3305                    sizeof(GUID));
3306     }
3307
3308     if (pInheritedObjectGuid != NULL)
3309     {
3310         pObjSid->InheritedObjectTypeGuid = *pInheritedObjectGuid;
3311         ObjectsPresent |= ACE_INHERITED_OBJECT_TYPE_PRESENT;
3312     }
3313     else
3314     {
3315         ZeroMemory(&pObjSid->InheritedObjectTypeGuid,
3316                    sizeof(GUID));
3317     }
3318
3319     pObjSid->ObjectsPresent = ObjectsPresent;
3320     pObjSid->pSid = pSid;
3321
3322     /* Fill the TRUSTEE structure */
3323     pTrustee->pMultipleTrustee = NULL;
3324     pTrustee->MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE;
3325     pTrustee->TrusteeForm = TRUSTEE_IS_OBJECTS_AND_SID;
3326     pTrustee->TrusteeType = TRUSTEE_IS_UNKNOWN;
3327     pTrustee->ptstrName = (LPSTR) pObjSid;
3328 }
3329
3330 /******************************************************************************
3331  * BuildTrusteeWithObjectsAndSidW [ADVAPI32.@]
3332  */
3333 VOID WINAPI BuildTrusteeWithObjectsAndSidW( PTRUSTEEW pTrustee, POBJECTS_AND_SID pObjSid,
3334                                             GUID* pObjectGuid, GUID* pInheritedObjectGuid, PSID pSid )
3335 {
3336     DWORD ObjectsPresent = 0;
3337
3338     TRACE("%p %p %p %p %p\n", pTrustee, pObjSid, pObjectGuid, pInheritedObjectGuid, pSid);
3339
3340     /* Fill the OBJECTS_AND_SID structure */
3341     if (pObjectGuid != NULL)
3342     {
3343         pObjSid->ObjectTypeGuid = *pObjectGuid;
3344         ObjectsPresent |= ACE_OBJECT_TYPE_PRESENT;
3345     }
3346     else
3347     {
3348         ZeroMemory(&pObjSid->ObjectTypeGuid,
3349                    sizeof(GUID));
3350     }
3351
3352     if (pInheritedObjectGuid != NULL)
3353     {
3354         pObjSid->InheritedObjectTypeGuid = *pInheritedObjectGuid;
3355         ObjectsPresent |= ACE_INHERITED_OBJECT_TYPE_PRESENT;
3356     }
3357     else
3358     {
3359         ZeroMemory(&pObjSid->InheritedObjectTypeGuid,
3360                    sizeof(GUID));
3361     }
3362
3363     pObjSid->ObjectsPresent = ObjectsPresent;
3364     pObjSid->pSid = pSid;
3365
3366     /* Fill the TRUSTEE structure */
3367     pTrustee->pMultipleTrustee = NULL;
3368     pTrustee->MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE;
3369     pTrustee->TrusteeForm = TRUSTEE_IS_OBJECTS_AND_SID;
3370     pTrustee->TrusteeType = TRUSTEE_IS_UNKNOWN;
3371     pTrustee->ptstrName = (LPWSTR) pObjSid;
3372 }
3373
3374 /******************************************************************************
3375  * BuildTrusteeWithSidA [ADVAPI32.@]
3376  */
3377 VOID WINAPI BuildTrusteeWithSidA(PTRUSTEEA pTrustee, PSID pSid)
3378 {
3379     TRACE("%p %p\n", pTrustee, pSid);
3380
3381     pTrustee->pMultipleTrustee = NULL;
3382     pTrustee->MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE;
3383     pTrustee->TrusteeForm = TRUSTEE_IS_SID;
3384     pTrustee->TrusteeType = TRUSTEE_IS_UNKNOWN;
3385     pTrustee->ptstrName = pSid;
3386 }
3387
3388 /******************************************************************************
3389  * BuildTrusteeWithSidW [ADVAPI32.@]
3390  */
3391 VOID WINAPI BuildTrusteeWithSidW(PTRUSTEEW pTrustee, PSID pSid)
3392 {
3393     TRACE("%p %p\n", pTrustee, pSid);
3394
3395     pTrustee->pMultipleTrustee = NULL;
3396     pTrustee->MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE;
3397     pTrustee->TrusteeForm = TRUSTEE_IS_SID;
3398     pTrustee->TrusteeType = TRUSTEE_IS_UNKNOWN;
3399     pTrustee->ptstrName = pSid;
3400 }
3401
3402 /******************************************************************************
3403  * BuildTrusteeWithNameA [ADVAPI32.@]
3404  */
3405 VOID WINAPI BuildTrusteeWithNameA(PTRUSTEEA pTrustee, LPSTR name)
3406 {
3407     TRACE("%p %s\n", pTrustee, debugstr_a(name) );
3408
3409     pTrustee->pMultipleTrustee = NULL;
3410     pTrustee->MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE;
3411     pTrustee->TrusteeForm = TRUSTEE_IS_NAME;
3412     pTrustee->TrusteeType = TRUSTEE_IS_UNKNOWN;
3413     pTrustee->ptstrName = name;
3414 }
3415
3416 /******************************************************************************
3417  * BuildTrusteeWithNameW [ADVAPI32.@]
3418  */
3419 VOID WINAPI BuildTrusteeWithNameW(PTRUSTEEW pTrustee, LPWSTR name)
3420 {
3421     TRACE("%p %s\n", pTrustee, debugstr_w(name) );
3422
3423     pTrustee->pMultipleTrustee = NULL;
3424     pTrustee->MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE;
3425     pTrustee->TrusteeForm = TRUSTEE_IS_NAME;
3426     pTrustee->TrusteeType = TRUSTEE_IS_UNKNOWN;
3427     pTrustee->ptstrName = name;
3428 }
3429
3430 /****************************************************************************** 
3431  * GetTrusteeFormA [ADVAPI32.@] 
3432  */ 
3433 TRUSTEE_FORM WINAPI GetTrusteeFormA(PTRUSTEEA pTrustee) 
3434 {  
3435     TRACE("(%p)\n", pTrustee); 
3436   
3437     if (!pTrustee) 
3438         return TRUSTEE_BAD_FORM; 
3439   
3440     return pTrustee->TrusteeForm; 
3441 }  
3442   
3443 /****************************************************************************** 
3444  * GetTrusteeFormW [ADVAPI32.@] 
3445  */ 
3446 TRUSTEE_FORM WINAPI GetTrusteeFormW(PTRUSTEEW pTrustee) 
3447 {  
3448     TRACE("(%p)\n", pTrustee); 
3449   
3450     if (!pTrustee) 
3451         return TRUSTEE_BAD_FORM; 
3452   
3453     return pTrustee->TrusteeForm; 
3454 }  
3455   
3456 /****************************************************************************** 
3457  * GetTrusteeNameA [ADVAPI32.@] 
3458  */ 
3459 LPSTR WINAPI GetTrusteeNameA(PTRUSTEEA pTrustee) 
3460 {  
3461     TRACE("(%p)\n", pTrustee); 
3462   
3463     if (!pTrustee) 
3464         return NULL; 
3465   
3466     return pTrustee->ptstrName; 
3467 }  
3468   
3469 /****************************************************************************** 
3470  * GetTrusteeNameW [ADVAPI32.@] 
3471  */ 
3472 LPWSTR WINAPI GetTrusteeNameW(PTRUSTEEW pTrustee) 
3473 {  
3474     TRACE("(%p)\n", pTrustee); 
3475   
3476     if (!pTrustee) 
3477         return NULL; 
3478   
3479     return pTrustee->ptstrName; 
3480 }  
3481   
3482 /****************************************************************************** 
3483  * GetTrusteeTypeA [ADVAPI32.@] 
3484  */ 
3485 TRUSTEE_TYPE WINAPI GetTrusteeTypeA(PTRUSTEEA pTrustee) 
3486 {  
3487     TRACE("(%p)\n", pTrustee); 
3488   
3489     if (!pTrustee) 
3490         return TRUSTEE_IS_UNKNOWN; 
3491   
3492     return pTrustee->TrusteeType; 
3493 }  
3494   
3495 /****************************************************************************** 
3496  * GetTrusteeTypeW [ADVAPI32.@] 
3497  */ 
3498 TRUSTEE_TYPE WINAPI GetTrusteeTypeW(PTRUSTEEW pTrustee) 
3499 {  
3500     TRACE("(%p)\n", pTrustee); 
3501   
3502     if (!pTrustee) 
3503         return TRUSTEE_IS_UNKNOWN; 
3504   
3505     return pTrustee->TrusteeType; 
3506
3507  
3508 BOOL WINAPI SetAclInformation( PACL pAcl, LPVOID pAclInformation,
3509                                DWORD nAclInformationLength,
3510                                ACL_INFORMATION_CLASS dwAclInformationClass )
3511 {
3512     FIXME("%p %p 0x%08x 0x%08x - stub\n", pAcl, pAclInformation,
3513           nAclInformationLength, dwAclInformationClass);
3514
3515     return TRUE;
3516 }
3517
3518 /******************************************************************************
3519  * SetEntriesInAclA [ADVAPI32.@]
3520  */
3521 DWORD WINAPI SetEntriesInAclA( ULONG count, PEXPLICIT_ACCESSA pEntries,
3522                                PACL OldAcl, PACL* NewAcl )
3523 {
3524     DWORD err = ERROR_SUCCESS;
3525     PEXPLICIT_ACCESSW pEntriesW;
3526
3527     TRACE("%d %p %p %p\n", count, pEntries, OldAcl, NewAcl);
3528
3529     if (NewAcl)
3530         *NewAcl = NULL;
3531
3532     if (!count && !OldAcl)
3533         return ERROR_SUCCESS;
3534
3535     pEntriesW = HeapAlloc( GetProcessHeap(), 0, count*sizeof(EXPLICIT_ACCESSW) );
3536     if (pEntriesW)
3537     {
3538         int i, len;
3539         LPWSTR wstr = NULL;
3540         PEXPLICIT_ACCESSW ptrW = pEntriesW;
3541         PEXPLICIT_ACCESSA ptrA = pEntries;
3542
3543         for (i = 0; i < count; ++i, ++ptrA, ++ptrW)
3544         {
3545             ptrW->grfAccessPermissions = ptrA->grfAccessPermissions;
3546             ptrW->grfAccessMode = ptrA->grfAccessMode;
3547             ptrW->grfInheritance = ptrA->grfInheritance;
3548             ptrW->Trustee.pMultipleTrustee = NULL; /* currently not supported */
3549             ptrW->Trustee.MultipleTrusteeOperation = ptrA->Trustee.MultipleTrusteeOperation;
3550             ptrW->Trustee.TrusteeForm = ptrA->Trustee.TrusteeForm;
3551             ptrW->Trustee.TrusteeType = ptrA->Trustee.TrusteeType;
3552             wstr = NULL;
3553             if (ptrA->Trustee.ptstrName)
3554             {
3555                 len = MultiByteToWideChar( CP_ACP, 0, ptrA->Trustee.ptstrName, -1, NULL, 0 );
3556                 wstr = HeapAlloc( GetProcessHeap(), 0, len*sizeof(WCHAR));
3557                 MultiByteToWideChar( CP_ACP, 0, ptrA->Trustee.ptstrName, -1, wstr, len );
3558             }
3559             ptrW->Trustee.ptstrName = wstr;
3560         }
3561
3562         err = SetEntriesInAclW( count, pEntriesW, OldAcl, NewAcl );
3563
3564         ptrW = pEntriesW;
3565         for (i = 0; i < count; ++i, ++ptrW)
3566         {
3567             HeapFree( GetProcessHeap(), 0, ptrW->Trustee.ptstrName );
3568         }
3569         HeapFree( GetProcessHeap(), 0, pEntriesW );
3570     }
3571     else
3572     {
3573         err = ERROR_NOT_ENOUGH_MEMORY;
3574     }
3575     return err;
3576 }
3577
3578 /******************************************************************************
3579  * SetEntriesInAclW [ADVAPI32.@]
3580  */
3581 DWORD WINAPI SetEntriesInAclW( ULONG count, PEXPLICIT_ACCESSW pEntries,
3582                                PACL OldAcl, PACL* NewAcl )
3583 {
3584     ULONG i;
3585     PSID *ppsid;
3586     DWORD ret = ERROR_SUCCESS;
3587     DWORD acl_size = sizeof(ACL);
3588     NTSTATUS status;
3589
3590     TRACE("%d %p %p %p\n", count, pEntries, OldAcl, NewAcl);
3591
3592     if (NewAcl)
3593         *NewAcl = NULL;
3594
3595     if (!count && !OldAcl)
3596         return ERROR_SUCCESS;
3597
3598     /* allocate array of maximum sized sids allowed */
3599     ppsid = HeapAlloc(GetProcessHeap(), 0, count * (sizeof(SID *) + FIELD_OFFSET(SID, SubAuthority[SID_MAX_SUB_AUTHORITIES])));
3600     if (!ppsid)
3601         return ERROR_OUTOFMEMORY;
3602
3603     for (i = 0; i < count; i++)
3604     {
3605         ppsid[i] = (char *)&ppsid[count] + i * FIELD_OFFSET(SID, SubAuthority[SID_MAX_SUB_AUTHORITIES]);
3606
3607         TRACE("[%d]:\n\tgrfAccessPermissions = 0x%x\n\tgrfAccessMode = %d\n\tgrfInheritance = 0x%x\n\t"
3608               "Trustee.pMultipleTrustee = %p\n\tMultipleTrusteeOperation = %d\n\tTrusteeForm = %d\n\t"
3609               "Trustee.TrusteeType = %d\n\tptstrName = %p\n", i,
3610               pEntries[i].grfAccessPermissions, pEntries[i].grfAccessMode, pEntries[i].grfInheritance,
3611               pEntries[i].Trustee.pMultipleTrustee, pEntries[i].Trustee.MultipleTrusteeOperation,
3612               pEntries[i].Trustee.TrusteeForm, pEntries[i].Trustee.TrusteeType,
3613               pEntries[i].Trustee.ptstrName);
3614
3615         if (pEntries[i].Trustee.MultipleTrusteeOperation == TRUSTEE_IS_IMPERSONATE)
3616         {
3617             WARN("bad multiple trustee operation %d for trustee %d\n", pEntries[i].Trustee.MultipleTrusteeOperation, i);
3618             ret = ERROR_INVALID_PARAMETER;
3619             goto exit;
3620         }
3621
3622         switch (pEntries[i].Trustee.TrusteeForm)
3623         {
3624         case TRUSTEE_IS_SID:
3625             if (!CopySid(FIELD_OFFSET(SID, SubAuthority[SID_MAX_SUB_AUTHORITIES]),
3626                          ppsid[i], pEntries[i].Trustee.ptstrName))
3627             {
3628                 WARN("bad sid %p for trustee %d\n", pEntries[i].Trustee.ptstrName, i);
3629                 ret = ERROR_INVALID_PARAMETER;
3630                 goto exit;
3631             }
3632             break;
3633         case TRUSTEE_IS_NAME:
3634         {
3635             DWORD sid_size = FIELD_OFFSET(SID, SubAuthority[SID_MAX_SUB_AUTHORITIES]);
3636             DWORD domain_size = MAX_COMPUTERNAME_LENGTH + 1;
3637             SID_NAME_USE use;
3638             if (!strcmpW( pEntries[i].Trustee.ptstrName, CURRENT_USER ))
3639             {
3640                 if (!lookup_user_account_name( ppsid[i], &sid_size, NULL, &domain_size, &use ))
3641                 {
3642                     ret = GetLastError();
3643                     goto exit;
3644                 }
3645             }
3646             else if (!LookupAccountNameW(NULL, pEntries[i].Trustee.ptstrName, ppsid[i], &sid_size, NULL, &domain_size, &use))
3647             {
3648                 WARN("bad user name %s for trustee %d\n", debugstr_w(pEntries[i].Trustee.ptstrName), i);
3649                 ret = ERROR_INVALID_PARAMETER;
3650                 goto exit;
3651             }
3652             break;
3653         }
3654         case TRUSTEE_IS_OBJECTS_AND_SID:
3655             FIXME("TRUSTEE_IS_OBJECTS_AND_SID unimplemented\n");
3656             break;
3657         case TRUSTEE_IS_OBJECTS_AND_NAME:
3658             FIXME("TRUSTEE_IS_OBJECTS_AND_NAME unimplemented\n");
3659             break;
3660         default:
3661             WARN("bad trustee form %d for trustee %d\n", pEntries[i].Trustee.TrusteeForm, i);
3662             ret = ERROR_INVALID_PARAMETER;
3663             goto exit;
3664         }
3665
3666         /* Note: we overestimate the ACL size here as a tradeoff between
3667          * instructions (simplicity) and memory */
3668         switch (pEntries[i].grfAccessMode)
3669         {
3670         case GRANT_ACCESS:
3671         case SET_ACCESS:
3672             acl_size += FIELD_OFFSET(ACCESS_ALLOWED_ACE, SidStart) + GetLengthSid(ppsid[i]);
3673             break;
3674         case DENY_ACCESS:
3675             acl_size += FIELD_OFFSET(ACCESS_DENIED_ACE, SidStart) + GetLengthSid(ppsid[i]);
3676             break;
3677         case SET_AUDIT_SUCCESS:
3678         case SET_AUDIT_FAILURE:
3679             acl_size += FIELD_OFFSET(SYSTEM_AUDIT_ACE, SidStart) + GetLengthSid(ppsid[i]);
3680             break;
3681         case REVOKE_ACCESS:
3682             break;
3683         default:
3684             WARN("bad access mode %d for trustee %d\n", pEntries[i].grfAccessMode, i);
3685             ret = ERROR_INVALID_PARAMETER;
3686             goto exit;
3687         }
3688     }
3689
3690     if (OldAcl)
3691     {
3692         ACL_SIZE_INFORMATION size_info;
3693
3694         status = RtlQueryInformationAcl(OldAcl, &size_info, sizeof(size_info), AclSizeInformation);
3695         if (status != STATUS_SUCCESS)
3696         {
3697             ret = RtlNtStatusToDosError(status);
3698             goto exit;
3699         }
3700         acl_size += size_info.AclBytesInUse - sizeof(ACL);
3701     }
3702
3703     *NewAcl = LocalAlloc(0, acl_size);
3704     if (!*NewAcl)
3705     {
3706         ret = ERROR_OUTOFMEMORY;
3707         goto exit;
3708     }
3709
3710     status = RtlCreateAcl( *NewAcl, acl_size, ACL_REVISION );
3711     if (status != STATUS_SUCCESS)
3712     {
3713         ret = RtlNtStatusToDosError(status);
3714         goto exit;
3715     }
3716
3717     for (i = 0; i < count; i++)
3718     {
3719         switch (pEntries[i].grfAccessMode)
3720         {
3721         case GRANT_ACCESS:
3722             status = RtlAddAccessAllowedAceEx(*NewAcl, ACL_REVISION,
3723                                               pEntries[i].grfInheritance,
3724                                               pEntries[i].grfAccessPermissions,
3725                                               ppsid[i]);
3726             break;
3727         case SET_ACCESS:
3728         {
3729             ULONG j;
3730             BOOL add = TRUE;
3731             if (OldAcl)
3732             {
3733                 for (j = 0; ; j++)
3734                 {
3735                     const ACE_HEADER *existing_ace_header;
3736                     status = RtlGetAce(OldAcl, j, (LPVOID *)&existing_ace_header);
3737                     if (status != STATUS_SUCCESS)
3738                         break;
3739                     if (pEntries[i].grfAccessMode == SET_ACCESS &&
3740                         existing_ace_header->AceType == ACCESS_ALLOWED_ACE_TYPE &&
3741                         EqualSid(ppsid[i], &((ACCESS_ALLOWED_ACE *)existing_ace_header)->SidStart))
3742                     {
3743                         add = FALSE;
3744                         break;
3745                     }
3746                 }
3747             }
3748             if (add)
3749                 status = RtlAddAccessAllowedAceEx(*NewAcl, ACL_REVISION,
3750                                                   pEntries[i].grfInheritance,
3751                                                   pEntries[i].grfAccessPermissions,
3752                                                   ppsid[i]);
3753             break;
3754         }
3755         case DENY_ACCESS:
3756             status = RtlAddAccessDeniedAceEx(*NewAcl, ACL_REVISION,
3757                                              pEntries[i].grfInheritance,
3758                                              pEntries[i].grfAccessPermissions,
3759                                              ppsid[i]);
3760             break;
3761         case SET_AUDIT_SUCCESS:
3762             status = RtlAddAuditAccessAceEx(*NewAcl, ACL_REVISION,
3763                                             pEntries[i].grfInheritance,
3764                                             pEntries[i].grfAccessPermissions,
3765                                             ppsid[i], TRUE, FALSE);
3766             break;
3767         case SET_AUDIT_FAILURE:
3768             status = RtlAddAuditAccessAceEx(*NewAcl, ACL_REVISION,
3769                                             pEntries[i].grfInheritance,
3770                                             pEntries[i].grfAccessPermissions,
3771                                             ppsid[i], FALSE, TRUE);
3772             break;
3773         default:
3774             FIXME("unhandled access mode %d\n", pEntries[i].grfAccessMode);
3775         }
3776     }
3777
3778     if (OldAcl)
3779     {
3780         for (i = 0; ; i++)
3781         {
3782             BOOL add = TRUE;
3783             ULONG j;
3784             const ACE_HEADER *old_ace_header;
3785             status = RtlGetAce(OldAcl, i, (LPVOID *)&old_ace_header);
3786             if (status != STATUS_SUCCESS) break;
3787             for (j = 0; j < count; j++)
3788             {
3789                 if (pEntries[j].grfAccessMode == SET_ACCESS &&
3790                     old_ace_header->AceType == ACCESS_ALLOWED_ACE_TYPE &&
3791                     EqualSid(ppsid[j], &((ACCESS_ALLOWED_ACE *)old_ace_header)->SidStart))
3792                 {
3793                     status = RtlAddAccessAllowedAceEx(*NewAcl, ACL_REVISION, pEntries[j].grfInheritance, pEntries[j].grfAccessPermissions, ppsid[j]);
3794                     add = FALSE;
3795                     break;
3796                 }
3797                 else if (pEntries[j].grfAccessMode == REVOKE_ACCESS)
3798                 {
3799                     switch (old_ace_header->AceType)
3800                     {
3801                     case ACCESS_ALLOWED_ACE_TYPE:
3802                         if (EqualSid(ppsid[j], &((ACCESS_ALLOWED_ACE *)old_ace_header)->SidStart))
3803                             add = FALSE;
3804                         break;
3805                     case ACCESS_DENIED_ACE_TYPE:
3806                         if (EqualSid(ppsid[j], &((ACCESS_DENIED_ACE *)old_ace_header)->SidStart))
3807                             add = FALSE;
3808                         break;
3809                     case SYSTEM_AUDIT_ACE_TYPE:
3810                         if (EqualSid(ppsid[j], &((SYSTEM_AUDIT_ACE *)old_ace_header)->SidStart))
3811                             add = FALSE;
3812                         break;
3813                     case SYSTEM_ALARM_ACE_TYPE:
3814                         if (EqualSid(ppsid[j], &((SYSTEM_ALARM_ACE *)old_ace_header)->SidStart))
3815                             add = FALSE;
3816                         break;
3817                     default:
3818                         FIXME("unhandled ace type %d\n", old_ace_header->AceType);
3819                     }
3820
3821                     if (!add)
3822                         break;
3823                 }
3824             }
3825             if (add)
3826                 status = RtlAddAce(*NewAcl, ACL_REVISION, 1, (PACE_HEADER)old_ace_header, old_ace_header->AceSize);
3827             if (status != STATUS_SUCCESS)
3828             {
3829                 WARN("RtlAddAce failed with error 0x%08x\n", status);
3830                 ret = RtlNtStatusToDosError(status);
3831                 break;
3832             }
3833         }
3834     }
3835
3836 exit:
3837     HeapFree(GetProcessHeap(), 0, ppsid);
3838     return ret;
3839 }
3840
3841 /******************************************************************************
3842  * SetNamedSecurityInfoA [ADVAPI32.@]
3843  */
3844 DWORD WINAPI SetNamedSecurityInfoA(LPSTR pObjectName,
3845         SE_OBJECT_TYPE ObjectType, SECURITY_INFORMATION SecurityInfo,
3846         PSID psidOwner, PSID psidGroup, PACL pDacl, PACL pSacl)
3847 {
3848     DWORD len;
3849     LPWSTR wstr = NULL;
3850     DWORD r;
3851
3852     TRACE("%s %d %d %p %p %p %p\n", debugstr_a(pObjectName), ObjectType,
3853            SecurityInfo, psidOwner, psidGroup, pDacl, pSacl);
3854
3855     if( pObjectName )
3856     {
3857         len = MultiByteToWideChar( CP_ACP, 0, pObjectName, -1, NULL, 0 );
3858         wstr = HeapAlloc( GetProcessHeap(), 0, len*sizeof(WCHAR));
3859         MultiByteToWideChar( CP_ACP, 0, pObjectName, -1, wstr, len );
3860     }
3861
3862     r = SetNamedSecurityInfoW( wstr, ObjectType, SecurityInfo, psidOwner,
3863                            psidGroup, pDacl, pSacl );
3864
3865     HeapFree( GetProcessHeap(), 0, wstr );
3866
3867     return r;
3868 }
3869
3870 BOOL WINAPI SetPrivateObjectSecurity( SECURITY_INFORMATION SecurityInformation,
3871     PSECURITY_DESCRIPTOR ModificationDescriptor,
3872     PSECURITY_DESCRIPTOR* ObjectsSecurityDescriptor,
3873     PGENERIC_MAPPING GenericMapping,
3874     HANDLE Token )
3875 {
3876     FIXME("0x%08x %p %p %p %p - stub\n", SecurityInformation, ModificationDescriptor,
3877           ObjectsSecurityDescriptor, GenericMapping, Token);
3878
3879     return TRUE;
3880 }
3881
3882 BOOL WINAPI AreAllAccessesGranted( DWORD GrantedAccess, DWORD DesiredAccess )
3883 {
3884     return RtlAreAllAccessesGranted( GrantedAccess, DesiredAccess );
3885 }
3886
3887 /******************************************************************************
3888  * AreAnyAccessesGranted [ADVAPI32.@]
3889  *
3890  * Determines whether or not any of a set of specified access permissions have
3891  * been granted or not.
3892  *
3893  * PARAMS
3894  *   GrantedAccess [I] The permissions that have been granted.
3895  *   DesiredAccess [I] The permissions that you want to have.
3896  *
3897  * RETURNS
3898  *   Nonzero if any of the permissions have been granted, zero if none of the
3899  *   permissions have been granted.
3900  */
3901
3902 BOOL WINAPI AreAnyAccessesGranted( DWORD GrantedAccess, DWORD DesiredAccess )
3903 {
3904     return RtlAreAnyAccessesGranted( GrantedAccess, DesiredAccess );
3905 }
3906
3907 /******************************************************************************
3908  * SetNamedSecurityInfoW [ADVAPI32.@]
3909  */
3910 DWORD WINAPI SetNamedSecurityInfoW(LPWSTR pObjectName,
3911         SE_OBJECT_TYPE ObjectType, SECURITY_INFORMATION SecurityInfo,
3912         PSID psidOwner, PSID psidGroup, PACL pDacl, PACL pSacl)
3913 {
3914     FIXME("%s %d %d %p %p %p %p\n", debugstr_w(pObjectName), ObjectType,
3915            SecurityInfo, psidOwner, psidGroup, pDacl, pSacl);
3916     return ERROR_SUCCESS;
3917 }
3918
3919 /******************************************************************************
3920  * GetExplicitEntriesFromAclA [ADVAPI32.@]
3921  */
3922 DWORD WINAPI GetExplicitEntriesFromAclA( PACL pacl, PULONG pcCountOfExplicitEntries,
3923         PEXPLICIT_ACCESSA* pListOfExplicitEntries)
3924 {
3925     FIXME("%p %p %p\n",pacl, pcCountOfExplicitEntries, pListOfExplicitEntries);
3926     return ERROR_CALL_NOT_IMPLEMENTED;
3927 }
3928
3929 /******************************************************************************
3930  * GetExplicitEntriesFromAclW [ADVAPI32.@]
3931  */
3932 DWORD WINAPI GetExplicitEntriesFromAclW( PACL pacl, PULONG pcCountOfExplicitEntries,
3933         PEXPLICIT_ACCESSW* pListOfExplicitEntries)
3934 {
3935     FIXME("%p %p %p\n",pacl, pcCountOfExplicitEntries, pListOfExplicitEntries);
3936     return ERROR_CALL_NOT_IMPLEMENTED;
3937 }
3938
3939 /******************************************************************************
3940  * GetAuditedPermissionsFromAclA [ADVAPI32.@]
3941  */
3942 DWORD WINAPI GetAuditedPermissionsFromAclA( PACL pacl, PTRUSTEEA pTrustee, PACCESS_MASK pSuccessfulAuditedRights,
3943         PACCESS_MASK pFailedAuditRights)
3944 {
3945     FIXME("%p %p %p %p\n",pacl, pTrustee, pSuccessfulAuditedRights, pFailedAuditRights);
3946     return ERROR_CALL_NOT_IMPLEMENTED;
3947
3948 }
3949
3950 /******************************************************************************
3951  * GetAuditedPermissionsFromAclW [ADVAPI32.@]
3952  */
3953 DWORD WINAPI GetAuditedPermissionsFromAclW( PACL pacl, PTRUSTEEW pTrustee, PACCESS_MASK pSuccessfulAuditedRights,
3954         PACCESS_MASK pFailedAuditRights)
3955 {
3956     FIXME("%p %p %p %p\n",pacl, pTrustee, pSuccessfulAuditedRights, pFailedAuditRights);
3957     return ERROR_CALL_NOT_IMPLEMENTED;
3958
3959 }
3960
3961 /******************************************************************************
3962  * ParseAclStringFlags
3963  */
3964 static DWORD ParseAclStringFlags(LPCWSTR* StringAcl)
3965 {
3966     DWORD flags = 0;
3967     LPCWSTR szAcl = *StringAcl;
3968
3969     while (*szAcl != '(')
3970     {
3971         if (*szAcl == 'P')
3972         {
3973             flags |= SE_DACL_PROTECTED;
3974         }
3975         else if (*szAcl == 'A')
3976         {
3977             szAcl++;
3978             if (*szAcl == 'R')
3979                 flags |= SE_DACL_AUTO_INHERIT_REQ;
3980             else if (*szAcl == 'I')
3981                 flags |= SE_DACL_AUTO_INHERITED;
3982         }
3983         szAcl++;
3984     }
3985
3986     *StringAcl = szAcl;
3987     return flags;
3988 }
3989
3990 /******************************************************************************
3991  * ParseAceStringType
3992  */
3993 static const ACEFLAG AceType[] =
3994 {
3995     { SDDL_ALARM,          SYSTEM_ALARM_ACE_TYPE },
3996     { SDDL_AUDIT,          SYSTEM_AUDIT_ACE_TYPE },
3997     { SDDL_ACCESS_ALLOWED, ACCESS_ALLOWED_ACE_TYPE },
3998     { SDDL_ACCESS_DENIED,  ACCESS_DENIED_ACE_TYPE },
3999     /*
4000     { SDDL_OBJECT_ACCESS_ALLOWED, ACCESS_ALLOWED_OBJECT_ACE_TYPE },
4001     { SDDL_OBJECT_ACCESS_DENIED,  ACCESS_DENIED_OBJECT_ACE_TYPE },
4002     { SDDL_OBJECT_ALARM,          SYSTEM_ALARM_OBJECT_ACE_TYPE },
4003     { SDDL_OBJECT_AUDIT,          SYSTEM_AUDIT_OBJECT_ACE_TYPE },
4004     */
4005     { NULL, 0 },
4006 };
4007
4008 static BYTE ParseAceStringType(LPCWSTR* StringAcl)
4009 {
4010     UINT len = 0;
4011     LPCWSTR szAcl = *StringAcl;
4012     const ACEFLAG *lpaf = AceType;
4013
4014     while (*szAcl == ' ')
4015         szAcl++;
4016
4017     while (lpaf->wstr &&
4018         (len = strlenW(lpaf->wstr)) &&
4019         strncmpW(lpaf->wstr, szAcl, len))
4020         lpaf++;
4021
4022     if (!lpaf->wstr)
4023         return 0;
4024
4025     *StringAcl = szAcl + len;
4026     return lpaf->value;
4027 }
4028
4029
4030 /******************************************************************************
4031  * ParseAceStringFlags
4032  */
4033 static const ACEFLAG AceFlags[] =
4034 {
4035     { SDDL_CONTAINER_INHERIT, CONTAINER_INHERIT_ACE },
4036     { SDDL_AUDIT_FAILURE,     FAILED_ACCESS_ACE_FLAG },
4037     { SDDL_INHERITED,         INHERITED_ACE },
4038     { SDDL_INHERIT_ONLY,      INHERIT_ONLY_ACE },
4039     { SDDL_NO_PROPAGATE,      NO_PROPAGATE_INHERIT_ACE },
4040     { SDDL_OBJECT_INHERIT,    OBJECT_INHERIT_ACE },
4041     { SDDL_AUDIT_SUCCESS,     SUCCESSFUL_ACCESS_ACE_FLAG },
4042     { NULL, 0 },
4043 };
4044
4045 static BYTE ParseAceStringFlags(LPCWSTR* StringAcl)
4046 {
4047     UINT len = 0;
4048     BYTE flags = 0;
4049     LPCWSTR szAcl = *StringAcl;
4050
4051     while (*szAcl == ' ')
4052         szAcl++;
4053
4054     while (*szAcl != ';')
4055     {
4056         const ACEFLAG *lpaf = AceFlags;
4057
4058         while (lpaf->wstr &&
4059                (len = strlenW(lpaf->wstr)) &&
4060                strncmpW(lpaf->wstr, szAcl, len))
4061             lpaf++;
4062
4063         if (!lpaf->wstr)
4064             return 0;
4065
4066         flags |= lpaf->value;
4067         szAcl += len;
4068     }
4069
4070     *StringAcl = szAcl;
4071     return flags;
4072 }
4073
4074
4075 /******************************************************************************
4076  * ParseAceStringRights
4077  */
4078 static const ACEFLAG AceRights[] =
4079 {
4080     { SDDL_GENERIC_ALL,     GENERIC_ALL },
4081     { SDDL_GENERIC_READ,    GENERIC_READ },
4082     { SDDL_GENERIC_WRITE,   GENERIC_WRITE },
4083     { SDDL_GENERIC_EXECUTE, GENERIC_EXECUTE },
4084
4085     { SDDL_READ_CONTROL,    READ_CONTROL },
4086     { SDDL_STANDARD_DELETE, DELETE },
4087     { SDDL_WRITE_DAC,       WRITE_DAC },
4088     { SDDL_WRITE_OWNER,     WRITE_OWNER },
4089
4090     { SDDL_READ_PROPERTY,   ADS_RIGHT_DS_READ_PROP},
4091     { SDDL_WRITE_PROPERTY,  ADS_RIGHT_DS_WRITE_PROP},
4092     { SDDL_CREATE_CHILD,    ADS_RIGHT_DS_CREATE_CHILD},
4093     { SDDL_DELETE_CHILD,    ADS_RIGHT_DS_DELETE_CHILD},
4094     { SDDL_LIST_CHILDREN,   ADS_RIGHT_ACTRL_DS_LIST},
4095     { SDDL_SELF_WRITE,      ADS_RIGHT_DS_SELF},
4096     { SDDL_LIST_OBJECT,     ADS_RIGHT_DS_LIST_OBJECT},
4097     { SDDL_DELETE_TREE,     ADS_RIGHT_DS_DELETE_TREE},
4098     { SDDL_CONTROL_ACCESS,  ADS_RIGHT_DS_CONTROL_ACCESS},
4099
4100     { SDDL_FILE_ALL,        FILE_ALL_ACCESS },
4101     { SDDL_FILE_READ,       FILE_GENERIC_READ },
4102     { SDDL_FILE_WRITE,      FILE_GENERIC_WRITE },
4103     { SDDL_FILE_EXECUTE,    FILE_GENERIC_EXECUTE },
4104
4105     { SDDL_KEY_ALL,         KEY_ALL_ACCESS },
4106     { SDDL_KEY_READ,        KEY_READ },
4107     { SDDL_KEY_WRITE,       KEY_WRITE },
4108     { SDDL_KEY_EXECUTE,     KEY_EXECUTE },
4109     { NULL, 0 },
4110 };
4111
4112 static DWORD ParseAceStringRights(LPCWSTR* StringAcl)
4113 {
4114     UINT len = 0;
4115     DWORD rights = 0;
4116     LPCWSTR szAcl = *StringAcl;
4117
4118     while (*szAcl == ' ')
4119         szAcl++;
4120
4121     if ((*szAcl == '0') && (*(szAcl + 1) == 'x'))
4122     {
4123         LPCWSTR p = szAcl;
4124
4125         while (*p && *p != ';')
4126             p++;
4127
4128         if (p - szAcl <= 10 /* 8 hex digits + "0x" */ )
4129         {
4130             rights = strtoulW(szAcl, NULL, 16);
4131             szAcl = p;
4132         }
4133         else
4134             WARN("Invalid rights string format: %s\n", debugstr_wn(szAcl, p - szAcl));
4135     }
4136     else
4137     {
4138         while (*szAcl != ';')
4139         {
4140             const ACEFLAG *lpaf = AceRights;
4141
4142             while (lpaf->wstr &&
4143                (len = strlenW(lpaf->wstr)) &&
4144                strncmpW(lpaf->wstr, szAcl, len))
4145             {
4146                lpaf++;
4147             }
4148
4149             if (!lpaf->wstr)
4150                 return 0;
4151
4152             rights |= lpaf->value;
4153             szAcl += len;
4154         }
4155     }
4156
4157     *StringAcl = szAcl;
4158     return rights;
4159 }
4160
4161
4162 /******************************************************************************
4163  * ParseStringAclToAcl
4164  * 
4165  * dacl_flags(string_ace1)(string_ace2)... (string_acen) 
4166  */
4167 static BOOL ParseStringAclToAcl(LPCWSTR StringAcl, LPDWORD lpdwFlags, 
4168     PACL pAcl, LPDWORD cBytes)
4169 {
4170     DWORD val;
4171     DWORD sidlen;
4172     DWORD length = sizeof(ACL);
4173     DWORD acesize = 0;
4174     DWORD acecount = 0;
4175     PACCESS_ALLOWED_ACE pAce = NULL; /* pointer to current ACE */
4176     DWORD error = ERROR_INVALID_ACL;
4177
4178     TRACE("%s\n", debugstr_w(StringAcl));
4179
4180     if (!StringAcl)
4181         return FALSE;
4182
4183     if (pAcl) /* pAce is only useful if we're setting values */
4184         pAce = (PACCESS_ALLOWED_ACE) (pAcl + 1);
4185
4186     /* Parse ACL flags */
4187     *lpdwFlags = ParseAclStringFlags(&StringAcl);
4188
4189     /* Parse ACE */
4190     while (*StringAcl == '(')
4191     {
4192         StringAcl++;
4193
4194         /* Parse ACE type */
4195         val = ParseAceStringType(&StringAcl);
4196         if (pAce)
4197             pAce->Header.AceType = (BYTE) val;
4198         if (*StringAcl != ';')
4199         {
4200             error = RPC_S_INVALID_STRING_UUID;
4201             goto lerr;
4202         }
4203         StringAcl++;
4204
4205         /* Parse ACE flags */
4206         val = ParseAceStringFlags(&StringAcl);
4207         if (pAce)
4208             pAce->Header.AceFlags = (BYTE) val;
4209         if (*StringAcl != ';')
4210             goto lerr;
4211         StringAcl++;
4212
4213         /* Parse ACE rights */
4214         val = ParseAceStringRights(&StringAcl);
4215         if (pAce)
4216             pAce->Mask = val;
4217         if (*StringAcl != ';')
4218             goto lerr;
4219         StringAcl++;
4220
4221         /* Parse ACE object guid */
4222         while (*StringAcl == ' ')
4223             StringAcl++;
4224         if (*StringAcl != ';')
4225         {
4226             FIXME("Support for *_OBJECT_ACE_TYPE not implemented\n");
4227             goto lerr;
4228         }
4229         StringAcl++;
4230
4231         /* Parse ACE inherit object guid */
4232         while (*StringAcl == ' ')
4233             StringAcl++;
4234         if (*StringAcl != ';')
4235         {
4236             FIXME("Support for *_OBJECT_ACE_TYPE not implemented\n");
4237             goto lerr;
4238         }
4239         StringAcl++;
4240
4241         /* Parse ACE account sid */
4242         if (ParseStringSidToSid(StringAcl, pAce ? &pAce->SidStart : NULL, &sidlen))
4243         {
4244             while (*StringAcl && *StringAcl != ')')
4245                 StringAcl++;
4246         }
4247
4248         if (*StringAcl != ')')
4249             goto lerr;
4250         StringAcl++;
4251
4252         acesize = sizeof(ACCESS_ALLOWED_ACE) - sizeof(DWORD) + sidlen;
4253         length += acesize;
4254         if (pAce)
4255         {
4256             pAce->Header.AceSize = acesize;
4257             pAce = (PACCESS_ALLOWED_ACE)((LPBYTE)pAce + acesize);
4258         }
4259         acecount++;
4260     }
4261
4262     *cBytes = length;
4263
4264     if (length > 0xffff)
4265     {
4266         ERR("ACL too large\n");
4267         goto lerr;
4268     }
4269
4270     if (pAcl)
4271     {
4272         pAcl->AclRevision = ACL_REVISION;
4273         pAcl->Sbz1 = 0;
4274         pAcl->AclSize = length;
4275         pAcl->AceCount = acecount++;
4276         pAcl->Sbz2 = 0;
4277     }
4278     return TRUE;
4279
4280 lerr:
4281     SetLastError(error);
4282     WARN("Invalid ACE string format\n");
4283     return FALSE;
4284 }
4285
4286
4287 /******************************************************************************
4288  * ParseStringSecurityDescriptorToSecurityDescriptor
4289  */
4290 static BOOL ParseStringSecurityDescriptorToSecurityDescriptor(
4291     LPCWSTR StringSecurityDescriptor,
4292     SECURITY_DESCRIPTOR_RELATIVE* SecurityDescriptor,
4293     LPDWORD cBytes)
4294 {
4295     BOOL bret = FALSE;
4296     WCHAR toktype;
4297     WCHAR tok[MAX_PATH];
4298     LPCWSTR lptoken;
4299     LPBYTE lpNext = NULL;
4300     DWORD len;
4301
4302     *cBytes = sizeof(SECURITY_DESCRIPTOR);
4303
4304     if (SecurityDescriptor)
4305         lpNext = (LPBYTE)(SecurityDescriptor + 1);
4306
4307     while (*StringSecurityDescriptor == ' ')
4308         StringSecurityDescriptor++;
4309
4310     while (*StringSecurityDescriptor)
4311     {
4312         toktype = *StringSecurityDescriptor;
4313
4314         /* Expect char identifier followed by ':' */
4315         StringSecurityDescriptor++;
4316         if (*StringSecurityDescriptor != ':')
4317         {
4318             SetLastError(ERROR_INVALID_PARAMETER);
4319             goto lend;
4320         }
4321         StringSecurityDescriptor++;
4322
4323         /* Extract token */
4324         lptoken = StringSecurityDescriptor;
4325         while (*lptoken && *lptoken != ':')
4326             lptoken++;
4327
4328         if (*lptoken)
4329             lptoken--;
4330
4331         len = lptoken - StringSecurityDescriptor;
4332         memcpy( tok, StringSecurityDescriptor, len * sizeof(WCHAR) );
4333         tok[len] = 0;
4334
4335         switch (toktype)
4336         {
4337             case 'O':
4338             {
4339                 DWORD bytes;
4340
4341                 if (!ParseStringSidToSid(tok, lpNext, &bytes))
4342                     goto lend;
4343
4344                 if (SecurityDescriptor)
4345                 {
4346                     SecurityDescriptor->Owner = lpNext - (LPBYTE)SecurityDescriptor;
4347                     lpNext += bytes; /* Advance to next token */
4348                 }
4349
4350                 *cBytes += bytes;
4351
4352                 break;
4353             }
4354
4355             case 'G':
4356             {
4357                 DWORD bytes;
4358
4359                 if (!ParseStringSidToSid(tok, lpNext, &bytes))
4360                     goto lend;
4361
4362                 if (SecurityDescriptor)
4363                 {
4364                     SecurityDescriptor->Group = lpNext - (LPBYTE)SecurityDescriptor;
4365                     lpNext += bytes; /* Advance to next token */
4366                 }
4367
4368                 *cBytes += bytes;
4369
4370                 break;
4371             }
4372
4373             case 'D':
4374             {
4375                 DWORD flags;
4376                 DWORD bytes;
4377
4378                 if (!ParseStringAclToAcl(tok, &flags, (PACL)lpNext, &bytes))
4379                     goto lend;
4380
4381                 if (SecurityDescriptor)
4382                 {
4383                     SecurityDescriptor->Control |= SE_DACL_PRESENT | flags;
4384                     SecurityDescriptor->Dacl = lpNext - (LPBYTE)SecurityDescriptor;
4385                     lpNext += bytes; /* Advance to next token */
4386                 }
4387
4388                 *cBytes += bytes;
4389
4390                 break;
4391             }
4392
4393             case 'S':
4394             {
4395                 DWORD flags;
4396                 DWORD bytes;
4397
4398                 if (!ParseStringAclToAcl(tok, &flags, (PACL)lpNext, &bytes))
4399                     goto lend;
4400
4401                 if (SecurityDescriptor)
4402                 {
4403                     SecurityDescriptor->Control |= SE_SACL_PRESENT | flags;
4404                     SecurityDescriptor->Sacl = lpNext - (LPBYTE)SecurityDescriptor;
4405                     lpNext += bytes; /* Advance to next token */
4406                 }
4407
4408                 *cBytes += bytes;
4409
4410                 break;
4411             }
4412
4413             default:
4414                 FIXME("Unknown token\n");
4415                 SetLastError(ERROR_INVALID_PARAMETER);
4416                 goto lend;
4417         }
4418
4419         StringSecurityDescriptor = lptoken;
4420     }
4421
4422     bret = TRUE;
4423
4424 lend:
4425     return bret;
4426 }
4427
4428 /******************************************************************************
4429  * ConvertStringSecurityDescriptorToSecurityDescriptorA [ADVAPI32.@]
4430  */
4431 BOOL WINAPI ConvertStringSecurityDescriptorToSecurityDescriptorA(
4432         LPCSTR StringSecurityDescriptor,
4433         DWORD StringSDRevision,
4434         PSECURITY_DESCRIPTOR* SecurityDescriptor,
4435         PULONG SecurityDescriptorSize)
4436 {
4437     UINT len;
4438     BOOL ret = FALSE;
4439     LPWSTR StringSecurityDescriptorW;
4440
4441     len = MultiByteToWideChar(CP_ACP, 0, StringSecurityDescriptor, -1, NULL, 0);
4442     StringSecurityDescriptorW = HeapAlloc(GetProcessHeap(), 0, len * sizeof(WCHAR));
4443
4444     if (StringSecurityDescriptorW)
4445     {
4446         MultiByteToWideChar(CP_ACP, 0, StringSecurityDescriptor, -1, StringSecurityDescriptorW, len);
4447
4448         ret = ConvertStringSecurityDescriptorToSecurityDescriptorW(StringSecurityDescriptorW,
4449                                                                    StringSDRevision, SecurityDescriptor,
4450                                                                    SecurityDescriptorSize);
4451         HeapFree(GetProcessHeap(), 0, StringSecurityDescriptorW);
4452     }
4453
4454     return ret;
4455 }
4456
4457 /******************************************************************************
4458  * ConvertStringSecurityDescriptorToSecurityDescriptorW [ADVAPI32.@]
4459  */
4460 BOOL WINAPI ConvertStringSecurityDescriptorToSecurityDescriptorW(
4461         LPCWSTR StringSecurityDescriptor,
4462         DWORD StringSDRevision,
4463         PSECURITY_DESCRIPTOR* SecurityDescriptor,
4464         PULONG SecurityDescriptorSize)
4465 {
4466     DWORD cBytes;
4467     SECURITY_DESCRIPTOR* psd;
4468     BOOL bret = FALSE;
4469
4470     TRACE("%s\n", debugstr_w(StringSecurityDescriptor));
4471
4472     if (GetVersion() & 0x80000000)
4473     {
4474         SetLastError(ERROR_CALL_NOT_IMPLEMENTED);
4475         goto lend;
4476     }
4477     else if (!StringSecurityDescriptor || !SecurityDescriptor)
4478     {
4479         SetLastError(ERROR_INVALID_PARAMETER);
4480         goto lend;
4481     }
4482     else if (StringSDRevision != SID_REVISION)
4483     {
4484         SetLastError(ERROR_UNKNOWN_REVISION);
4485         goto lend;
4486     }
4487
4488     /* Compute security descriptor length */
4489     if (!ParseStringSecurityDescriptorToSecurityDescriptor(StringSecurityDescriptor,
4490         NULL, &cBytes))
4491         goto lend;
4492
4493     psd = *SecurityDescriptor = LocalAlloc(GMEM_ZEROINIT, cBytes);
4494     if (!psd) goto lend;
4495
4496     psd->Revision = SID_REVISION;
4497     psd->Control |= SE_SELF_RELATIVE;
4498
4499     if (!ParseStringSecurityDescriptorToSecurityDescriptor(StringSecurityDescriptor,
4500              (SECURITY_DESCRIPTOR_RELATIVE *)psd, &cBytes))
4501     {
4502         LocalFree(psd);
4503         goto lend;
4504     }
4505
4506     if (SecurityDescriptorSize)
4507         *SecurityDescriptorSize = cBytes;
4508
4509     bret = TRUE;
4510  
4511 lend:
4512     TRACE(" ret=%d\n", bret);
4513     return bret;
4514 }
4515
4516 static void DumpString(LPCWSTR string, int cch, WCHAR **pwptr, ULONG *plen)
4517 {
4518     if (cch == -1)
4519         cch = strlenW(string);
4520
4521     if (plen)
4522         *plen += cch;
4523
4524     if (pwptr)
4525     {
4526         memcpy(*pwptr, string, sizeof(WCHAR)*cch);
4527         *pwptr += cch;
4528     }
4529 }
4530
4531 static BOOL DumpSidNumeric(PSID psid, WCHAR **pwptr, ULONG *plen)
4532 {
4533     DWORD i;
4534     WCHAR fmt[] = { 'S','-','%','u','-','%','d',0 };
4535     WCHAR subauthfmt[] = { '-','%','u',0 };
4536     WCHAR buf[26];
4537     SID *pisid = psid;
4538
4539     if( !IsValidSid( psid ) || pisid->Revision != SDDL_REVISION)
4540     {
4541         SetLastError(ERROR_INVALID_SID);
4542         return FALSE;
4543     }
4544
4545     if (pisid->IdentifierAuthority.Value[0] ||
4546      pisid->IdentifierAuthority.Value[1])
4547     {
4548         FIXME("not matching MS' bugs\n");
4549         SetLastError(ERROR_INVALID_SID);
4550         return FALSE;
4551     }
4552
4553     sprintfW( buf, fmt, pisid->Revision,
4554         MAKELONG(
4555             MAKEWORD( pisid->IdentifierAuthority.Value[5],
4556                     pisid->IdentifierAuthority.Value[4] ),
4557             MAKEWORD( pisid->IdentifierAuthority.Value[3],
4558                     pisid->IdentifierAuthority.Value[2] )
4559         ) );
4560     DumpString(buf, -1, pwptr, plen);
4561
4562     for( i=0; i<pisid->SubAuthorityCount; i++ )
4563     {
4564         sprintfW( buf, subauthfmt, pisid->SubAuthority[i] );
4565         DumpString(buf, -1, pwptr, plen);
4566     }
4567     return TRUE;
4568 }
4569
4570 static BOOL DumpSid(PSID psid, WCHAR **pwptr, ULONG *plen)
4571 {
4572     size_t i;
4573     for (i = 0; i < sizeof(WellKnownSids) / sizeof(WellKnownSids[0]); i++)
4574     {
4575         if (WellKnownSids[i].wstr[0] && EqualSid(psid, (PSID)&(WellKnownSids[i].Sid.Revision)))
4576         {
4577             DumpString(WellKnownSids[i].wstr, 2, pwptr, plen);
4578             return TRUE;
4579         }
4580     }
4581
4582     return DumpSidNumeric(psid, pwptr, plen);
4583 }
4584
4585 static const LPCWSTR AceRightBitNames[32] = {
4586         SDDL_CREATE_CHILD,        /*  0 */
4587         SDDL_DELETE_CHILD,
4588         SDDL_LIST_CHILDREN,
4589         SDDL_SELF_WRITE,
4590         SDDL_READ_PROPERTY,       /*  4 */
4591         SDDL_WRITE_PROPERTY,
4592         SDDL_DELETE_TREE,
4593         SDDL_LIST_OBJECT,
4594         SDDL_CONTROL_ACCESS,      /*  8 */
4595         NULL,
4596         NULL,
4597         NULL,
4598         NULL,                     /* 12 */
4599         NULL,
4600         NULL,
4601         NULL,
4602         SDDL_STANDARD_DELETE,     /* 16 */
4603         SDDL_READ_CONTROL,
4604         SDDL_WRITE_DAC,
4605         SDDL_WRITE_OWNER,
4606         NULL,                     /* 20 */
4607         NULL,
4608         NULL,
4609         NULL,
4610         NULL,                     /* 24 */
4611         NULL,
4612         NULL,
4613         NULL,
4614         SDDL_GENERIC_ALL,         /* 28 */
4615         SDDL_GENERIC_EXECUTE,
4616         SDDL_GENERIC_WRITE,
4617         SDDL_GENERIC_READ
4618 };
4619
4620 static void DumpRights(DWORD mask, WCHAR **pwptr, ULONG *plen)
4621 {
4622     static const WCHAR fmtW[] = {'0','x','%','x',0};
4623     WCHAR buf[15];
4624     size_t i;
4625
4626     if (mask == 0)
4627         return;
4628
4629     /* first check if the right have name */
4630     for (i = 0; i < sizeof(AceRights)/sizeof(AceRights[0]); i++)
4631     {
4632         if (AceRights[i].wstr == NULL)
4633             break;
4634         if (mask == AceRights[i].value)
4635         {
4636             DumpString(AceRights[i].wstr, -1, pwptr, plen);
4637             return;
4638         }
4639     }
4640
4641     /* then check if it can be built from bit names */
4642     for (i = 0; i < 32; i++)
4643     {
4644         if ((mask & (1 << i)) && (AceRightBitNames[i] == NULL))
4645         {
4646             /* can't be built from bit names */
4647             sprintfW(buf, fmtW, mask);
4648             DumpString(buf, -1, pwptr, plen);
4649             return;
4650         }
4651     }
4652
4653     /* build from bit names */
4654     for (i = 0; i < 32; i++)
4655         if (mask & (1 << i))
4656             DumpString(AceRightBitNames[i], -1, pwptr, plen);
4657 }
4658
4659 static BOOL DumpAce(LPVOID pace, WCHAR **pwptr, ULONG *plen)
4660 {
4661     ACCESS_ALLOWED_ACE *piace; /* all the supported ACEs have the same memory layout */
4662     static const WCHAR openbr = '(';
4663     static const WCHAR closebr = ')';
4664     static const WCHAR semicolon = ';';
4665
4666     if (((PACE_HEADER)pace)->AceType > SYSTEM_ALARM_ACE_TYPE || ((PACE_HEADER)pace)->AceSize < sizeof(ACCESS_ALLOWED_ACE))
4667     {
4668         SetLastError(ERROR_INVALID_ACL);
4669         return FALSE;
4670     }
4671
4672     piace = pace;
4673     DumpString(&openbr, 1, pwptr, plen);
4674     switch (piace->Header.AceType)
4675     {
4676         case ACCESS_ALLOWED_ACE_TYPE:
4677             DumpString(SDDL_ACCESS_ALLOWED, -1, pwptr, plen);
4678             break;
4679         case ACCESS_DENIED_ACE_TYPE:
4680             DumpString(SDDL_ACCESS_DENIED, -1, pwptr, plen);
4681             break;
4682         case SYSTEM_AUDIT_ACE_TYPE:
4683             DumpString(SDDL_AUDIT, -1, pwptr, plen);
4684             break;
4685         case SYSTEM_ALARM_ACE_TYPE:
4686             DumpString(SDDL_ALARM, -1, pwptr, plen);
4687             break;
4688     }
4689     DumpString(&semicolon, 1, pwptr, plen);
4690
4691     if (piace->Header.AceFlags & OBJECT_INHERIT_ACE)
4692         DumpString(SDDL_OBJECT_INHERIT, -1, pwptr, plen);
4693     if (piace->Header.AceFlags & CONTAINER_INHERIT_ACE)
4694         DumpString(SDDL_CONTAINER_INHERIT, -1, pwptr, plen);
4695     if (piace->Header.AceFlags & NO_PROPAGATE_INHERIT_ACE)
4696         DumpString(SDDL_NO_PROPAGATE, -1, pwptr, plen);
4697     if (piace->Header.AceFlags & INHERIT_ONLY_ACE)
4698         DumpString(SDDL_INHERIT_ONLY, -1, pwptr, plen);
4699     if (piace->Header.AceFlags & INHERITED_ACE)
4700         DumpString(SDDL_INHERITED, -1, pwptr, plen);
4701     if (piace->Header.AceFlags & SUCCESSFUL_ACCESS_ACE_FLAG)
4702         DumpString(SDDL_AUDIT_SUCCESS, -1, pwptr, plen);
4703     if (piace->Header.AceFlags & FAILED_ACCESS_ACE_FLAG)
4704         DumpString(SDDL_AUDIT_FAILURE, -1, pwptr, plen);
4705     DumpString(&semicolon, 1, pwptr, plen);
4706     DumpRights(piace->Mask, pwptr, plen);
4707     DumpString(&semicolon, 1, pwptr, plen);
4708     /* objects not supported */
4709     DumpString(&semicolon, 1, pwptr, plen);
4710     /* objects not supported */
4711     DumpString(&semicolon, 1, pwptr, plen);
4712     if (!DumpSid(&piace->SidStart, pwptr, plen))
4713         return FALSE;
4714     DumpString(&closebr, 1, pwptr, plen);
4715     return TRUE;
4716 }
4717
4718 static BOOL DumpAcl(PACL pacl, WCHAR **pwptr, ULONG *plen, BOOL protected, BOOL autoInheritReq, BOOL autoInherited)
4719 {
4720     WORD count;
4721     int i;
4722
4723     if (protected)
4724         DumpString(SDDL_PROTECTED, -1, pwptr, plen);
4725     if (autoInheritReq)
4726         DumpString(SDDL_AUTO_INHERIT_REQ, -1, pwptr, plen);
4727     if (autoInherited)
4728         DumpString(SDDL_AUTO_INHERITED, -1, pwptr, plen);
4729
4730     if (pacl == NULL)
4731         return TRUE;
4732
4733     if (!IsValidAcl(pacl))
4734         return FALSE;
4735
4736     count = pacl->AceCount;
4737     for (i = 0; i < count; i++)
4738     {
4739         LPVOID ace;
4740         if (!GetAce(pacl, i, &ace))
4741             return FALSE;
4742         if (!DumpAce(ace, pwptr, plen))
4743             return FALSE;
4744     }
4745
4746     return TRUE;
4747 }
4748
4749 static BOOL DumpOwner(PSECURITY_DESCRIPTOR SecurityDescriptor, WCHAR **pwptr, ULONG *plen)
4750 {
4751     static const WCHAR prefix[] = {'O',':',0};
4752     BOOL bDefaulted;
4753     PSID psid;
4754
4755     if (!GetSecurityDescriptorOwner(SecurityDescriptor, &psid, &bDefaulted))
4756         return FALSE;
4757
4758     if (psid == NULL)
4759         return TRUE;
4760
4761     DumpString(prefix, -1, pwptr, plen);
4762     if (!DumpSid(psid, pwptr, plen))
4763         return FALSE;
4764     return TRUE;
4765 }
4766
4767 static BOOL DumpGroup(PSECURITY_DESCRIPTOR SecurityDescriptor, WCHAR **pwptr, ULONG *plen)
4768 {
4769     static const WCHAR prefix[] = {'G',':',0};
4770     BOOL bDefaulted;
4771     PSID psid;
4772
4773     if (!GetSecurityDescriptorGroup(SecurityDescriptor, &psid, &bDefaulted))
4774         return FALSE;
4775
4776     if (psid == NULL)
4777         return TRUE;
4778
4779     DumpString(prefix, -1, pwptr, plen);
4780     if (!DumpSid(psid, pwptr, plen))
4781         return FALSE;
4782     return TRUE;
4783 }
4784
4785 static BOOL DumpDacl(PSECURITY_DESCRIPTOR SecurityDescriptor, WCHAR **pwptr, ULONG *plen)
4786 {
4787     static const WCHAR dacl[] = {'D',':',0};
4788     SECURITY_DESCRIPTOR_CONTROL control;
4789     BOOL present, defaulted;
4790     DWORD revision;
4791     PACL pacl;
4792
4793     if (!GetSecurityDescriptorDacl(SecurityDescriptor, &present, &pacl, &defaulted))
4794         return FALSE;
4795
4796     if (!GetSecurityDescriptorControl(SecurityDescriptor, &control, &revision))
4797         return FALSE;
4798
4799     if (!present)
4800         return TRUE;
4801
4802     DumpString(dacl, 2, pwptr, plen);
4803     if (!DumpAcl(pacl, pwptr, plen, control & SE_DACL_PROTECTED, control & SE_DACL_AUTO_INHERIT_REQ, control & SE_DACL_AUTO_INHERITED))
4804         return FALSE;
4805     return TRUE;
4806 }
4807
4808 static BOOL DumpSacl(PSECURITY_DESCRIPTOR SecurityDescriptor, WCHAR **pwptr, ULONG *plen)
4809 {
4810     static const WCHAR sacl[] = {'S',':',0};
4811     SECURITY_DESCRIPTOR_CONTROL control;
4812     BOOL present, defaulted;
4813     DWORD revision;
4814     PACL pacl;
4815
4816     if (!GetSecurityDescriptorSacl(SecurityDescriptor, &present, &pacl, &defaulted))
4817         return FALSE;
4818
4819     if (!GetSecurityDescriptorControl(SecurityDescriptor, &control, &revision))
4820         return FALSE;
4821
4822     if (!present)
4823         return TRUE;
4824
4825     DumpString(sacl, 2, pwptr, plen);
4826     if (!DumpAcl(pacl, pwptr, plen, control & SE_SACL_PROTECTED, control & SE_SACL_AUTO_INHERIT_REQ, control & SE_SACL_AUTO_INHERITED))
4827         return FALSE;
4828     return TRUE;
4829 }
4830
4831 /******************************************************************************
4832  * ConvertSecurityDescriptorToStringSecurityDescriptorA [ADVAPI32.@]
4833  */
4834 BOOL WINAPI ConvertSecurityDescriptorToStringSecurityDescriptorW(PSECURITY_DESCRIPTOR SecurityDescriptor, DWORD SDRevision, SECURITY_INFORMATION RequestedInformation, LPWSTR *OutputString, PULONG OutputLen)
4835 {
4836     ULONG len;
4837     WCHAR *wptr, *wstr;
4838
4839     if (SDRevision != SDDL_REVISION_1)
4840     {
4841         ERR("Pogram requested unknown SDDL revision %d\n", SDRevision);
4842         SetLastError(ERROR_UNKNOWN_REVISION);
4843         return FALSE;
4844     }
4845
4846     len = 0;
4847     if (RequestedInformation & OWNER_SECURITY_INFORMATION)
4848         if (!DumpOwner(SecurityDescriptor, NULL, &len))
4849             return FALSE;
4850     if (RequestedInformation & GROUP_SECURITY_INFORMATION)
4851         if (!DumpGroup(SecurityDescriptor, NULL, &len))
4852             return FALSE;
4853     if (RequestedInformation & DACL_SECURITY_INFORMATION)
4854         if (!DumpDacl(SecurityDescriptor, NULL, &len))
4855             return FALSE;
4856     if (RequestedInformation & SACL_SECURITY_INFORMATION)
4857         if (!DumpSacl(SecurityDescriptor, NULL, &len))
4858             return FALSE;
4859
4860     wstr = wptr = LocalAlloc(0, (len + 1)*sizeof(WCHAR));
4861     if (RequestedInformation & OWNER_SECURITY_INFORMATION)
4862         if (!DumpOwner(SecurityDescriptor, &wptr, NULL))
4863             return FALSE;
4864     if (RequestedInformation & GROUP_SECURITY_INFORMATION)
4865         if (!DumpGroup(SecurityDescriptor, &wptr, NULL))
4866             return FALSE;
4867     if (RequestedInformation & DACL_SECURITY_INFORMATION)
4868         if (!DumpDacl(SecurityDescriptor, &wptr, NULL))
4869             return FALSE;
4870     if (RequestedInformation & SACL_SECURITY_INFORMATION)
4871         if (!DumpSacl(SecurityDescriptor, &wptr, NULL))
4872             return FALSE;
4873     *wptr = 0;
4874
4875     TRACE("ret: %s, %d\n", wine_dbgstr_w(wstr), len);
4876     *OutputString = wstr;
4877     if (OutputLen)
4878         *OutputLen = strlenW(*OutputString)+1;
4879     return TRUE;
4880 }
4881
4882 /******************************************************************************
4883  * ConvertSecurityDescriptorToStringSecurityDescriptorA [ADVAPI32.@]
4884  */
4885 BOOL WINAPI ConvertSecurityDescriptorToStringSecurityDescriptorA(PSECURITY_DESCRIPTOR SecurityDescriptor, DWORD SDRevision, SECURITY_INFORMATION Information, LPSTR *OutputString, PULONG OutputLen)
4886 {
4887     LPWSTR wstr;
4888     ULONG len;
4889     if (ConvertSecurityDescriptorToStringSecurityDescriptorW(SecurityDescriptor, SDRevision, Information, &wstr, &len))
4890     {
4891         int lenA;
4892
4893         lenA = WideCharToMultiByte(CP_ACP, 0, wstr, len, NULL, 0, NULL, NULL);
4894         *OutputString = HeapAlloc(GetProcessHeap(), 0, lenA);
4895         WideCharToMultiByte(CP_ACP, 0, wstr, len, *OutputString, lenA, NULL, NULL);
4896         LocalFree(wstr);
4897
4898         if (OutputLen != NULL)
4899             *OutputLen = lenA;
4900         return TRUE;
4901     }
4902     else
4903     {
4904         *OutputString = NULL;
4905         if (OutputLen)
4906             *OutputLen = 0;
4907         return FALSE;
4908     }
4909 }
4910
4911 /******************************************************************************
4912  * ConvertStringSidToSidW [ADVAPI32.@]
4913  */
4914 BOOL WINAPI ConvertStringSidToSidW(LPCWSTR StringSid, PSID* Sid)
4915 {
4916     BOOL bret = FALSE;
4917     DWORD cBytes;
4918
4919     TRACE("%s, %p\n", debugstr_w(StringSid), Sid);
4920     if (GetVersion() & 0x80000000)
4921         SetLastError(ERROR_CALL_NOT_IMPLEMENTED);
4922     else if (!StringSid || !Sid)
4923         SetLastError(ERROR_INVALID_PARAMETER);
4924     else if (ParseStringSidToSid(StringSid, NULL, &cBytes))
4925     {
4926         PSID pSid = *Sid = LocalAlloc(0, cBytes);
4927
4928         bret = ParseStringSidToSid(StringSid, pSid, &cBytes);
4929         if (!bret)
4930             LocalFree(*Sid); 
4931     }
4932     return bret;
4933 }
4934
4935 /******************************************************************************
4936  * ConvertStringSidToSidA [ADVAPI32.@]
4937  */
4938 BOOL WINAPI ConvertStringSidToSidA(LPCSTR StringSid, PSID* Sid)
4939 {
4940     BOOL bret = FALSE;
4941
4942     TRACE("%s, %p\n", debugstr_a(StringSid), Sid);
4943     if (GetVersion() & 0x80000000)
4944         SetLastError(ERROR_CALL_NOT_IMPLEMENTED);
4945     else if (!StringSid || !Sid)
4946         SetLastError(ERROR_INVALID_PARAMETER);
4947     else
4948     {
4949         UINT len = MultiByteToWideChar(CP_ACP, 0, StringSid, -1, NULL, 0);
4950         LPWSTR wStringSid = HeapAlloc(GetProcessHeap(), 0,
4951          len * sizeof(WCHAR));
4952
4953         MultiByteToWideChar(CP_ACP, 0, StringSid, -1, wStringSid, len);
4954         bret = ConvertStringSidToSidW(wStringSid, Sid);
4955         HeapFree(GetProcessHeap(), 0, wStringSid);
4956     }
4957     return bret;
4958 }
4959
4960 /******************************************************************************
4961  * ConvertSidToStringSidW [ADVAPI32.@]
4962  *
4963  *  format of SID string is:
4964  *    S-<count>-<auth>-<subauth1>-<subauth2>-<subauth3>...
4965  *  where
4966  *    <rev> is the revision of the SID encoded as decimal
4967  *    <auth> is the identifier authority encoded as hex
4968  *    <subauthN> is the subauthority id encoded as decimal
4969  */
4970 BOOL WINAPI ConvertSidToStringSidW( PSID pSid, LPWSTR *pstr )
4971 {
4972     DWORD len = 0;
4973     LPWSTR wstr, wptr;
4974
4975     TRACE("%p %p\n", pSid, pstr );
4976
4977     len = 0;
4978     if (!DumpSidNumeric(pSid, NULL, &len))
4979         return FALSE;
4980     wstr = wptr = LocalAlloc(0, (len+1) * sizeof(WCHAR));
4981     DumpSidNumeric(pSid, &wptr, NULL);
4982     *wptr = 0;
4983
4984     *pstr = wstr;
4985     return TRUE;
4986 }
4987
4988 /******************************************************************************
4989  * ConvertSidToStringSidA [ADVAPI32.@]
4990  */
4991 BOOL WINAPI ConvertSidToStringSidA(PSID pSid, LPSTR *pstr)
4992 {
4993     LPWSTR wstr = NULL;
4994     LPSTR str;
4995     UINT len;
4996
4997     TRACE("%p %p\n", pSid, pstr );
4998
4999     if( !ConvertSidToStringSidW( pSid, &wstr ) )
5000         return FALSE;
5001
5002     len = WideCharToMultiByte( CP_ACP, 0, wstr, -1, NULL, 0, NULL, NULL );
5003     str = LocalAlloc( 0, len );
5004     WideCharToMultiByte( CP_ACP, 0, wstr, -1, str, len, NULL, NULL );
5005     LocalFree( wstr );
5006
5007     *pstr = str;
5008
5009     return TRUE;
5010 }
5011
5012 BOOL WINAPI ConvertToAutoInheritPrivateObjectSecurity(
5013         PSECURITY_DESCRIPTOR pdesc,
5014         PSECURITY_DESCRIPTOR cdesc,
5015         PSECURITY_DESCRIPTOR* ndesc,
5016         GUID* objtype,
5017         BOOL isdir,
5018         PGENERIC_MAPPING genmap )
5019 {
5020     FIXME("%p %p %p %p %d %p - stub\n", pdesc, cdesc, ndesc, objtype, isdir, genmap);
5021
5022     return FALSE;
5023 }
5024
5025 BOOL WINAPI CreatePrivateObjectSecurity(
5026         PSECURITY_DESCRIPTOR ParentDescriptor,
5027         PSECURITY_DESCRIPTOR CreatorDescriptor,
5028         PSECURITY_DESCRIPTOR* NewDescriptor,
5029         BOOL IsDirectoryObject,
5030         HANDLE Token,
5031         PGENERIC_MAPPING GenericMapping )
5032 {
5033     FIXME("%p %p %p %d %p %p - stub\n", ParentDescriptor, CreatorDescriptor,
5034           NewDescriptor, IsDirectoryObject, Token, GenericMapping);
5035
5036     return FALSE;
5037 }
5038
5039 BOOL WINAPI DestroyPrivateObjectSecurity( PSECURITY_DESCRIPTOR* ObjectDescriptor )
5040 {
5041     FIXME("%p - stub\n", ObjectDescriptor);
5042
5043     return TRUE;
5044 }
5045
5046 BOOL WINAPI CreateProcessAsUserA(
5047         HANDLE hToken,
5048         LPCSTR lpApplicationName,
5049         LPSTR lpCommandLine,
5050         LPSECURITY_ATTRIBUTES lpProcessAttributes,
5051         LPSECURITY_ATTRIBUTES lpThreadAttributes,
5052         BOOL bInheritHandles,
5053         DWORD dwCreationFlags,
5054         LPVOID lpEnvironment,
5055         LPCSTR lpCurrentDirectory,
5056         LPSTARTUPINFOA lpStartupInfo,
5057         LPPROCESS_INFORMATION lpProcessInformation )
5058 {
5059     FIXME("%p %s %s %p %p %d 0x%08x %p %s %p %p - stub\n", hToken, debugstr_a(lpApplicationName),
5060           debugstr_a(lpCommandLine), lpProcessAttributes, lpThreadAttributes, bInheritHandles,
5061           dwCreationFlags, lpEnvironment, debugstr_a(lpCurrentDirectory), lpStartupInfo, lpProcessInformation);
5062
5063     return FALSE;
5064 }
5065
5066 BOOL WINAPI CreateProcessAsUserW(
5067         HANDLE hToken,
5068         LPCWSTR lpApplicationName,
5069         LPWSTR lpCommandLine,
5070         LPSECURITY_ATTRIBUTES lpProcessAttributes,
5071         LPSECURITY_ATTRIBUTES lpThreadAttributes,
5072         BOOL bInheritHandles,
5073         DWORD dwCreationFlags,
5074         LPVOID lpEnvironment,
5075         LPCWSTR lpCurrentDirectory,
5076         LPSTARTUPINFOW lpStartupInfo,
5077         LPPROCESS_INFORMATION lpProcessInformation )
5078 {
5079     FIXME("%p %s %s %p %p %d 0x%08x %p %s %p %p - semi- stub\n", hToken, 
5080           debugstr_w(lpApplicationName), debugstr_w(lpCommandLine), lpProcessAttributes,
5081           lpThreadAttributes, bInheritHandles, dwCreationFlags, lpEnvironment, 
5082           debugstr_w(lpCurrentDirectory), lpStartupInfo, lpProcessInformation);
5083
5084     /* We should create the process with a suspended main thread */
5085     if (!CreateProcessW (lpApplicationName,
5086                          lpCommandLine,
5087                          lpProcessAttributes,
5088                          lpThreadAttributes,
5089                          bInheritHandles,
5090                          dwCreationFlags, /* CREATE_SUSPENDED */
5091                          lpEnvironment,
5092                          lpCurrentDirectory,
5093                          lpStartupInfo,
5094                          lpProcessInformation))
5095     {
5096       return FALSE;
5097     }
5098
5099     return TRUE;
5100 }
5101
5102 /******************************************************************************
5103  * CreateProcessWithLogonW
5104  */
5105 BOOL WINAPI CreateProcessWithLogonW( LPCWSTR lpUsername, LPCWSTR lpDomain, LPCWSTR lpPassword, DWORD dwLogonFlags,
5106     LPCWSTR lpApplicationName, LPWSTR lpCommandLine, DWORD dwCreationFlags, LPVOID lpEnvironment,
5107     LPCWSTR lpCurrentDirectory, LPSTARTUPINFOW lpStartupInfo, LPPROCESS_INFORMATION lpProcessInformation )
5108 {
5109     FIXME("%s %s %s 0x%08x %s %s 0x%08x %p %s %p %p stub\n", debugstr_w(lpUsername), debugstr_w(lpDomain),
5110     debugstr_w(lpPassword), dwLogonFlags, debugstr_w(lpApplicationName),
5111     debugstr_w(lpCommandLine), dwCreationFlags, lpEnvironment, debugstr_w(lpCurrentDirectory),
5112     lpStartupInfo, lpProcessInformation);
5113
5114     return FALSE;
5115 }
5116
5117 /******************************************************************************
5118  * DuplicateTokenEx [ADVAPI32.@]
5119  */
5120 BOOL WINAPI DuplicateTokenEx(
5121         HANDLE ExistingTokenHandle, DWORD dwDesiredAccess,
5122         LPSECURITY_ATTRIBUTES lpTokenAttributes,
5123         SECURITY_IMPERSONATION_LEVEL ImpersonationLevel,
5124         TOKEN_TYPE TokenType,
5125         PHANDLE DuplicateTokenHandle )
5126 {
5127     OBJECT_ATTRIBUTES ObjectAttributes;
5128
5129     TRACE("%p 0x%08x 0x%08x 0x%08x %p\n", ExistingTokenHandle, dwDesiredAccess,
5130           ImpersonationLevel, TokenType, DuplicateTokenHandle);
5131
5132     InitializeObjectAttributes(
5133         &ObjectAttributes,
5134         NULL,
5135         (lpTokenAttributes && lpTokenAttributes->bInheritHandle) ? OBJ_INHERIT : 0,
5136         NULL,
5137         lpTokenAttributes ? lpTokenAttributes->lpSecurityDescriptor : NULL );
5138
5139     return set_ntstatus( NtDuplicateToken( ExistingTokenHandle,
5140                                            dwDesiredAccess,
5141                                            &ObjectAttributes,
5142                                            ImpersonationLevel,
5143                                            TokenType,
5144                                            DuplicateTokenHandle ) );
5145 }
5146
5147 BOOL WINAPI DuplicateToken(
5148         HANDLE ExistingTokenHandle,
5149         SECURITY_IMPERSONATION_LEVEL ImpersonationLevel,
5150         PHANDLE DuplicateTokenHandle )
5151 {
5152     return DuplicateTokenEx( ExistingTokenHandle, TOKEN_IMPERSONATE | TOKEN_QUERY,
5153                              NULL, ImpersonationLevel, TokenImpersonation,
5154                              DuplicateTokenHandle );
5155 }
5156
5157 /******************************************************************************
5158  * ComputeStringSidSize
5159  */
5160 static DWORD ComputeStringSidSize(LPCWSTR StringSid)
5161 {
5162     if (StringSid[0] == 'S' && StringSid[1] == '-') /* S-R-I(-S)+ */
5163     {
5164         int ctok = 0;
5165         while (*StringSid)
5166         {
5167             if (*StringSid == '-')
5168                 ctok++;
5169             StringSid++;
5170         }
5171
5172         if (ctok >= 3)
5173             return GetSidLengthRequired(ctok - 2);
5174     }
5175     else /* String constant format  - Only available in winxp and above */
5176     {
5177         unsigned int i;
5178
5179         for (i = 0; i < sizeof(WellKnownSids)/sizeof(WellKnownSids[0]); i++)
5180             if (!strncmpW(WellKnownSids[i].wstr, StringSid, 2))
5181                 return GetSidLengthRequired(WellKnownSids[i].Sid.SubAuthorityCount);
5182     }
5183
5184     return GetSidLengthRequired(0);
5185 }
5186
5187 /******************************************************************************
5188  * ParseStringSidToSid
5189  */
5190 static BOOL ParseStringSidToSid(LPCWSTR StringSid, PSID pSid, LPDWORD cBytes)
5191 {
5192     BOOL bret = FALSE;
5193     SID* pisid=pSid;
5194
5195     TRACE("%s, %p, %p\n", debugstr_w(StringSid), pSid, cBytes);
5196     if (!StringSid)
5197     {
5198         SetLastError(ERROR_INVALID_PARAMETER);
5199         TRACE("StringSid is NULL, returning FALSE\n");
5200         return FALSE;
5201     }
5202
5203     while (*StringSid == ' ')
5204         StringSid++;
5205
5206     *cBytes = ComputeStringSidSize(StringSid);
5207     if (!pisid) /* Simply compute the size */
5208     {
5209         TRACE("only size requested, returning TRUE\n");
5210         return TRUE;
5211     }
5212
5213     if (StringSid[0] == 'S' && StringSid[1] == '-') /* S-R-I-S-S */
5214     {
5215         DWORD i = 0, identAuth;
5216         DWORD csubauth = ((*cBytes - GetSidLengthRequired(0)) / sizeof(DWORD));
5217
5218         StringSid += 2; /* Advance to Revision */
5219         pisid->Revision = atoiW(StringSid);
5220
5221         if (pisid->Revision != SDDL_REVISION)
5222         {
5223             TRACE("Revision %d is unknown\n", pisid->Revision);
5224             goto lend; /* ERROR_INVALID_SID */
5225         }
5226         if (csubauth == 0)
5227         {
5228             TRACE("SubAuthorityCount is 0\n");
5229             goto lend; /* ERROR_INVALID_SID */
5230         }
5231
5232         pisid->SubAuthorityCount = csubauth;
5233
5234         /* Advance to identifier authority */
5235         while (*StringSid && *StringSid != '-')
5236             StringSid++;
5237         if (*StringSid == '-')
5238             StringSid++;
5239
5240         /* MS' implementation can't handle values greater than 2^32 - 1, so
5241          * we don't either; assume most significant bytes are always 0
5242          */
5243         pisid->IdentifierAuthority.Value[0] = 0;
5244         pisid->IdentifierAuthority.Value[1] = 0;
5245         identAuth = atoiW(StringSid);
5246         pisid->IdentifierAuthority.Value[5] = identAuth & 0xff;
5247         pisid->IdentifierAuthority.Value[4] = (identAuth & 0xff00) >> 8;
5248         pisid->IdentifierAuthority.Value[3] = (identAuth & 0xff0000) >> 16;
5249         pisid->IdentifierAuthority.Value[2] = (identAuth & 0xff000000) >> 24;
5250
5251         /* Advance to first sub authority */
5252         while (*StringSid && *StringSid != '-')
5253             StringSid++;
5254         if (*StringSid == '-')
5255             StringSid++;
5256
5257         while (*StringSid)
5258         {
5259             pisid->SubAuthority[i++] = atoiW(StringSid);
5260
5261             while (*StringSid && *StringSid != '-')
5262                 StringSid++;
5263             if (*StringSid == '-')
5264                 StringSid++;
5265         }
5266
5267         if (i != pisid->SubAuthorityCount)
5268             goto lend; /* ERROR_INVALID_SID */
5269
5270         bret = TRUE;
5271     }
5272     else /* String constant format  - Only available in winxp and above */
5273     {
5274         unsigned int i;
5275         pisid->Revision = SDDL_REVISION;
5276
5277         for (i = 0; i < sizeof(WellKnownSids)/sizeof(WellKnownSids[0]); i++)
5278             if (!strncmpW(WellKnownSids[i].wstr, StringSid, 2))
5279             {
5280                 DWORD j;
5281                 pisid->SubAuthorityCount = WellKnownSids[i].Sid.SubAuthorityCount;
5282                 pisid->IdentifierAuthority = WellKnownSids[i].Sid.IdentifierAuthority;
5283                 for (j = 0; j < WellKnownSids[i].Sid.SubAuthorityCount; j++)
5284                     pisid->SubAuthority[j] = WellKnownSids[i].Sid.SubAuthority[j];
5285                 bret = TRUE;
5286             }
5287
5288         if (!bret)
5289             FIXME("String constant not supported: %s\n", debugstr_wn(StringSid, 2));
5290     }
5291
5292 lend:
5293     if (!bret)
5294         SetLastError(ERROR_INVALID_SID);
5295
5296     TRACE("returning %s\n", bret ? "TRUE" : "FALSE");
5297     return bret;
5298 }
5299
5300 /******************************************************************************
5301  * GetNamedSecurityInfoA [ADVAPI32.@]
5302  */
5303 DWORD WINAPI GetNamedSecurityInfoA(LPSTR pObjectName,
5304         SE_OBJECT_TYPE ObjectType, SECURITY_INFORMATION SecurityInfo,
5305         PSID* ppsidOwner, PSID* ppsidGroup, PACL* ppDacl, PACL* ppSacl,
5306         PSECURITY_DESCRIPTOR* ppSecurityDescriptor)
5307 {
5308     DWORD len;
5309     LPWSTR wstr = NULL;
5310     DWORD r;
5311
5312     TRACE("%s %d %d %p %p %p %p %p\n", pObjectName, ObjectType, SecurityInfo,
5313         ppsidOwner, ppsidGroup, ppDacl, ppSacl, ppSecurityDescriptor);
5314
5315     if( pObjectName )
5316     {
5317         len = MultiByteToWideChar( CP_ACP, 0, pObjectName, -1, NULL, 0 );
5318         wstr = HeapAlloc( GetProcessHeap(), 0, len*sizeof(WCHAR));
5319         MultiByteToWideChar( CP_ACP, 0, pObjectName, -1, wstr, len );
5320     }
5321
5322     r = GetNamedSecurityInfoW( wstr, ObjectType, SecurityInfo, ppsidOwner,
5323                            ppsidGroup, ppDacl, ppSacl, ppSecurityDescriptor );
5324
5325     HeapFree( GetProcessHeap(), 0, wstr );
5326
5327     return r;
5328 }
5329
5330 /******************************************************************************
5331  * GetNamedSecurityInfoW [ADVAPI32.@]
5332  */
5333 DWORD WINAPI GetNamedSecurityInfoW( LPWSTR name, SE_OBJECT_TYPE type,
5334     SECURITY_INFORMATION info, PSID* owner, PSID* group, PACL* dacl,
5335     PACL* sacl, PSECURITY_DESCRIPTOR* descriptor )
5336 {
5337     DWORD needed, offset;
5338     SECURITY_DESCRIPTOR_RELATIVE *relative = NULL;
5339     BYTE *buffer;
5340
5341     TRACE( "%s %d %d %p %p %p %p %p\n", debugstr_w(name), type, info, owner,
5342            group, dacl, sacl, descriptor );
5343
5344     /* A NULL descriptor is allowed if any one of the other pointers is not NULL */
5345     if (!name || !(owner||group||dacl||sacl||descriptor) ) return ERROR_INVALID_PARAMETER;
5346
5347     /* If no descriptor, we have to check that there's a pointer for the requested information */
5348     if( !descriptor && (
5349         ((info & OWNER_SECURITY_INFORMATION) && !owner)
5350     ||  ((info & GROUP_SECURITY_INFORMATION) && !group)
5351     ||  ((info & DACL_SECURITY_INFORMATION)  && !dacl)
5352     ||  ((info & SACL_SECURITY_INFORMATION)  && !sacl)  ))
5353         return ERROR_INVALID_PARAMETER;
5354
5355     needed = !descriptor ? 0 : sizeof(SECURITY_DESCRIPTOR_RELATIVE);
5356     if (info & OWNER_SECURITY_INFORMATION)
5357         needed += sizeof(sidWorld);
5358     if (info & GROUP_SECURITY_INFORMATION)
5359         needed += sizeof(sidWorld);
5360     if (info & DACL_SECURITY_INFORMATION)
5361         needed += WINE_SIZE_OF_WORLD_ACCESS_ACL;
5362     if (info & SACL_SECURITY_INFORMATION)
5363         needed += WINE_SIZE_OF_WORLD_ACCESS_ACL;
5364
5365     if(descriptor)
5366     {
5367         /* must be freed by caller */
5368         *descriptor = HeapAlloc( GetProcessHeap(), 0, needed );
5369         if (!*descriptor) return ERROR_NOT_ENOUGH_MEMORY;
5370
5371         if (!InitializeSecurityDescriptor( *descriptor, SECURITY_DESCRIPTOR_REVISION ))
5372         {
5373             HeapFree( GetProcessHeap(), 0, *descriptor );
5374             return ERROR_INVALID_SECURITY_DESCR;
5375         }
5376
5377         relative = *descriptor;
5378         relative->Control |= SE_SELF_RELATIVE;
5379
5380         buffer = (BYTE *)relative;
5381         offset = sizeof(SECURITY_DESCRIPTOR_RELATIVE);
5382     }
5383     else
5384     {
5385         buffer = HeapAlloc( GetProcessHeap(), 0, needed );
5386         if (!buffer) return ERROR_NOT_ENOUGH_MEMORY;
5387         offset = 0;
5388     }
5389
5390     if (info & OWNER_SECURITY_INFORMATION)
5391     {
5392         memcpy( buffer + offset, &sidWorld, sizeof(sidWorld) );
5393         if(relative)
5394             relative->Owner = offset;
5395         if (owner)
5396             *owner = buffer + offset;
5397         offset += sizeof(sidWorld);
5398     }
5399     if (info & GROUP_SECURITY_INFORMATION)
5400     {
5401         memcpy( buffer + offset, &sidWorld, sizeof(sidWorld) );
5402         if(relative)
5403             relative->Group = offset;
5404         if (group)
5405             *group = buffer + offset;
5406         offset += sizeof(sidWorld);
5407     }
5408     if (info & DACL_SECURITY_INFORMATION)
5409     {
5410         GetWorldAccessACL( (PACL)(buffer + offset) );
5411         if(relative)
5412         {
5413             relative->Control |= SE_DACL_PRESENT;
5414             relative->Dacl = offset;
5415         }
5416         if (dacl)
5417             *dacl = (PACL)(buffer + offset);
5418         offset += WINE_SIZE_OF_WORLD_ACCESS_ACL;
5419     }
5420     if (info & SACL_SECURITY_INFORMATION)
5421     {
5422         GetWorldAccessACL( (PACL)(buffer + offset) );
5423         if(relative)
5424         {
5425             relative->Control |= SE_SACL_PRESENT;
5426             relative->Sacl = offset;
5427         }
5428         if (sacl)
5429             *sacl = (PACL)(buffer + offset);
5430     }
5431
5432     return ERROR_SUCCESS;
5433 }
5434
5435 /******************************************************************************
5436  * DecryptFileW [ADVAPI32.@]
5437  */
5438 BOOL WINAPI DecryptFileW(LPCWSTR lpFileName, DWORD dwReserved)
5439 {
5440     FIXME("%s %08x\n", debugstr_w(lpFileName), dwReserved);
5441     return TRUE;
5442 }
5443
5444 /******************************************************************************
5445  * DecryptFileA [ADVAPI32.@]
5446  */
5447 BOOL WINAPI DecryptFileA(LPCSTR lpFileName, DWORD dwReserved)
5448 {
5449     FIXME("%s %08x\n", debugstr_a(lpFileName), dwReserved);
5450     return TRUE;
5451 }
5452
5453 /******************************************************************************
5454  * EncryptFileW [ADVAPI32.@]
5455  */
5456 BOOL WINAPI EncryptFileW(LPCWSTR lpFileName)
5457 {
5458     FIXME("%s\n", debugstr_w(lpFileName));
5459     return TRUE;
5460 }
5461
5462 /******************************************************************************
5463  * EncryptFileA [ADVAPI32.@]
5464  */
5465 BOOL WINAPI EncryptFileA(LPCSTR lpFileName)
5466 {
5467     FIXME("%s\n", debugstr_a(lpFileName));
5468     return TRUE;
5469 }
5470
5471 /******************************************************************************
5472  * FileEncryptionStatusW [ADVAPI32.@]
5473  */
5474 BOOL WINAPI FileEncryptionStatusW(LPCWSTR lpFileName, LPDWORD lpStatus)
5475 {
5476     FIXME("(%s %p): stub\n", debugstr_w(lpFileName), lpStatus);
5477     if (!lpStatus)
5478         return FALSE;
5479     *lpStatus = FILE_SYSTEM_NOT_SUPPORT;
5480     return TRUE;
5481 }
5482
5483 /******************************************************************************
5484  * FileEncryptionStatusA [ADVAPI32.@]
5485  */
5486 BOOL WINAPI FileEncryptionStatusA(LPCSTR lpFileName, LPDWORD lpStatus)
5487 {
5488     FIXME("(%s %p): stub\n", debugstr_a(lpFileName), lpStatus);
5489     if (!lpStatus)
5490         return FALSE;
5491     *lpStatus = FILE_SYSTEM_NOT_SUPPORT;
5492     return TRUE;
5493 }
5494
5495 /******************************************************************************
5496  * SetSecurityInfo [ADVAPI32.@]
5497  */
5498 DWORD WINAPI SetSecurityInfo(HANDLE handle, SE_OBJECT_TYPE ObjectType, 
5499                       SECURITY_INFORMATION SecurityInfo, PSID psidOwner,
5500                       PSID psidGroup, PACL pDacl, PACL pSacl) {
5501     FIXME("stub\n");
5502     return ERROR_SUCCESS;
5503 }
5504
5505 /******************************************************************************
5506  * SaferCreateLevel   [ADVAPI32.@]
5507  */
5508 BOOL WINAPI SaferCreateLevel(DWORD ScopeId, DWORD LevelId, DWORD OpenFlags,
5509                              SAFER_LEVEL_HANDLE* LevelHandle, LPVOID lpReserved)
5510 {
5511     FIXME("(%u, %x, %u, %p, %p) stub\n", ScopeId, LevelId, OpenFlags, LevelHandle, lpReserved);
5512
5513     *LevelHandle = (SAFER_LEVEL_HANDLE)0xdeadbeef;
5514     return TRUE;
5515 }
5516
5517 /******************************************************************************
5518  * SaferComputeTokenFromLevel   [ADVAPI32.@]
5519  */
5520 BOOL WINAPI SaferComputeTokenFromLevel(SAFER_LEVEL_HANDLE handle, HANDLE token, PHANDLE access_token,
5521                                        DWORD flags, LPVOID reserved)
5522 {
5523     FIXME("(%p, %p, %p, %x, %p) stub\n", handle, token, access_token, flags, reserved);
5524
5525     *access_token = (HANDLE)0xdeadbeef;
5526     return TRUE;
5527 }
5528
5529 /******************************************************************************
5530  * SaferCloseLevel   [ADVAPI32.@]
5531  */
5532 BOOL WINAPI SaferCloseLevel(SAFER_LEVEL_HANDLE handle)
5533 {
5534     FIXME("(%p) stub\n", handle);
5535     return TRUE;
5536 }
5537
5538 DWORD WINAPI TreeResetNamedSecurityInfoW( LPWSTR pObjectName,
5539                 SE_OBJECT_TYPE ObjectType, SECURITY_INFORMATION SecurityInfo,
5540                 PSID pOwner, PSID pGroup, PACL pDacl, PACL pSacl,
5541                 BOOL KeepExplicit, FN_PROGRESS fnProgress,
5542                 PROG_INVOKE_SETTING ProgressInvokeSetting, PVOID Args)
5543 {
5544     FIXME("(%s, %i, %i, %p, %p, %p, %p, %i, %p, %i, %p  Stub\n",
5545         debugstr_w(pObjectName), ObjectType, SecurityInfo, pOwner, pGroup,
5546         pDacl, pSacl, KeepExplicit, fnProgress, ProgressInvokeSetting, Args);
5547
5548     return ERROR_SUCCESS;
5549 }
5550
5551 /******************************************************************************
5552  * SaferGetPolicyInformation   [ADVAPI32.@]
5553  */
5554 BOOL WINAPI SaferGetPolicyInformation(DWORD scope, SAFER_POLICY_INFO_CLASS class, DWORD size,
5555                                       PVOID buffer, PDWORD required, LPVOID lpReserved)
5556 {
5557     FIXME("(%u %u %u %p %p %p) stub\n", scope, class, size, buffer, required, lpReserved);
5558     return FALSE;
5559 }