Add some API documentation stubs to make winapi_check happy.
[wine] / dlls / advapi32 / security.c
1 /*
2  * Copyright 1999, 2000 Juergen Schmied <juergen.schmied@debitel.net>
3  * Copyright 2003 CodeWeavers Inc. (Ulrich Czekalla)
4  * Copyright 2006 Robert Reif
5  *
6  * This library is free software; you can redistribute it and/or
7  * modify it under the terms of the GNU Lesser General Public
8  * License as published by the Free Software Foundation; either
9  * version 2.1 of the License, or (at your option) any later version.
10  *
11  * This library is distributed in the hope that it will be useful,
12  * but WITHOUT ANY WARRANTY; without even the implied warranty of
13  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
14  * Lesser General Public License for more details.
15  *
16  * You should have received a copy of the GNU Lesser General Public
17  * License along with this library; if not, write to the Free Software
18  * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
19  *
20  */
21
22 #include <stdarg.h>
23 #include <string.h>
24
25 #include "ntstatus.h"
26 #define WIN32_NO_STATUS
27 #include "windef.h"
28 #include "winbase.h"
29 #include "winerror.h"
30 #include "winreg.h"
31 #include "winternl.h"
32 #include "winioctl.h"
33 #include "ntsecapi.h"
34 #include "accctrl.h"
35 #include "sddl.h"
36 #include "winsvc.h"
37 #include "aclapi.h"
38 #include "objbase.h"
39 #include "iads.h"
40 #include "advapi32_misc.h"
41
42 #include "wine/debug.h"
43 #include "wine/unicode.h"
44
45 WINE_DEFAULT_DEBUG_CHANNEL(advapi);
46
47 static BOOL ParseStringSidToSid(LPCWSTR StringSid, PSID pSid, LPDWORD cBytes);
48 static BOOL ParseStringAclToAcl(LPCWSTR StringAcl, LPDWORD lpdwFlags, 
49     PACL pAcl, LPDWORD cBytes);
50 static BYTE ParseAceStringFlags(LPCWSTR* StringAcl);
51 static BYTE ParseAceStringType(LPCWSTR* StringAcl);
52 static DWORD ParseAceStringRights(LPCWSTR* StringAcl);
53 static BOOL ParseStringSecurityDescriptorToSecurityDescriptor(
54     LPCWSTR StringSecurityDescriptor,
55     SECURITY_DESCRIPTOR* SecurityDescriptor,
56     LPDWORD cBytes);
57 static DWORD ParseAclStringFlags(LPCWSTR* StringAcl);
58
59 typedef struct _ACEFLAG
60 {
61    LPCWSTR wstr;
62    DWORD value;
63 } ACEFLAG, *LPACEFLAG;
64
65 typedef struct _MAX_SID
66 {
67     /* same fields as struct _SID */
68     BYTE Revision;
69     BYTE SubAuthorityCount;
70     SID_IDENTIFIER_AUTHORITY IdentifierAuthority;
71     DWORD SubAuthority[SID_MAX_SUB_AUTHORITIES];
72 } MAX_SID;
73
74 typedef struct WELLKNOWNSID
75 {
76     WCHAR wstr[2];
77     WELL_KNOWN_SID_TYPE Type;
78     MAX_SID Sid;
79 } WELLKNOWNSID;
80
81 static const WELLKNOWNSID WellKnownSids[] =
82 {
83     { {0,0}, WinNullSid, { SID_REVISION, 1, { SECURITY_NULL_SID_AUTHORITY }, { SECURITY_NULL_RID } } },
84     { {'W','D'}, WinWorldSid, { SID_REVISION, 1, { SECURITY_WORLD_SID_AUTHORITY }, { SECURITY_WORLD_RID } } },
85     { {0,0}, WinLocalSid, { SID_REVISION, 1, { SECURITY_LOCAL_SID_AUTHORITY }, { SECURITY_LOCAL_RID } } },
86     { {'C','O'}, WinCreatorOwnerSid, { SID_REVISION, 1, { SECURITY_CREATOR_SID_AUTHORITY }, { SECURITY_CREATOR_OWNER_RID } } },
87     { {'C','G'}, WinCreatorGroupSid, { SID_REVISION, 1, { SECURITY_CREATOR_SID_AUTHORITY }, { SECURITY_CREATOR_GROUP_RID } } },
88     { {0,0}, WinCreatorOwnerServerSid, { SID_REVISION, 1, { SECURITY_CREATOR_SID_AUTHORITY }, { SECURITY_CREATOR_OWNER_SERVER_RID } } },
89     { {0,0}, WinCreatorGroupServerSid, { SID_REVISION, 1, { SECURITY_CREATOR_SID_AUTHORITY }, { SECURITY_CREATOR_GROUP_SERVER_RID } } },
90     { {0,0}, WinNtAuthoritySid, { SID_REVISION, 0, { SECURITY_NT_AUTHORITY }, { SECURITY_NULL_RID } } },
91     { {0,0}, WinDialupSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_DIALUP_RID } } },
92     { {'N','U'}, WinNetworkSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_NETWORK_RID } } },
93     { {0,0}, WinBatchSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_BATCH_RID } } },
94     { {'I','U'}, WinInteractiveSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_INTERACTIVE_RID } } },
95     { {'S','U'}, WinServiceSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_SERVICE_RID } } },
96     { {'A','N'}, WinAnonymousSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_ANONYMOUS_LOGON_RID } } },
97     { {0,0}, WinProxySid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_PROXY_RID } } },
98     { {'E','D'}, WinEnterpriseControllersSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_ENTERPRISE_CONTROLLERS_RID } } },
99     { {'P','S'}, WinSelfSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_PRINCIPAL_SELF_RID } } },
100     { {'A','U'}, WinAuthenticatedUserSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_AUTHENTICATED_USER_RID } } },
101     { {'R','C'}, WinRestrictedCodeSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_RESTRICTED_CODE_RID } } },
102     { {0,0}, WinTerminalServerSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_TERMINAL_SERVER_RID } } },
103     { {0,0}, WinRemoteLogonIdSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_REMOTE_LOGON_RID } } },
104     { {'S','Y'}, WinLocalSystemSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_LOCAL_SYSTEM_RID } } },
105     { {'L','S'}, WinLocalServiceSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_LOCAL_SERVICE_RID } } },
106     { {'N','S'}, WinNetworkServiceSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_NETWORK_SERVICE_RID } } },
107     { {0,0}, WinBuiltinDomainSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID } } },
108     { {'B','A'}, WinBuiltinAdministratorsSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_ADMINS } } },
109     { {'B','U'}, WinBuiltinUsersSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_USERS } } },
110     { {'B','G'}, WinBuiltinGuestsSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_GUESTS } } },
111     { {'P','U'}, WinBuiltinPowerUsersSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_POWER_USERS } } },
112     { {'A','O'}, WinBuiltinAccountOperatorsSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_ACCOUNT_OPS } } },
113     { {'S','O'}, WinBuiltinSystemOperatorsSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_SYSTEM_OPS } } },
114     { {'P','O'}, WinBuiltinPrintOperatorsSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_PRINT_OPS } } },
115     { {'B','O'}, WinBuiltinBackupOperatorsSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_BACKUP_OPS } } },
116     { {'R','E'}, WinBuiltinReplicatorSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_REPLICATOR } } },
117     { {'R','U'}, WinBuiltinPreWindows2000CompatibleAccessSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_PREW2KCOMPACCESS } } },
118     { {'R','D'}, WinBuiltinRemoteDesktopUsersSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_REMOTE_DESKTOP_USERS } } },
119     { {'N','O'}, WinBuiltinNetworkConfigurationOperatorsSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_NETWORK_CONFIGURATION_OPS } } },
120     { {0,0}, WinNTLMAuthenticationSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_PACKAGE_BASE_RID, SECURITY_PACKAGE_NTLM_RID } } },
121     { {0,0}, WinDigestAuthenticationSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_PACKAGE_BASE_RID, SECURITY_PACKAGE_DIGEST_RID } } },
122     { {0,0}, WinSChannelAuthenticationSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_PACKAGE_BASE_RID, SECURITY_PACKAGE_SCHANNEL_RID } } },
123     { {0,0}, WinThisOrganizationSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_THIS_ORGANIZATION_RID } } },
124     { {0,0}, WinOtherOrganizationSid, { SID_REVISION, 1, { SECURITY_NT_AUTHORITY }, { SECURITY_OTHER_ORGANIZATION_RID } } },
125     { {0,0}, WinBuiltinIncomingForestTrustBuildersSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_INCOMING_FOREST_TRUST_BUILDERS  } } },
126     { {0,0}, WinBuiltinPerfMonitoringUsersSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_MONITORING_USERS } } },
127     { {0,0}, WinBuiltinPerfLoggingUsersSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_LOGGING_USERS } } },
128     { {0,0}, WinBuiltinAuthorizationAccessSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_AUTHORIZATIONACCESS } } },
129     { {0,0}, WinBuiltinTerminalServerLicenseServersSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_TS_LICENSE_SERVERS } } },
130     { {0,0}, WinBuiltinDCOMUsersSid, { SID_REVISION, 2, { SECURITY_NT_AUTHORITY }, { SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_DCOM_USERS } } },
131 };
132
133 /* these SIDs must be constructed as relative to some domain - only the RID is well-known */
134 typedef struct WELLKNOWNRID
135 {
136     WELL_KNOWN_SID_TYPE Type;
137     DWORD Rid;
138 } WELLKNOWNRID;
139
140 static const WELLKNOWNRID WellKnownRids[] = {
141     { WinAccountAdministratorSid,    DOMAIN_USER_RID_ADMIN },
142     { WinAccountGuestSid,            DOMAIN_USER_RID_GUEST },
143     { WinAccountKrbtgtSid,           DOMAIN_USER_RID_KRBTGT },
144     { WinAccountDomainAdminsSid,     DOMAIN_GROUP_RID_ADMINS },
145     { WinAccountDomainUsersSid,      DOMAIN_GROUP_RID_USERS },
146     { WinAccountDomainGuestsSid,     DOMAIN_GROUP_RID_GUESTS },
147     { WinAccountComputersSid,        DOMAIN_GROUP_RID_COMPUTERS },
148     { WinAccountControllersSid,      DOMAIN_GROUP_RID_CONTROLLERS },
149     { WinAccountCertAdminsSid,       DOMAIN_GROUP_RID_CERT_ADMINS },
150     { WinAccountSchemaAdminsSid,     DOMAIN_GROUP_RID_SCHEMA_ADMINS },
151     { WinAccountEnterpriseAdminsSid, DOMAIN_GROUP_RID_ENTERPRISE_ADMINS },
152     { WinAccountPolicyAdminsSid,     DOMAIN_GROUP_RID_POLICY_ADMINS },
153     { WinAccountRasAndIasServersSid, DOMAIN_ALIAS_RID_RAS_SERVERS },
154 };
155
156
157 static SID const sidWorld = { SID_REVISION, 1, { SECURITY_WORLD_SID_AUTHORITY} , { SECURITY_WORLD_RID } };
158
159 typedef struct _AccountSid {
160     WELL_KNOWN_SID_TYPE type;
161     LPCWSTR account;
162     LPCWSTR domain;
163     SID_NAME_USE name_use;
164 } AccountSid;
165
166 static const WCHAR Account_Operators[] = { 'A','c','c','o','u','n','t',' ','O','p','e','r','a','t','o','r','s',0 };
167 static const WCHAR Administrator[] = {'A','d','m','i','n','i','s','t','r','a','t','o','r',0 };
168 static const WCHAR Administrators[] = { 'A','d','m','i','n','i','s','t','r','a','t','o','r','s',0 };
169 static const WCHAR ANONYMOUS_LOGON[] = { 'A','N','O','N','Y','M','O','U','S',' ','L','O','G','O','N',0 };
170 static const WCHAR Authenticated_Users[] = { 'A','u','t','h','e','n','t','i','c','a','t','e','d',' ','U','s','e','r','s',0 };
171 static const WCHAR Backup_Operators[] = { 'B','a','c','k','u','p',' ','O','p','e','r','a','t','o','r','s',0 };
172 static const WCHAR BATCH[] = { 'B','A','T','C','H',0 };
173 static const WCHAR Blank[] = { 0 };
174 static const WCHAR BUILTIN[] = { 'B','U','I','L','T','I','N',0 };
175 static const WCHAR Cert_Publishers[] = { 'C','e','r','t',' ','P','u','b','l','i','s','h','e','r','s',0 };
176 static const WCHAR CREATOR_GROUP[] = { 'C','R','E','A','T','O','R',' ','G','R','O','U','P',0 };
177 static const WCHAR CREATOR_GROUP_SERVER[] = { 'C','R','E','A','T','O','R',' ','G','R','O','U','P',' ','S','E','R','V','E','R',0 };
178 static const WCHAR CREATOR_OWNER[] = { 'C','R','E','A','T','O','R',' ','O','W','N','E','R',0 };
179 static const WCHAR CREATOR_OWNER_SERVER[] = { 'C','R','E','A','T','O','R',' ','O','W','N','E','R',' ','S','E','R','V','E','R',0 };
180 static const WCHAR DIALUP[] = { 'D','I','A','L','U','P',0 };
181 static const WCHAR Digest_Authentication[] = { 'D','i','g','e','s','t',' ','A','u','t','h','e','n','t','i','c','a','t','i','o','n',0 };
182 static const WCHAR DOMAIN[] = {'D','O','M','A','I','N',0};
183 static const WCHAR Domain_Admins[] = { 'D','o','m','a','i','n',' ','A','d','m','i','n','s',0 };
184 static const WCHAR Domain_Computers[] = { 'D','o','m','a','i','n',' ','C','o','m','p','u','t','e','r','s',0 };
185 static const WCHAR Domain_Controllers[] = { 'D','o','m','a','i','n',' ','C','o','n','t','r','o','l','l','e','r','s',0 };
186 static const WCHAR Domain_Guests[] = { 'D','o','m','a','i','n',' ','G','u','e','s','t','s',0 };
187 static const WCHAR Domain_Users[] = { 'D','o','m','a','i','n',' ','U','s','e','r','s',0 };
188 static const WCHAR Enterprise_Admins[] = { 'E','n','t','e','r','p','r','i','s','e',' ','A','d','m','i','n','s',0 };
189 static const WCHAR ENTERPRISE_DOMAIN_CONTROLLERS[] = { 'E','N','T','E','R','P','R','I','S','E',' ','D','O','M','A','I','N',' ','C','O','N','T','R','O','L','L','E','R','S',0 };
190 static const WCHAR Everyone[] = { 'E','v','e','r','y','o','n','e',0 };
191 static const WCHAR Group_Policy_Creator_Owners[] = { 'G','r','o','u','p',' ','P','o','l','i','c','y',' ','C','r','e','a','t','o','r',' ','O','w','n','e','r','s',0 };
192 static const WCHAR Guest[] = { 'G','u','e','s','t',0 };
193 static const WCHAR Guests[] = { 'G','u','e','s','t','s',0 };
194 static const WCHAR INTERACTIVE[] = { 'I','N','T','E','R','A','C','T','I','V','E',0 };
195 static const WCHAR LOCAL[] = { 'L','O','C','A','L',0 };
196 static const WCHAR LOCAL_SERVICE[] = { 'L','O','C','A','L',' ','S','E','R','V','I','C','E',0 };
197 static const WCHAR NETWORK[] = { 'N','E','T','W','O','R','K',0 };
198 static const WCHAR Network_Configuration_Operators[] = { 'N','e','t','w','o','r','k',' ','C','o','n','f','i','g','u','r','a','t','i','o','n',' ','O','p','e','r','a','t','o','r','s',0 };
199 static const WCHAR NETWORK_SERVICE[] = { 'N','E','T','W','O','R','K',' ','S','E','R','V','I','C','E',0 };
200 static const WCHAR NT_AUTHORITY[] = { 'N','T',' ','A','U','T','H','O','R','I','T','Y',0 };
201 static const WCHAR NT_Pseudo_Domain[] = { 'N','T',' ','P','s','e','u','d','o',' ','D','o','m','a','i','n',0 };
202 static const WCHAR NTML_Authentication[] = { 'N','T','M','L',' ','A','u','t','h','e','n','t','i','c','a','t','i','o','n',0 };
203 static const WCHAR NULL_SID[] = { 'N','U','L','L',' ','S','I','D',0 };
204 static const WCHAR Other_Organization[] = { 'O','t','h','e','r',' ','O','r','g','a','n','i','z','a','t','i','o','n',0 };
205 static const WCHAR Performance_Log_Users[] = { 'P','e','r','f','o','r','m','a','n','c','e',' ','L','o','g',' ','U','s','e','r','s',0 };
206 static const WCHAR Performance_Monitor_Users[] = { 'P','e','r','f','o','r','m','a','n','c','e',' ','M','o','n','i','t','o','r',' ','U','s','e','r','s',0 };
207 static const WCHAR Power_Users[] = { 'P','o','w','e','r',' ','U','s','e','r','s',0 };
208 static const WCHAR Pre_Windows_2000_Compatible_Access[] = { 'P','r','e','-','W','i','n','d','o','w','s',' ','2','0','0','0',' ','C','o','m','p','a','t','i','b','l','e',' ','A','c','c','e','s','s',0 };
209 static const WCHAR Print_Operators[] = { 'P','r','i','n','t',' ','O','p','e','r','a','t','o','r','s',0 };
210 static const WCHAR PROXY[] = { 'P','R','O','X','Y',0 };
211 static const WCHAR RAS_and_IAS_Servers[] = { 'R','A','S',' ','a','n','d',' ','I','A','S',' ','S','e','r','v','e','r','s',0 };
212 static const WCHAR Remote_Desktop_Users[] = { 'R','e','m','o','t','e',' ','D','e','s','k','t','o','p',' ','U','s','e','r','s',0 };
213 static const WCHAR REMOTE_INTERACTIVE_LOGON[] = { 'R','E','M','O','T','E',' ','I','N','T','E','R','A','C','T','I','V','E',' ','L','O','G','O','N',0 };
214 static const WCHAR Replicators[] = { 'R','e','p','l','i','c','a','t','o','r','s',0 };
215 static const WCHAR RESTRICTED[] = { 'R','E','S','T','R','I','C','T','E','D',0 };
216 static const WCHAR SChannel_Authentication[] = { 'S','C','h','a','n','n','e','l',' ','A','u','t','h','e','n','t','i','c','a','t','i','o','n',0 };
217 static const WCHAR Schema_Admins[] = { 'S','c','h','e','m','a',' ','A','d','m','i','n','s',0 };
218 static const WCHAR SELF[] = { 'S','E','L','F',0 };
219 static const WCHAR Server_Operators[] = { 'S','e','r','v','e','r',' ','O','p','e','r','a','t','o','r','s',0 };
220 static const WCHAR SERVICE[] = { 'S','E','R','V','I','C','E',0 };
221 static const WCHAR SYSTEM[] = { 'S','Y','S','T','E','M',0 };
222 static const WCHAR TERMINAL_SERVER_USER[] = { 'T','E','R','M','I','N','A','L',' ','S','E','R','V','E','R',' ','U','S','E','R',0 };
223 static const WCHAR This_Organization[] = { 'T','h','i','s',' ','O','r','g','a','n','i','z','a','t','i','o','n',0 };
224 static const WCHAR Users[] = { 'U','s','e','r','s',0 };
225
226 static const AccountSid ACCOUNT_SIDS[] = {
227     { WinNullSid, NULL_SID, Blank, SidTypeWellKnownGroup },
228     { WinWorldSid, Everyone, Blank, SidTypeWellKnownGroup },
229     { WinLocalSid, LOCAL, Blank, SidTypeWellKnownGroup },
230     { WinCreatorOwnerSid, CREATOR_OWNER, Blank, SidTypeWellKnownGroup },
231     { WinCreatorGroupSid, CREATOR_GROUP, Blank, SidTypeWellKnownGroup },
232     { WinCreatorOwnerServerSid, CREATOR_OWNER_SERVER, Blank, SidTypeWellKnownGroup },
233     { WinCreatorGroupServerSid, CREATOR_GROUP_SERVER, Blank, SidTypeWellKnownGroup },
234     { WinNtAuthoritySid, NT_Pseudo_Domain, NT_Pseudo_Domain, SidTypeDomain },
235     { WinDialupSid, DIALUP, NT_AUTHORITY, SidTypeWellKnownGroup },
236     { WinNetworkSid, NETWORK, NT_AUTHORITY, SidTypeWellKnownGroup },
237     { WinBatchSid, BATCH, NT_AUTHORITY, SidTypeWellKnownGroup },
238     { WinInteractiveSid, INTERACTIVE, NT_AUTHORITY, SidTypeWellKnownGroup },
239     { WinServiceSid, SERVICE, NT_AUTHORITY, SidTypeWellKnownGroup },
240     { WinAnonymousSid, ANONYMOUS_LOGON, NT_AUTHORITY, SidTypeWellKnownGroup },
241     { WinProxySid, PROXY, NT_AUTHORITY, SidTypeWellKnownGroup },
242     { WinEnterpriseControllersSid, ENTERPRISE_DOMAIN_CONTROLLERS, NT_AUTHORITY, SidTypeWellKnownGroup },
243     { WinSelfSid, SELF, NT_AUTHORITY, SidTypeWellKnownGroup },
244     { WinAuthenticatedUserSid, Authenticated_Users, NT_AUTHORITY, SidTypeWellKnownGroup },
245     { WinRestrictedCodeSid, RESTRICTED, NT_AUTHORITY, SidTypeWellKnownGroup },
246     { WinTerminalServerSid, TERMINAL_SERVER_USER, NT_AUTHORITY, SidTypeWellKnownGroup },
247     { WinRemoteLogonIdSid, REMOTE_INTERACTIVE_LOGON, NT_AUTHORITY, SidTypeWellKnownGroup },
248     { WinLocalSystemSid, SYSTEM, NT_AUTHORITY, SidTypeWellKnownGroup },
249     { WinLocalServiceSid, LOCAL_SERVICE, NT_AUTHORITY, SidTypeWellKnownGroup },
250     { WinNetworkServiceSid, NETWORK_SERVICE, NT_AUTHORITY, SidTypeWellKnownGroup },
251     { WinBuiltinDomainSid, BUILTIN, BUILTIN, SidTypeDomain },
252     { WinBuiltinAdministratorsSid, Administrators, BUILTIN, SidTypeAlias },
253     { WinBuiltinUsersSid, Users, BUILTIN, SidTypeAlias },
254     { WinBuiltinGuestsSid, Guests, BUILTIN, SidTypeAlias },
255     { WinBuiltinPowerUsersSid, Power_Users, BUILTIN, SidTypeAlias },
256     { WinBuiltinAccountOperatorsSid, Account_Operators, BUILTIN, SidTypeAlias },
257     { WinBuiltinSystemOperatorsSid, Server_Operators, BUILTIN, SidTypeAlias },
258     { WinBuiltinPrintOperatorsSid, Print_Operators, BUILTIN, SidTypeAlias },
259     { WinBuiltinBackupOperatorsSid, Backup_Operators, BUILTIN, SidTypeAlias },
260     { WinBuiltinReplicatorSid, Replicators, BUILTIN, SidTypeAlias },
261     { WinBuiltinPreWindows2000CompatibleAccessSid, Pre_Windows_2000_Compatible_Access, BUILTIN, SidTypeAlias },
262     { WinBuiltinRemoteDesktopUsersSid, Remote_Desktop_Users, BUILTIN, SidTypeAlias },
263     { WinBuiltinNetworkConfigurationOperatorsSid, Network_Configuration_Operators, BUILTIN, SidTypeAlias },
264     { WinNTLMAuthenticationSid, NTML_Authentication, NT_AUTHORITY, SidTypeWellKnownGroup },
265     { WinDigestAuthenticationSid, Digest_Authentication, NT_AUTHORITY, SidTypeWellKnownGroup },
266     { WinSChannelAuthenticationSid, SChannel_Authentication, NT_AUTHORITY, SidTypeWellKnownGroup },
267     { WinThisOrganizationSid, This_Organization, NT_AUTHORITY, SidTypeWellKnownGroup },
268     { WinOtherOrganizationSid, Other_Organization, NT_AUTHORITY, SidTypeWellKnownGroup },
269     { WinBuiltinPerfMonitoringUsersSid, Performance_Monitor_Users, BUILTIN, SidTypeAlias },
270     { WinBuiltinPerfLoggingUsersSid, Performance_Log_Users, BUILTIN, SidTypeAlias },
271 };
272 /*
273  * ACE access rights
274  */
275 static const WCHAR SDDL_READ_CONTROL[]     = {'R','C',0};
276 static const WCHAR SDDL_WRITE_DAC[]        = {'W','D',0};
277 static const WCHAR SDDL_WRITE_OWNER[]      = {'W','O',0};
278 static const WCHAR SDDL_STANDARD_DELETE[]  = {'S','D',0};
279
280 static const WCHAR SDDL_READ_PROPERTY[]    = {'R','P',0};
281 static const WCHAR SDDL_WRITE_PROPERTY[]   = {'W','P',0};
282 static const WCHAR SDDL_CREATE_CHILD[]     = {'C','C',0};
283 static const WCHAR SDDL_DELETE_CHILD[]     = {'D','C',0};
284 static const WCHAR SDDL_LIST_CHILDREN[]    = {'L','C',0};
285 static const WCHAR SDDL_SELF_WRITE[]       = {'S','W',0};
286 static const WCHAR SDDL_LIST_OBJECT[]      = {'L','O',0};
287 static const WCHAR SDDL_DELETE_TREE[]      = {'D','T',0};
288 static const WCHAR SDDL_CONTROL_ACCESS[]   = {'C','R',0};
289
290 static const WCHAR SDDL_FILE_ALL[]         = {'F','A',0};
291 static const WCHAR SDDL_FILE_READ[]        = {'F','R',0};
292 static const WCHAR SDDL_FILE_WRITE[]       = {'F','W',0};
293 static const WCHAR SDDL_FILE_EXECUTE[]     = {'F','X',0};
294
295 static const WCHAR SDDL_KEY_ALL[]          = {'K','A',0};
296 static const WCHAR SDDL_KEY_READ[]         = {'K','R',0};
297 static const WCHAR SDDL_KEY_WRITE[]        = {'K','W',0};
298 static const WCHAR SDDL_KEY_EXECUTE[]      = {'K','X',0};
299
300 static const WCHAR SDDL_GENERIC_ALL[]      = {'G','A',0};
301 static const WCHAR SDDL_GENERIC_READ[]     = {'G','R',0};
302 static const WCHAR SDDL_GENERIC_WRITE[]    = {'G','W',0};
303 static const WCHAR SDDL_GENERIC_EXECUTE[]  = {'G','X',0};
304
305 /*
306  * ACL flags
307  */
308 static const WCHAR SDDL_PROTECTED[]             = {'P',0};
309 static const WCHAR SDDL_AUTO_INHERIT_REQ[]      = {'A','R',0};
310 static const WCHAR SDDL_AUTO_INHERITED[]        = {'A','I',0};
311
312 /*
313  * ACE types
314  */
315 static const WCHAR SDDL_ACCESS_ALLOWED[]        = {'A',0};
316 static const WCHAR SDDL_ACCESS_DENIED[]         = {'D',0};
317 static const WCHAR SDDL_OBJECT_ACCESS_ALLOWED[] = {'O','A',0};
318 static const WCHAR SDDL_OBJECT_ACCESS_DENIED[]  = {'O','D',0};
319 static const WCHAR SDDL_AUDIT[]                 = {'A','U',0};
320 static const WCHAR SDDL_ALARM[]                 = {'A','L',0};
321 static const WCHAR SDDL_OBJECT_AUDIT[]          = {'O','U',0};
322 static const WCHAR SDDL_OBJECT_ALARMp[]         = {'O','L',0};
323
324 /*
325  * ACE flags
326  */
327 static const WCHAR SDDL_CONTAINER_INHERIT[]  = {'C','I',0};
328 static const WCHAR SDDL_OBJECT_INHERIT[]     = {'O','I',0};
329 static const WCHAR SDDL_NO_PROPAGATE[]       = {'N','P',0};
330 static const WCHAR SDDL_INHERIT_ONLY[]       = {'I','O',0};
331 static const WCHAR SDDL_INHERITED[]          = {'I','D',0};
332 static const WCHAR SDDL_AUDIT_SUCCESS[]      = {'S','A',0};
333 static const WCHAR SDDL_AUDIT_FAILURE[]      = {'F','A',0};
334
335 const char * debugstr_sid(PSID sid)
336 {
337     int auth = 0;
338     SID * psid = (SID *)sid;
339
340     if (psid == NULL)
341         return "(null)";
342
343     auth = psid->IdentifierAuthority.Value[5] +
344            (psid->IdentifierAuthority.Value[4] << 8) +
345            (psid->IdentifierAuthority.Value[3] << 16) +
346            (psid->IdentifierAuthority.Value[2] << 24);
347
348     switch (psid->SubAuthorityCount) {
349     case 0:
350         return wine_dbg_sprintf("S-%d-%d", psid->Revision, auth);
351     case 1:
352         return wine_dbg_sprintf("S-%d-%d-%u", psid->Revision, auth,
353             psid->SubAuthority[0]);
354     case 2:
355         return wine_dbg_sprintf("S-%d-%d-%u-%u", psid->Revision, auth,
356             psid->SubAuthority[0], psid->SubAuthority[1]);
357     case 3:
358         return wine_dbg_sprintf("S-%d-%d-%u-%u-%u", psid->Revision, auth,
359             psid->SubAuthority[0], psid->SubAuthority[1], psid->SubAuthority[2]);
360     case 4:
361         return wine_dbg_sprintf("S-%d-%d-%u-%u-%u-%u", psid->Revision, auth,
362             psid->SubAuthority[0], psid->SubAuthority[1], psid->SubAuthority[2],
363             psid->SubAuthority[3]);
364     case 5:
365         return wine_dbg_sprintf("S-%d-%d-%u-%u-%u-%u-%u", psid->Revision, auth,
366             psid->SubAuthority[0], psid->SubAuthority[1], psid->SubAuthority[2],
367             psid->SubAuthority[3], psid->SubAuthority[4]);
368     case 6:
369         return wine_dbg_sprintf("S-%d-%d-%u-%u-%u-%u-%u-%u", psid->Revision, auth,
370             psid->SubAuthority[3], psid->SubAuthority[1], psid->SubAuthority[2],
371             psid->SubAuthority[0], psid->SubAuthority[4], psid->SubAuthority[5]);
372     case 7:
373         return wine_dbg_sprintf("S-%d-%d-%u-%u-%u-%u-%u-%u-%u", psid->Revision, auth,
374             psid->SubAuthority[0], psid->SubAuthority[1], psid->SubAuthority[2],
375             psid->SubAuthority[3], psid->SubAuthority[4], psid->SubAuthority[5],
376             psid->SubAuthority[6]);
377     case 8:
378         return wine_dbg_sprintf("S-%d-%d-%u-%u-%u-%u-%u-%u-%u-%u", psid->Revision, auth,
379             psid->SubAuthority[0], psid->SubAuthority[1], psid->SubAuthority[2],
380             psid->SubAuthority[3], psid->SubAuthority[4], psid->SubAuthority[5],
381             psid->SubAuthority[6], psid->SubAuthority[7]);
382     }
383     return "(too-big)";
384 }
385
386 /* set last error code from NT status and get the proper boolean return value */
387 /* used for functions that are a simple wrapper around the corresponding ntdll API */
388 static inline BOOL set_ntstatus( NTSTATUS status )
389 {
390     if (status) SetLastError( RtlNtStatusToDosError( status ));
391     return !status;
392 }
393
394 #define WINE_SIZE_OF_WORLD_ACCESS_ACL   (sizeof(ACL) + sizeof(ACCESS_ALLOWED_ACE) + sizeof(sidWorld) - sizeof(DWORD))
395
396 static void GetWorldAccessACL(PACL pACL)
397 {
398     PACCESS_ALLOWED_ACE pACE = (PACCESS_ALLOWED_ACE) (pACL + 1);
399
400     pACL->AclRevision = ACL_REVISION;
401     pACL->Sbz1 = 0;
402     pACL->AclSize = WINE_SIZE_OF_WORLD_ACCESS_ACL;
403     pACL->AceCount = 1;
404     pACL->Sbz2 = 0;
405
406     pACE->Header.AceType = ACCESS_ALLOWED_ACE_TYPE;
407     pACE->Header.AceFlags = CONTAINER_INHERIT_ACE;
408     pACE->Header.AceSize = sizeof(ACCESS_ALLOWED_ACE) + sizeof(sidWorld) - sizeof(DWORD);
409     pACE->Mask = 0xf3ffffff; /* Everything except reserved bits */
410     memcpy(&pACE->SidStart, &sidWorld, sizeof(sidWorld));
411 }
412
413 /************************************************************
414  *                ADVAPI_IsLocalComputer
415  *
416  * Checks whether the server name indicates local machine.
417  */
418 BOOL ADVAPI_IsLocalComputer(LPCWSTR ServerName)
419 {
420     DWORD dwSize = MAX_COMPUTERNAME_LENGTH + 1;
421     BOOL Result;
422     LPWSTR buf;
423
424     if (!ServerName || !ServerName[0])
425         return TRUE;
426
427     buf = HeapAlloc(GetProcessHeap(), 0, dwSize * sizeof(WCHAR));
428     Result = GetComputerNameW(buf,  &dwSize);
429     if (Result && (ServerName[0] == '\\') && (ServerName[1] == '\\'))
430         ServerName += 2;
431     Result = Result && !lstrcmpW(ServerName, buf);
432     HeapFree(GetProcessHeap(), 0, buf);
433
434     return Result;
435 }
436
437 /************************************************************
438  *                ADVAPI_GetComputerSid
439  *
440  * Reads the computer SID from the registry.
441  */
442 BOOL ADVAPI_GetComputerSid(PSID sid)
443 {
444     HKEY key;
445     LONG ret;
446     BOOL retval = FALSE;
447     static const WCHAR Account[] = { 'S','E','C','U','R','I','T','Y','\\','S','A','M','\\','D','o','m','a','i','n','s','\\','A','c','c','o','u','n','t',0 };
448     static const WCHAR V[] = { 'V',0 };
449
450     if ((ret = RegOpenKeyExW(HKEY_LOCAL_MACHINE, Account, 0,
451         KEY_READ, &key)) == ERROR_SUCCESS)
452     {
453         DWORD size = 0;
454         ret = RegQueryValueExW(key, V, NULL, NULL, NULL, &size);
455         if (ret == ERROR_MORE_DATA || ret == ERROR_SUCCESS)
456         {
457             BYTE * data = HeapAlloc(GetProcessHeap(), 0, size);
458             if (data)
459             {
460                 if ((ret = RegQueryValueExW(key, V, NULL, NULL,
461                      data, &size)) == ERROR_SUCCESS)
462                 {
463                     /* the SID is in the last 24 bytes of the binary data */
464                     CopyMemory(sid, &data[size-24], 24);
465                     retval = TRUE;
466                 }
467                 HeapFree(GetProcessHeap(), 0, data);
468             }
469         }
470         RegCloseKey(key);
471     }
472
473     if(retval == TRUE) return retval;
474
475     /* create a new random SID */
476     if (RegCreateKeyExW(HKEY_LOCAL_MACHINE, Account,
477         0, NULL, 0, KEY_ALL_ACCESS, NULL, &key, NULL) == ERROR_SUCCESS)
478     {
479         PSID new_sid;
480         SID_IDENTIFIER_AUTHORITY identifierAuthority = {SECURITY_NT_AUTHORITY};
481         DWORD id[3];
482
483         if (RtlGenRandom(id, sizeof(id)))
484         {
485             if (AllocateAndInitializeSid(&identifierAuthority, 4, SECURITY_NT_NON_UNIQUE, id[0], id[1], id[2], 0, 0, 0, 0, &new_sid))
486             {
487                 if (RegSetValueExW(key, V, 0, REG_BINARY, new_sid, GetLengthSid(new_sid)) == ERROR_SUCCESS)
488                     retval = CopySid(GetLengthSid(new_sid), sid, new_sid);
489
490                 FreeSid(new_sid);
491             }
492         }
493         RegCloseKey(key);
494     }
495
496     return retval;
497 }
498
499 /*      ##############################
500         ######  TOKEN FUNCTIONS ######
501         ##############################
502 */
503
504 /******************************************************************************
505  * OpenProcessToken                     [ADVAPI32.@]
506  * Opens the access token associated with a process handle.
507  *
508  * PARAMS
509  *   ProcessHandle [I] Handle to process
510  *   DesiredAccess [I] Desired access to process
511  *   TokenHandle   [O] Pointer to handle of open access token
512  *
513  * RETURNS
514  *  Success: TRUE. TokenHandle contains the access token.
515  *  Failure: FALSE.
516  *
517  * NOTES
518  *  See NtOpenProcessToken.
519  */
520 BOOL WINAPI
521 OpenProcessToken( HANDLE ProcessHandle, DWORD DesiredAccess,
522                   HANDLE *TokenHandle )
523 {
524         return set_ntstatus(NtOpenProcessToken( ProcessHandle, DesiredAccess, TokenHandle ));
525 }
526
527 /******************************************************************************
528  * OpenThreadToken [ADVAPI32.@]
529  *
530  * Opens the access token associated with a thread handle.
531  *
532  * PARAMS
533  *   ThreadHandle  [I] Handle to process
534  *   DesiredAccess [I] Desired access to the thread
535  *   OpenAsSelf    [I] ???
536  *   TokenHandle   [O] Destination for the token handle
537  *
538  * RETURNS
539  *  Success: TRUE. TokenHandle contains the access token.
540  *  Failure: FALSE.
541  *
542  * NOTES
543  *  See NtOpenThreadToken.
544  */
545 BOOL WINAPI
546 OpenThreadToken( HANDLE ThreadHandle, DWORD DesiredAccess,
547                  BOOL OpenAsSelf, HANDLE *TokenHandle)
548 {
549         return set_ntstatus( NtOpenThreadToken(ThreadHandle, DesiredAccess, OpenAsSelf, TokenHandle));
550 }
551
552 BOOL WINAPI
553 AdjustTokenGroups( HANDLE TokenHandle, BOOL ResetToDefault, PTOKEN_GROUPS NewState,
554                    DWORD BufferLength, PTOKEN_GROUPS PreviousState, PDWORD ReturnLength )
555 {
556     return set_ntstatus( NtAdjustGroupsToken(TokenHandle, ResetToDefault, NewState, BufferLength,
557                                              PreviousState, ReturnLength));
558 }
559
560 /******************************************************************************
561  * AdjustTokenPrivileges [ADVAPI32.@]
562  *
563  * Adjust the privileges of an open token handle.
564  * 
565  * PARAMS
566  *  TokenHandle          [I]   Handle from OpenProcessToken() or OpenThreadToken() 
567  *  DisableAllPrivileges [I]   TRUE=Remove all privileges, FALSE=Use NewState
568  *  NewState             [I]   Desired new privileges of the token
569  *  BufferLength         [I]   Length of NewState
570  *  PreviousState        [O]   Destination for the previous state
571  *  ReturnLength         [I/O] Size of PreviousState
572  *
573  *
574  * RETURNS
575  *  Success: TRUE. Privileges are set to NewState and PreviousState is updated.
576  *  Failure: FALSE.
577  *
578  * NOTES
579  *  See NtAdjustPrivilegesToken.
580  */
581 BOOL WINAPI
582 AdjustTokenPrivileges( HANDLE TokenHandle, BOOL DisableAllPrivileges,
583                        PTOKEN_PRIVILEGES NewState, DWORD BufferLength,
584                        PTOKEN_PRIVILEGES PreviousState, PDWORD ReturnLength )
585 {
586     NTSTATUS status;
587
588     TRACE("\n");
589     
590     status = NtAdjustPrivilegesToken(TokenHandle, DisableAllPrivileges,
591                                                      NewState, BufferLength, PreviousState,
592                                                      ReturnLength);
593     SetLastError( RtlNtStatusToDosError( status ));
594     if ((status == STATUS_SUCCESS) || (status == STATUS_NOT_ALL_ASSIGNED))
595         return TRUE;
596     else
597         return FALSE;
598 }
599
600 /******************************************************************************
601  * CheckTokenMembership [ADVAPI32.@]
602  *
603  * Determine if an access token is a member of a SID.
604  * 
605  * PARAMS
606  *   TokenHandle [I] Handle from OpenProcessToken() or OpenThreadToken()
607  *   SidToCheck  [I] SID that possibly contains the token
608  *   IsMember    [O] Destination for result.
609  *
610  * RETURNS
611  *  Success: TRUE. IsMember is TRUE if TokenHandle is a member, FALSE otherwise.
612  *  Failure: FALSE.
613  */
614 BOOL WINAPI
615 CheckTokenMembership( HANDLE TokenHandle, PSID SidToCheck,
616                       PBOOL IsMember )
617 {
618   FIXME("(%p %p %p) stub!\n", TokenHandle, SidToCheck, IsMember);
619
620   *IsMember = TRUE;
621   return(TRUE);
622 }
623
624 /******************************************************************************
625  * GetTokenInformation [ADVAPI32.@]
626  *
627  * Get a type of information about an access token.
628  *
629  * PARAMS
630  *   token           [I] Handle from OpenProcessToken() or OpenThreadToken()
631  *   tokeninfoclass  [I] A TOKEN_INFORMATION_CLASS from "winnt.h"
632  *   tokeninfo       [O] Destination for token information
633  *   tokeninfolength [I] Length of tokeninfo
634  *   retlen          [O] Destination for returned token information length
635  *
636  * RETURNS
637  *  Success: TRUE. tokeninfo contains retlen bytes of token information
638  *  Failure: FALSE.
639  *
640  * NOTES
641  *  See NtQueryInformationToken.
642  */
643 BOOL WINAPI
644 GetTokenInformation( HANDLE token, TOKEN_INFORMATION_CLASS tokeninfoclass,
645                      LPVOID tokeninfo, DWORD tokeninfolength, LPDWORD retlen )
646 {
647     TRACE("(%p, %s, %p, %d, %p):\n",
648           token,
649           (tokeninfoclass == TokenUser) ? "TokenUser" :
650           (tokeninfoclass == TokenGroups) ? "TokenGroups" :
651           (tokeninfoclass == TokenPrivileges) ? "TokenPrivileges" :
652           (tokeninfoclass == TokenOwner) ? "TokenOwner" :
653           (tokeninfoclass == TokenPrimaryGroup) ? "TokenPrimaryGroup" :
654           (tokeninfoclass == TokenDefaultDacl) ? "TokenDefaultDacl" :
655           (tokeninfoclass == TokenSource) ? "TokenSource" :
656           (tokeninfoclass == TokenType) ? "TokenType" :
657           (tokeninfoclass == TokenImpersonationLevel) ? "TokenImpersonationLevel" :
658           (tokeninfoclass == TokenStatistics) ? "TokenStatistics" :
659           (tokeninfoclass == TokenRestrictedSids) ? "TokenRestrictedSids" :
660           (tokeninfoclass == TokenSessionId) ? "TokenSessionId" :
661           (tokeninfoclass == TokenGroupsAndPrivileges) ? "TokenGroupsAndPrivileges" :
662           (tokeninfoclass == TokenSessionReference) ? "TokenSessionReference" :
663           (tokeninfoclass == TokenSandBoxInert) ? "TokenSandBoxInert" :
664           "Unknown",
665           tokeninfo, tokeninfolength, retlen);
666     return set_ntstatus( NtQueryInformationToken( token, tokeninfoclass, tokeninfo,
667                                                   tokeninfolength, retlen));
668 }
669
670 /******************************************************************************
671  * SetTokenInformation [ADVAPI32.@]
672  *
673  * Set information for an access token.
674  *
675  * PARAMS
676  *   token           [I] Handle from OpenProcessToken() or OpenThreadToken()
677  *   tokeninfoclass  [I] A TOKEN_INFORMATION_CLASS from "winnt.h"
678  *   tokeninfo       [I] Token information to set
679  *   tokeninfolength [I] Length of tokeninfo
680  *
681  * RETURNS
682  *  Success: TRUE. The information for the token is set to tokeninfo.
683  *  Failure: FALSE.
684  */
685 BOOL WINAPI
686 SetTokenInformation( HANDLE token, TOKEN_INFORMATION_CLASS tokeninfoclass,
687                      LPVOID tokeninfo, DWORD tokeninfolength )
688 {
689     TRACE("(%p, %s, %p, %d): stub\n",
690           token,
691           (tokeninfoclass == TokenUser) ? "TokenUser" :
692           (tokeninfoclass == TokenGroups) ? "TokenGroups" :
693           (tokeninfoclass == TokenPrivileges) ? "TokenPrivileges" :
694           (tokeninfoclass == TokenOwner) ? "TokenOwner" :
695           (tokeninfoclass == TokenPrimaryGroup) ? "TokenPrimaryGroup" :
696           (tokeninfoclass == TokenDefaultDacl) ? "TokenDefaultDacl" :
697           (tokeninfoclass == TokenSource) ? "TokenSource" :
698           (tokeninfoclass == TokenType) ? "TokenType" :
699           (tokeninfoclass == TokenImpersonationLevel) ? "TokenImpersonationLevel" :
700           (tokeninfoclass == TokenStatistics) ? "TokenStatistics" :
701           (tokeninfoclass == TokenRestrictedSids) ? "TokenRestrictedSids" :
702           (tokeninfoclass == TokenSessionId) ? "TokenSessionId" :
703           (tokeninfoclass == TokenGroupsAndPrivileges) ? "TokenGroupsAndPrivileges" :
704           (tokeninfoclass == TokenSessionReference) ? "TokenSessionReference" :
705           (tokeninfoclass == TokenSandBoxInert) ? "TokenSandBoxInert" :
706           "Unknown",
707           tokeninfo, tokeninfolength);
708
709     return set_ntstatus( NtSetInformationToken( token, tokeninfoclass, tokeninfo, tokeninfolength ));
710 }
711
712 /*************************************************************************
713  * SetThreadToken [ADVAPI32.@]
714  *
715  * Assigns an 'impersonation token' to a thread so it can assume the
716  * security privileges of another thread or process.  Can also remove
717  * a previously assigned token. 
718  *
719  * PARAMS
720  *   thread          [O] Handle to thread to set the token for
721  *   token           [I] Token to set
722  *
723  * RETURNS
724  *  Success: TRUE. The threads access token is set to token
725  *  Failure: FALSE.
726  *
727  * NOTES
728  *  Only supported on NT or higher. On Win9X this function does nothing.
729  *  See SetTokenInformation.
730  */
731 BOOL WINAPI SetThreadToken(PHANDLE thread, HANDLE token)
732 {
733     return set_ntstatus( NtSetInformationThread( thread ? *thread : GetCurrentThread(),
734                                                  ThreadImpersonationToken, &token, sizeof token ));
735 }
736
737 /*************************************************************************
738  * CreateRestrictedToken [ADVAPI32.@]
739  *
740  * Create a new more restricted token from an existing token.
741  *
742  * PARAMS
743  *   baseToken       [I] Token to base the new restricted token on
744  *   flags           [I] Options
745  *   nDisableSids    [I] Length of disableSids array
746  *   disableSids     [I] Array of SIDs to disable in the new token
747  *   nDeletePrivs    [I] Length of deletePrivs array
748  *   deletePrivs     [I] Array of privileges to delete in the new token
749  *   nRestrictSids   [I] Length of restrictSids array
750  *   restrictSids    [I] Array of SIDs to restrict in the new token
751  *   newToken        [O] Address where the new token is stored
752  *
753  * RETURNS
754  *  Success: TRUE
755  *  Failure: FALSE
756  */
757 BOOL WINAPI CreateRestrictedToken(
758     HANDLE baseToken,
759     DWORD flags,
760     DWORD nDisableSids,
761     PSID_AND_ATTRIBUTES disableSids,
762     DWORD nDeletePrivs,
763     PLUID_AND_ATTRIBUTES deletePrivs,
764     DWORD nRestrictSids,
765     PSID_AND_ATTRIBUTES restrictSids,
766     PHANDLE newToken)
767 {
768     FIXME("(%p, 0x%x, %u, %p, %u, %p, %u, %p, %p): stub\n",
769           baseToken, flags, nDisableSids, disableSids,
770           nDeletePrivs, deletePrivs,
771           nRestrictSids, restrictSids,
772           newToken);
773     SetLastError(ERROR_CALL_NOT_IMPLEMENTED);
774     return FALSE;
775 }
776
777 /*      ##############################
778         ######  SID FUNCTIONS   ######
779         ##############################
780 */
781
782 /******************************************************************************
783  * AllocateAndInitializeSid [ADVAPI32.@]
784  *
785  * PARAMS
786  *   pIdentifierAuthority []
787  *   nSubAuthorityCount   []
788  *   nSubAuthority0       []
789  *   nSubAuthority1       []
790  *   nSubAuthority2       []
791  *   nSubAuthority3       []
792  *   nSubAuthority4       []
793  *   nSubAuthority5       []
794  *   nSubAuthority6       []
795  *   nSubAuthority7       []
796  *   pSid                 []
797  */
798 BOOL WINAPI
799 AllocateAndInitializeSid( PSID_IDENTIFIER_AUTHORITY pIdentifierAuthority,
800                           BYTE nSubAuthorityCount,
801                           DWORD nSubAuthority0, DWORD nSubAuthority1,
802                           DWORD nSubAuthority2, DWORD nSubAuthority3,
803                           DWORD nSubAuthority4, DWORD nSubAuthority5,
804                           DWORD nSubAuthority6, DWORD nSubAuthority7,
805                           PSID *pSid )
806 {
807     return set_ntstatus( RtlAllocateAndInitializeSid(
808                              pIdentifierAuthority, nSubAuthorityCount,
809                              nSubAuthority0, nSubAuthority1, nSubAuthority2, nSubAuthority3,
810                              nSubAuthority4, nSubAuthority5, nSubAuthority6, nSubAuthority7,
811                              pSid ));
812 }
813
814 /******************************************************************************
815  * FreeSid [ADVAPI32.@]
816  *
817  * PARAMS
818  *   pSid []
819  */
820 PVOID WINAPI
821 FreeSid( PSID pSid )
822 {
823         RtlFreeSid(pSid);
824         return NULL; /* is documented like this */
825 }
826
827 /******************************************************************************
828  * CopySid [ADVAPI32.@]
829  *
830  * PARAMS
831  *   nDestinationSidLength []
832  *   pDestinationSid       []
833  *   pSourceSid            []
834  */
835 BOOL WINAPI
836 CopySid( DWORD nDestinationSidLength, PSID pDestinationSid, PSID pSourceSid )
837 {
838         return RtlCopySid(nDestinationSidLength, pDestinationSid, pSourceSid);
839 }
840
841 /******************************************************************************
842  * CreateWellKnownSid [ADVAPI32.@]
843  */
844 BOOL WINAPI
845 CreateWellKnownSid( WELL_KNOWN_SID_TYPE WellKnownSidType,
846                     PSID DomainSid,
847                     PSID pSid,
848                     DWORD* cbSid)
849 {
850     unsigned int i;
851     TRACE("(%d, %s, %p, %p)\n", WellKnownSidType, debugstr_sid(DomainSid), pSid, cbSid);
852
853     if (cbSid == NULL || pSid == NULL || (DomainSid && !IsValidSid(DomainSid))) {
854         SetLastError(ERROR_INVALID_PARAMETER);
855         return FALSE;
856     }
857
858     for (i = 0; i < sizeof(WellKnownSids)/sizeof(WellKnownSids[0]); i++) {
859         if (WellKnownSids[i].Type == WellKnownSidType) {
860             DWORD length = GetSidLengthRequired(WellKnownSids[i].Sid.SubAuthorityCount);
861
862             if (*cbSid < length) {
863                 SetLastError(ERROR_INSUFFICIENT_BUFFER);
864                 return FALSE;
865             }
866
867             CopyMemory(pSid, &WellKnownSids[i].Sid.Revision, length);
868             *cbSid = length;
869             return TRUE;
870         }
871     }
872
873     if (DomainSid == NULL || *GetSidSubAuthorityCount(DomainSid) == SID_MAX_SUB_AUTHORITIES)
874     {
875         SetLastError(ERROR_INVALID_PARAMETER);
876         return FALSE;
877     }
878
879     for (i = 0; i < sizeof(WellKnownRids)/sizeof(WellKnownRids[0]); i++)
880         if (WellKnownRids[i].Type == WellKnownSidType) {
881             UCHAR domain_subauth = *GetSidSubAuthorityCount(DomainSid);
882             DWORD domain_sid_length = GetSidLengthRequired(domain_subauth);
883             DWORD output_sid_length = GetSidLengthRequired(domain_subauth + 1);
884
885             if (*cbSid < output_sid_length) {
886                 SetLastError(ERROR_INSUFFICIENT_BUFFER);
887                 return FALSE;
888             }
889
890             CopyMemory(pSid, DomainSid, domain_sid_length);
891             (*GetSidSubAuthorityCount(pSid))++;
892             (*GetSidSubAuthority(pSid, domain_subauth)) = WellKnownRids[i].Rid;
893             *cbSid = output_sid_length;
894             return TRUE;
895         }
896
897     SetLastError(ERROR_INVALID_PARAMETER);
898     return FALSE;
899 }
900
901 /******************************************************************************
902  * IsWellKnownSid [ADVAPI32.@]
903  */
904 BOOL WINAPI
905 IsWellKnownSid( PSID pSid, WELL_KNOWN_SID_TYPE WellKnownSidType )
906 {
907     unsigned int i;
908     TRACE("(%s, %d)\n", debugstr_sid(pSid), WellKnownSidType);
909
910     for (i = 0; i < sizeof(WellKnownSids)/sizeof(WellKnownSids[0]); i++)
911         if (WellKnownSids[i].Type == WellKnownSidType)
912             if (EqualSid(pSid, (PSID)&(WellKnownSids[i].Sid.Revision)))
913                 return TRUE;
914
915     return FALSE;
916 }
917
918 BOOL WINAPI
919 IsTokenRestricted( HANDLE TokenHandle )
920 {
921     TOKEN_GROUPS *groups;
922     DWORD size;
923     NTSTATUS status;
924     BOOL restricted;
925
926     TRACE("(%p)\n", TokenHandle);
927  
928     status = NtQueryInformationToken(TokenHandle, TokenRestrictedSids, NULL, 0, &size);
929     if (status != STATUS_BUFFER_TOO_SMALL)
930         return FALSE;
931  
932     groups = HeapAlloc(GetProcessHeap(), 0, size);
933     if (!groups)
934     {
935         SetLastError(ERROR_OUTOFMEMORY);
936         return FALSE;
937     }
938  
939     status = NtQueryInformationToken(TokenHandle, TokenRestrictedSids, groups, size, &size);
940     if (status != STATUS_SUCCESS)
941     {
942         HeapFree(GetProcessHeap(), 0, groups);
943         return set_ntstatus(status);
944     }
945  
946     if (groups->GroupCount)
947         restricted = TRUE;
948     else
949         restricted = FALSE;
950      
951     HeapFree(GetProcessHeap(), 0, groups);
952  
953     return restricted;
954 }
955
956 /******************************************************************************
957  * IsValidSid [ADVAPI32.@]
958  *
959  * PARAMS
960  *   pSid []
961  */
962 BOOL WINAPI
963 IsValidSid( PSID pSid )
964 {
965         return RtlValidSid( pSid );
966 }
967
968 /******************************************************************************
969  * EqualSid [ADVAPI32.@]
970  *
971  * PARAMS
972  *   pSid1 []
973  *   pSid2 []
974  */
975 BOOL WINAPI
976 EqualSid( PSID pSid1, PSID pSid2 )
977 {
978         return RtlEqualSid( pSid1, pSid2 );
979 }
980
981 /******************************************************************************
982  * EqualPrefixSid [ADVAPI32.@]
983  */
984 BOOL WINAPI EqualPrefixSid (PSID pSid1, PSID pSid2)
985 {
986         return RtlEqualPrefixSid(pSid1, pSid2);
987 }
988
989 /******************************************************************************
990  * GetSidLengthRequired [ADVAPI32.@]
991  *
992  * PARAMS
993  *   nSubAuthorityCount []
994  */
995 DWORD WINAPI
996 GetSidLengthRequired( BYTE nSubAuthorityCount )
997 {
998         return RtlLengthRequiredSid(nSubAuthorityCount);
999 }
1000
1001 /******************************************************************************
1002  * InitializeSid [ADVAPI32.@]
1003  *
1004  * PARAMS
1005  *   pIdentifierAuthority []
1006  */
1007 BOOL WINAPI
1008 InitializeSid (
1009         PSID pSid,
1010         PSID_IDENTIFIER_AUTHORITY pIdentifierAuthority,
1011         BYTE nSubAuthorityCount)
1012 {
1013         return RtlInitializeSid(pSid, pIdentifierAuthority, nSubAuthorityCount);
1014 }
1015
1016 DWORD WINAPI
1017 GetEffectiveRightsFromAclA( PACL pacl, PTRUSTEEA pTrustee, PACCESS_MASK pAccessRights )
1018 {
1019     FIXME("%p %p %p - stub\n", pacl, pTrustee, pAccessRights);
1020
1021     return 1;
1022 }
1023
1024 DWORD WINAPI
1025 GetEffectiveRightsFromAclW( PACL pacl, PTRUSTEEW pTrustee, PACCESS_MASK pAccessRights )
1026 {
1027     FIXME("%p %p %p - stub\n", pacl, pTrustee, pAccessRights);
1028
1029     return 1;
1030 }
1031
1032 /******************************************************************************
1033  * GetSidIdentifierAuthority [ADVAPI32.@]
1034  *
1035  * PARAMS
1036  *   pSid []
1037  */
1038 PSID_IDENTIFIER_AUTHORITY WINAPI
1039 GetSidIdentifierAuthority( PSID pSid )
1040 {
1041         return RtlIdentifierAuthoritySid(pSid);
1042 }
1043
1044 /******************************************************************************
1045  * GetSidSubAuthority [ADVAPI32.@]
1046  *
1047  * PARAMS
1048  *   pSid          []
1049  *   nSubAuthority []
1050  */
1051 PDWORD WINAPI
1052 GetSidSubAuthority( PSID pSid, DWORD nSubAuthority )
1053 {
1054         return RtlSubAuthoritySid(pSid, nSubAuthority);
1055 }
1056
1057 /******************************************************************************
1058  * GetSidSubAuthorityCount [ADVAPI32.@]
1059  *
1060  * PARAMS
1061  *   pSid []
1062  */
1063 PUCHAR WINAPI
1064 GetSidSubAuthorityCount (PSID pSid)
1065 {
1066         return RtlSubAuthorityCountSid(pSid);
1067 }
1068
1069 /******************************************************************************
1070  * GetLengthSid [ADVAPI32.@]
1071  *
1072  * PARAMS
1073  *   pSid []
1074  */
1075 DWORD WINAPI
1076 GetLengthSid (PSID pSid)
1077 {
1078         return RtlLengthSid(pSid);
1079 }
1080
1081 /*      ##############################################
1082         ######  SECURITY DESCRIPTOR FUNCTIONS   ######
1083         ##############################################
1084 */
1085
1086  /****************************************************************************** 
1087  * BuildSecurityDescriptorA [ADVAPI32.@]
1088  *
1089  * Builds a SD from 
1090  *
1091  * PARAMS
1092  *  pOwner                [I]
1093  *  pGroup                [I]
1094  *  cCountOfAccessEntries [I]
1095  *  pListOfAccessEntries  [I]
1096  *  cCountOfAuditEntries  [I]
1097  *  pListofAuditEntries   [I]
1098  *  pOldSD                [I]
1099  *  lpdwBufferLength      [I/O]
1100  *  pNewSD                [O]
1101  *
1102  * RETURNS
1103  *  Success: ERROR_SUCCESS
1104  *  Failure: nonzero error code from Winerror.h
1105  */
1106 DWORD WINAPI BuildSecurityDescriptorA(
1107     IN PTRUSTEEA pOwner,
1108     IN PTRUSTEEA pGroup,
1109     IN ULONG cCountOfAccessEntries,
1110     IN PEXPLICIT_ACCESSA pListOfAccessEntries,
1111     IN ULONG cCountOfAuditEntries,
1112     IN PEXPLICIT_ACCESSA pListofAuditEntries,
1113     IN PSECURITY_DESCRIPTOR pOldSD,
1114     IN OUT PULONG lpdwBufferLength,
1115     OUT PSECURITY_DESCRIPTOR* pNewSD)
1116
1117     FIXME("(%p,%p,%d,%p,%d,%p,%p,%p,%p) stub!\n",pOwner,pGroup,
1118           cCountOfAccessEntries,pListOfAccessEntries,cCountOfAuditEntries,
1119           pListofAuditEntries,pOldSD,lpdwBufferLength,pNewSD);
1120  
1121     return ERROR_CALL_NOT_IMPLEMENTED;
1122
1123  
1124 /******************************************************************************
1125  * BuildSecurityDescriptorW [ADVAPI32.@]
1126  *
1127  * See BuildSecurityDescriptorA.
1128  */
1129 DWORD WINAPI BuildSecurityDescriptorW(
1130     IN PTRUSTEEW pOwner,
1131     IN PTRUSTEEW pGroup,
1132     IN ULONG cCountOfAccessEntries,
1133     IN PEXPLICIT_ACCESSW pListOfAccessEntries,
1134     IN ULONG cCountOfAuditEntries,
1135     IN PEXPLICIT_ACCESSW pListofAuditEntries,
1136     IN PSECURITY_DESCRIPTOR pOldSD,
1137     IN OUT PULONG lpdwBufferLength,
1138     OUT PSECURITY_DESCRIPTOR* pNewSD)
1139
1140     FIXME("(%p,%p,%d,%p,%d,%p,%p,%p,%p) stub!\n",pOwner,pGroup,
1141           cCountOfAccessEntries,pListOfAccessEntries,cCountOfAuditEntries,
1142           pListofAuditEntries,pOldSD,lpdwBufferLength,pNewSD);
1143  
1144     return ERROR_CALL_NOT_IMPLEMENTED;
1145
1146
1147 /******************************************************************************
1148  * InitializeSecurityDescriptor [ADVAPI32.@]
1149  *
1150  * PARAMS
1151  *   pDescr   []
1152  *   revision []
1153  */
1154 BOOL WINAPI
1155 InitializeSecurityDescriptor( PSECURITY_DESCRIPTOR pDescr, DWORD revision )
1156 {
1157         return set_ntstatus( RtlCreateSecurityDescriptor(pDescr, revision ));
1158 }
1159
1160
1161 /******************************************************************************
1162  * MakeAbsoluteSD [ADVAPI32.@]
1163  */
1164 BOOL WINAPI MakeAbsoluteSD (
1165         IN PSECURITY_DESCRIPTOR pSelfRelativeSecurityDescriptor,
1166         OUT PSECURITY_DESCRIPTOR pAbsoluteSecurityDescriptor,
1167         OUT LPDWORD lpdwAbsoluteSecurityDescriptorSize,
1168         OUT PACL pDacl,
1169         OUT LPDWORD lpdwDaclSize,
1170         OUT PACL pSacl,
1171         OUT LPDWORD lpdwSaclSize,
1172         OUT PSID pOwner,
1173         OUT LPDWORD lpdwOwnerSize,
1174         OUT PSID pPrimaryGroup,
1175         OUT LPDWORD lpdwPrimaryGroupSize)
1176 {
1177     return set_ntstatus( RtlSelfRelativeToAbsoluteSD(pSelfRelativeSecurityDescriptor,
1178                                                      pAbsoluteSecurityDescriptor,
1179                                                      lpdwAbsoluteSecurityDescriptorSize,
1180                                                      pDacl, lpdwDaclSize, pSacl, lpdwSaclSize,
1181                                                      pOwner, lpdwOwnerSize,
1182                                                      pPrimaryGroup, lpdwPrimaryGroupSize));
1183 }
1184
1185 /******************************************************************************
1186  * GetKernelObjectSecurity [ADVAPI32.@]
1187  */
1188 BOOL WINAPI GetKernelObjectSecurity(
1189         HANDLE Handle,
1190         SECURITY_INFORMATION RequestedInformation,
1191         PSECURITY_DESCRIPTOR pSecurityDescriptor,
1192         DWORD nLength,
1193         LPDWORD lpnLengthNeeded )
1194 {
1195     TRACE("(%p,0x%08x,%p,0x%08x,%p)\n", Handle, RequestedInformation,
1196           pSecurityDescriptor, nLength, lpnLengthNeeded);
1197
1198     return set_ntstatus( NtQuerySecurityObject(Handle, RequestedInformation, pSecurityDescriptor,
1199                                                nLength, lpnLengthNeeded ));
1200 }
1201
1202 /******************************************************************************
1203  * GetPrivateObjectSecurity [ADVAPI32.@]
1204  */
1205 BOOL WINAPI GetPrivateObjectSecurity(
1206         PSECURITY_DESCRIPTOR ObjectDescriptor,
1207         SECURITY_INFORMATION SecurityInformation,
1208         PSECURITY_DESCRIPTOR ResultantDescriptor,
1209         DWORD DescriptorLength,
1210         PDWORD ReturnLength )
1211 {
1212     SECURITY_DESCRIPTOR desc;
1213     BOOL defaulted, present;
1214     PACL pacl;
1215     PSID psid;
1216
1217     TRACE("(%p,0x%08x,%p,0x%08x,%p)\n", ObjectDescriptor, SecurityInformation,
1218           ResultantDescriptor, DescriptorLength, ReturnLength);
1219
1220     if (!InitializeSecurityDescriptor(&desc, SECURITY_DESCRIPTOR_REVISION))
1221         return FALSE;
1222
1223     if (SecurityInformation & OWNER_SECURITY_INFORMATION)
1224     {
1225         if (!GetSecurityDescriptorOwner(ObjectDescriptor, &psid, &defaulted))
1226             return FALSE;
1227         SetSecurityDescriptorOwner(&desc, psid, defaulted);
1228     }
1229
1230     if (SecurityInformation & GROUP_SECURITY_INFORMATION)
1231     {
1232         if (!GetSecurityDescriptorGroup(ObjectDescriptor, &psid, &defaulted))
1233             return FALSE;
1234         SetSecurityDescriptorGroup(&desc, psid, defaulted);
1235     }
1236
1237     if (SecurityInformation & DACL_SECURITY_INFORMATION)
1238     {
1239         if (!GetSecurityDescriptorDacl(ObjectDescriptor, &present, &pacl, &defaulted))
1240             return FALSE;
1241         SetSecurityDescriptorDacl(&desc, present, pacl, defaulted);
1242     }
1243
1244     if (SecurityInformation & SACL_SECURITY_INFORMATION)
1245     {
1246         if (!GetSecurityDescriptorSacl(ObjectDescriptor, &present, &pacl, &defaulted))
1247             return FALSE;
1248         SetSecurityDescriptorSacl(&desc, present, pacl, defaulted);
1249     }
1250
1251     *ReturnLength = DescriptorLength;
1252     return MakeSelfRelativeSD(&desc, ResultantDescriptor, ReturnLength);
1253 }
1254
1255 /******************************************************************************
1256  * GetSecurityDescriptorLength [ADVAPI32.@]
1257  */
1258 DWORD WINAPI GetSecurityDescriptorLength( PSECURITY_DESCRIPTOR pDescr)
1259 {
1260         return RtlLengthSecurityDescriptor(pDescr);
1261 }
1262
1263 /******************************************************************************
1264  * GetSecurityDescriptorOwner [ADVAPI32.@]
1265  *
1266  * PARAMS
1267  *   pOwner            []
1268  *   lpbOwnerDefaulted []
1269  */
1270 BOOL WINAPI
1271 GetSecurityDescriptorOwner( PSECURITY_DESCRIPTOR pDescr, PSID *pOwner,
1272                             LPBOOL lpbOwnerDefaulted )
1273 {
1274     BOOLEAN defaulted;
1275     BOOL ret = set_ntstatus( RtlGetOwnerSecurityDescriptor( pDescr, pOwner, &defaulted ));
1276     *lpbOwnerDefaulted = defaulted;
1277     return ret;
1278 }
1279
1280 /******************************************************************************
1281  * SetSecurityDescriptorOwner [ADVAPI32.@]
1282  *
1283  * PARAMS
1284  */
1285 BOOL WINAPI SetSecurityDescriptorOwner( PSECURITY_DESCRIPTOR pSecurityDescriptor,
1286                                    PSID pOwner, BOOL bOwnerDefaulted)
1287 {
1288     return set_ntstatus( RtlSetOwnerSecurityDescriptor(pSecurityDescriptor, pOwner, bOwnerDefaulted));
1289 }
1290 /******************************************************************************
1291  * GetSecurityDescriptorGroup                   [ADVAPI32.@]
1292  */
1293 BOOL WINAPI GetSecurityDescriptorGroup(
1294         PSECURITY_DESCRIPTOR SecurityDescriptor,
1295         PSID *Group,
1296         LPBOOL GroupDefaulted)
1297 {
1298     BOOLEAN defaulted;
1299     BOOL ret = set_ntstatus( RtlGetGroupSecurityDescriptor(SecurityDescriptor, Group, &defaulted ));
1300     *GroupDefaulted = defaulted;
1301     return ret;
1302 }
1303 /******************************************************************************
1304  * SetSecurityDescriptorGroup [ADVAPI32.@]
1305  */
1306 BOOL WINAPI SetSecurityDescriptorGroup ( PSECURITY_DESCRIPTOR SecurityDescriptor,
1307                                            PSID Group, BOOL GroupDefaulted)
1308 {
1309     return set_ntstatus( RtlSetGroupSecurityDescriptor( SecurityDescriptor, Group, GroupDefaulted));
1310 }
1311
1312 /******************************************************************************
1313  * IsValidSecurityDescriptor [ADVAPI32.@]
1314  *
1315  * PARAMS
1316  *   lpsecdesc []
1317  */
1318 BOOL WINAPI
1319 IsValidSecurityDescriptor( PSECURITY_DESCRIPTOR SecurityDescriptor )
1320 {
1321     return set_ntstatus( RtlValidSecurityDescriptor(SecurityDescriptor));
1322 }
1323
1324 /******************************************************************************
1325  *  GetSecurityDescriptorDacl                   [ADVAPI32.@]
1326  */
1327 BOOL WINAPI GetSecurityDescriptorDacl(
1328         IN PSECURITY_DESCRIPTOR pSecurityDescriptor,
1329         OUT LPBOOL lpbDaclPresent,
1330         OUT PACL *pDacl,
1331         OUT LPBOOL lpbDaclDefaulted)
1332 {
1333     BOOLEAN present, defaulted;
1334     BOOL ret = set_ntstatus( RtlGetDaclSecurityDescriptor(pSecurityDescriptor, &present, pDacl, &defaulted));
1335     *lpbDaclPresent = present;
1336     *lpbDaclDefaulted = defaulted;
1337     return ret;
1338 }
1339
1340 /******************************************************************************
1341  *  SetSecurityDescriptorDacl                   [ADVAPI32.@]
1342  */
1343 BOOL WINAPI
1344 SetSecurityDescriptorDacl (
1345         PSECURITY_DESCRIPTOR lpsd,
1346         BOOL daclpresent,
1347         PACL dacl,
1348         BOOL dacldefaulted )
1349 {
1350     return set_ntstatus( RtlSetDaclSecurityDescriptor (lpsd, daclpresent, dacl, dacldefaulted ) );
1351 }
1352 /******************************************************************************
1353  *  GetSecurityDescriptorSacl                   [ADVAPI32.@]
1354  */
1355 BOOL WINAPI GetSecurityDescriptorSacl(
1356         IN PSECURITY_DESCRIPTOR lpsd,
1357         OUT LPBOOL lpbSaclPresent,
1358         OUT PACL *pSacl,
1359         OUT LPBOOL lpbSaclDefaulted)
1360 {
1361     BOOLEAN present, defaulted;
1362     BOOL ret = set_ntstatus( RtlGetSaclSecurityDescriptor(lpsd, &present, pSacl, &defaulted) );
1363     *lpbSaclPresent = present;
1364     *lpbSaclDefaulted = defaulted;
1365     return ret;
1366 }
1367
1368 /**************************************************************************
1369  * SetSecurityDescriptorSacl                    [ADVAPI32.@]
1370  */
1371 BOOL WINAPI SetSecurityDescriptorSacl (
1372         PSECURITY_DESCRIPTOR lpsd,
1373         BOOL saclpresent,
1374         PACL lpsacl,
1375         BOOL sacldefaulted)
1376 {
1377     return set_ntstatus (RtlSetSaclSecurityDescriptor(lpsd, saclpresent, lpsacl, sacldefaulted));
1378 }
1379 /******************************************************************************
1380  * MakeSelfRelativeSD [ADVAPI32.@]
1381  *
1382  * PARAMS
1383  *   lpabssecdesc  []
1384  *   lpselfsecdesc []
1385  *   lpbuflen      []
1386  */
1387 BOOL WINAPI
1388 MakeSelfRelativeSD(
1389         IN PSECURITY_DESCRIPTOR pAbsoluteSecurityDescriptor,
1390         IN PSECURITY_DESCRIPTOR pSelfRelativeSecurityDescriptor,
1391         IN OUT LPDWORD lpdwBufferLength)
1392 {
1393     return set_ntstatus( RtlMakeSelfRelativeSD( pAbsoluteSecurityDescriptor,
1394                                                 pSelfRelativeSecurityDescriptor, lpdwBufferLength));
1395 }
1396
1397 /******************************************************************************
1398  * GetSecurityDescriptorControl                 [ADVAPI32.@]
1399  */
1400
1401 BOOL WINAPI GetSecurityDescriptorControl ( PSECURITY_DESCRIPTOR  pSecurityDescriptor,
1402                  PSECURITY_DESCRIPTOR_CONTROL pControl, LPDWORD lpdwRevision)
1403 {
1404     return set_ntstatus( RtlGetControlSecurityDescriptor(pSecurityDescriptor,pControl,lpdwRevision));
1405 }
1406
1407 /******************************************************************************
1408  * SetSecurityDescriptorControl                 [ADVAPI32.@]
1409  */
1410 BOOL WINAPI SetSecurityDescriptorControl( PSECURITY_DESCRIPTOR pSecurityDescriptor,
1411   SECURITY_DESCRIPTOR_CONTROL ControlBitsOfInterest,
1412   SECURITY_DESCRIPTOR_CONTROL ControlBitsToSet )
1413 {
1414     return set_ntstatus( RtlSetControlSecurityDescriptor(
1415         pSecurityDescriptor, ControlBitsOfInterest, ControlBitsToSet ) );
1416 }
1417
1418 /*      ##############################
1419         ######  ACL FUNCTIONS   ######
1420         ##############################
1421 */
1422
1423 /*************************************************************************
1424  * InitializeAcl [ADVAPI32.@]
1425  */
1426 BOOL WINAPI InitializeAcl(PACL acl, DWORD size, DWORD rev)
1427 {
1428     return set_ntstatus( RtlCreateAcl(acl, size, rev));
1429 }
1430
1431 BOOL WINAPI ImpersonateNamedPipeClient( HANDLE hNamedPipe )
1432 {
1433     IO_STATUS_BLOCK io_block;
1434
1435     TRACE("(%p)\n", hNamedPipe);
1436
1437     return set_ntstatus( NtFsControlFile(hNamedPipe, NULL, NULL, NULL,
1438                          &io_block, FSCTL_PIPE_IMPERSONATE, NULL, 0, NULL, 0) );
1439 }
1440
1441 /******************************************************************************
1442  *  AddAccessAllowedAce [ADVAPI32.@]
1443  */
1444 BOOL WINAPI AddAccessAllowedAce(
1445         IN OUT PACL pAcl,
1446         IN DWORD dwAceRevision,
1447         IN DWORD AccessMask,
1448         IN PSID pSid)
1449 {
1450     return set_ntstatus(RtlAddAccessAllowedAce(pAcl, dwAceRevision, AccessMask, pSid));
1451 }
1452
1453 /******************************************************************************
1454  *  AddAccessAllowedAceEx [ADVAPI32.@]
1455  */
1456 BOOL WINAPI AddAccessAllowedAceEx(
1457         IN OUT PACL pAcl,
1458         IN DWORD dwAceRevision,
1459         IN DWORD AceFlags,
1460         IN DWORD AccessMask,
1461         IN PSID pSid)
1462 {
1463     return set_ntstatus(RtlAddAccessAllowedAceEx(pAcl, dwAceRevision, AceFlags, AccessMask, pSid));
1464 }
1465
1466 /******************************************************************************
1467  *  AddAccessDeniedAce [ADVAPI32.@]
1468  */
1469 BOOL WINAPI AddAccessDeniedAce(
1470         IN OUT PACL pAcl,
1471         IN DWORD dwAceRevision,
1472         IN DWORD AccessMask,
1473         IN PSID pSid)
1474 {
1475     return set_ntstatus(RtlAddAccessDeniedAce(pAcl, dwAceRevision, AccessMask, pSid));
1476 }
1477
1478 /******************************************************************************
1479  *  AddAccessDeniedAceEx [ADVAPI32.@]
1480  */
1481 BOOL WINAPI AddAccessDeniedAceEx(
1482         IN OUT PACL pAcl,
1483         IN DWORD dwAceRevision,
1484         IN DWORD AceFlags,
1485         IN DWORD AccessMask,
1486         IN PSID pSid)
1487 {
1488     return set_ntstatus(RtlAddAccessDeniedAceEx(pAcl, dwAceRevision, AceFlags, AccessMask, pSid));
1489 }
1490
1491 /******************************************************************************
1492  *  AddAce [ADVAPI32.@]
1493  */
1494 BOOL WINAPI AddAce(
1495         IN OUT PACL pAcl,
1496         IN DWORD dwAceRevision,
1497         IN DWORD dwStartingAceIndex,
1498         LPVOID pAceList,
1499         DWORD nAceListLength)
1500 {
1501     return set_ntstatus(RtlAddAce(pAcl, dwAceRevision, dwStartingAceIndex, pAceList, nAceListLength));
1502 }
1503
1504 /******************************************************************************
1505  * DeleteAce [ADVAPI32.@]
1506  */
1507 BOOL WINAPI DeleteAce(PACL pAcl, DWORD dwAceIndex)
1508 {
1509     return set_ntstatus(RtlDeleteAce(pAcl, dwAceIndex));
1510 }
1511
1512 /******************************************************************************
1513  *  FindFirstFreeAce [ADVAPI32.@]
1514  */
1515 BOOL WINAPI FindFirstFreeAce(IN PACL pAcl, LPVOID * pAce)
1516 {
1517         return RtlFirstFreeAce(pAcl, (PACE_HEADER *)pAce);
1518 }
1519
1520 /******************************************************************************
1521  * GetAce [ADVAPI32.@]
1522  */
1523 BOOL WINAPI GetAce(PACL pAcl,DWORD dwAceIndex,LPVOID *pAce )
1524 {
1525     return set_ntstatus(RtlGetAce(pAcl, dwAceIndex, pAce));
1526 }
1527
1528 /******************************************************************************
1529  * GetAclInformation [ADVAPI32.@]
1530  */
1531 BOOL WINAPI GetAclInformation(
1532   PACL pAcl,
1533   LPVOID pAclInformation,
1534   DWORD nAclInformationLength,
1535   ACL_INFORMATION_CLASS dwAclInformationClass)
1536 {
1537     return set_ntstatus(RtlQueryInformationAcl(pAcl, pAclInformation,
1538                                                nAclInformationLength, dwAclInformationClass));
1539 }
1540
1541 /******************************************************************************
1542  *  IsValidAcl [ADVAPI32.@]
1543  */
1544 BOOL WINAPI IsValidAcl(IN PACL pAcl)
1545 {
1546         return RtlValidAcl(pAcl);
1547 }
1548
1549 /*      ##############################
1550         ######  MISC FUNCTIONS  ######
1551         ##############################
1552 */
1553
1554 /******************************************************************************
1555  * AllocateLocallyUniqueId [ADVAPI32.@]
1556  *
1557  * PARAMS
1558  *   lpLuid []
1559  */
1560 BOOL WINAPI AllocateLocallyUniqueId( PLUID lpLuid )
1561 {
1562     return set_ntstatus(NtAllocateLocallyUniqueId(lpLuid));
1563 }
1564
1565 static const WCHAR SE_CREATE_TOKEN_NAME_W[] =
1566  { 'S','e','C','r','e','a','t','e','T','o','k','e','n','P','r','i','v','i','l','e','g','e',0 };
1567 static const WCHAR SE_ASSIGNPRIMARYTOKEN_NAME_W[] =
1568  { 'S','e','A','s','s','i','g','n','P','r','i','m','a','r','y','T','o','k','e','n','P','r','i','v','i','l','e','g','e',0 };
1569 static const WCHAR SE_LOCK_MEMORY_NAME_W[] =
1570  { 'S','e','L','o','c','k','M','e','m','o','r','y','P','r','i','v','i','l','e','g','e',0 };
1571 static const WCHAR SE_INCREASE_QUOTA_NAME_W[] =
1572  { 'S','e','I','n','c','r','e','a','s','e','Q','u','o','t','a','P','r','i','v','i','l','e','g','e',0 };
1573 static const WCHAR SE_MACHINE_ACCOUNT_NAME_W[] =
1574  { 'S','e','M','a','c','h','i','n','e','A','c','c','o','u','n','t','P','r','i','v','i','l','e','g','e',0 };
1575 static const WCHAR SE_TCB_NAME_W[] =
1576  { 'S','e','T','c','b','P','r','i','v','i','l','e','g','e',0 };
1577 static const WCHAR SE_SECURITY_NAME_W[] =
1578  { 'S','e','S','e','c','u','r','i','t','y','P','r','i','v','i','l','e','g','e',0 };
1579 static const WCHAR SE_TAKE_OWNERSHIP_NAME_W[] =
1580  { 'S','e','T','a','k','e','O','w','n','e','r','s','h','i','p','P','r','i','v','i','l','e','g','e',0 };
1581 static const WCHAR SE_LOAD_DRIVER_NAME_W[] =
1582  { 'S','e','L','o','a','d','D','r','i','v','e','r','P','r','i','v','i','l','e','g','e',0 };
1583 static const WCHAR SE_SYSTEM_PROFILE_NAME_W[] =
1584  { 'S','e','S','y','s','t','e','m','P','r','o','f','i','l','e','P','r','i','v','i','l','e','g','e',0 };
1585 static const WCHAR SE_SYSTEMTIME_NAME_W[] =
1586  { 'S','e','S','y','s','t','e','m','t','i','m','e','P','r','i','v','i','l','e','g','e',0 };
1587 static const WCHAR SE_PROF_SINGLE_PROCESS_NAME_W[] =
1588  { 'S','e','P','r','o','f','i','l','e','S','i','n','g','l','e','P','r','o','c','e','s','s','P','r','i','v','i','l','e','g','e',0 };
1589 static const WCHAR SE_INC_BASE_PRIORITY_NAME_W[] =
1590  { 'S','e','I','n','c','r','e','a','s','e','B','a','s','e','P','r','i','o','r','i','t','y','P','r','i','v','i','l','e','g','e',0 };
1591 static const WCHAR SE_CREATE_PAGEFILE_NAME_W[] =
1592  { 'S','e','C','r','e','a','t','e','P','a','g','e','f','i','l','e','P','r','i','v','i','l','e','g','e',0 };
1593 static const WCHAR SE_CREATE_PERMANENT_NAME_W[] =
1594  { 'S','e','C','r','e','a','t','e','P','e','r','m','a','n','e','n','t','P','r','i','v','i','l','e','g','e',0 };
1595 static const WCHAR SE_BACKUP_NAME_W[] =
1596  { 'S','e','B','a','c','k','u','p','P','r','i','v','i','l','e','g','e',0 };
1597 static const WCHAR SE_RESTORE_NAME_W[] =
1598  { 'S','e','R','e','s','t','o','r','e','P','r','i','v','i','l','e','g','e',0 };
1599 static const WCHAR SE_SHUTDOWN_NAME_W[] =
1600  { 'S','e','S','h','u','t','d','o','w','n','P','r','i','v','i','l','e','g','e',0 };
1601 static const WCHAR SE_DEBUG_NAME_W[] =
1602  { 'S','e','D','e','b','u','g','P','r','i','v','i','l','e','g','e',0 };
1603 static const WCHAR SE_AUDIT_NAME_W[] =
1604  { 'S','e','A','u','d','i','t','P','r','i','v','i','l','e','g','e',0 };
1605 static const WCHAR SE_SYSTEM_ENVIRONMENT_NAME_W[] =
1606  { 'S','e','S','y','s','t','e','m','E','n','v','i','r','o','n','m','e','n','t','P','r','i','v','i','l','e','g','e',0 };
1607 static const WCHAR SE_CHANGE_NOTIFY_NAME_W[] =
1608  { 'S','e','C','h','a','n','g','e','N','o','t','i','f','y','P','r','i','v','i','l','e','g','e',0 };
1609 static const WCHAR SE_REMOTE_SHUTDOWN_NAME_W[] =
1610  { 'S','e','R','e','m','o','t','e','S','h','u','t','d','o','w','n','P','r','i','v','i','l','e','g','e',0 };
1611 static const WCHAR SE_UNDOCK_NAME_W[] =
1612  { 'S','e','U','n','d','o','c','k','P','r','i','v','i','l','e','g','e',0 };
1613 static const WCHAR SE_SYNC_AGENT_NAME_W[] =
1614  { 'S','e','S','y','n','c','A','g','e','n','t','P','r','i','v','i','l','e','g','e',0 };
1615 static const WCHAR SE_ENABLE_DELEGATION_NAME_W[] =
1616  { 'S','e','E','n','a','b','l','e','D','e','l','e','g','a','t','i','o','n','P','r','i','v','i','l','e','g','e',0 };
1617 static const WCHAR SE_MANAGE_VOLUME_NAME_W[] =
1618  { 'S','e','M','a','n','a','g','e','V','o','l','u','m','e','P','r','i','v','i','l','e','g','e',0 };
1619 static const WCHAR SE_IMPERSONATE_NAME_W[] =
1620  { 'S','e','I','m','p','e','r','s','o','n','a','t','e','P','r','i','v','i','l','e','g','e',0 };
1621 static const WCHAR SE_CREATE_GLOBAL_NAME_W[] =
1622  { 'S','e','C','r','e','a','t','e','G','l','o','b','a','l','P','r','i','v','i','l','e','g','e',0 };
1623
1624 static const WCHAR * const WellKnownPrivNames[SE_MAX_WELL_KNOWN_PRIVILEGE + 1] =
1625 {
1626     NULL,
1627     NULL,
1628     SE_CREATE_TOKEN_NAME_W,
1629     SE_ASSIGNPRIMARYTOKEN_NAME_W,
1630     SE_LOCK_MEMORY_NAME_W,
1631     SE_INCREASE_QUOTA_NAME_W,
1632     SE_MACHINE_ACCOUNT_NAME_W,
1633     SE_TCB_NAME_W,
1634     SE_SECURITY_NAME_W,
1635     SE_TAKE_OWNERSHIP_NAME_W,
1636     SE_LOAD_DRIVER_NAME_W,
1637     SE_SYSTEM_PROFILE_NAME_W,
1638     SE_SYSTEMTIME_NAME_W,
1639     SE_PROF_SINGLE_PROCESS_NAME_W,
1640     SE_INC_BASE_PRIORITY_NAME_W,
1641     SE_CREATE_PAGEFILE_NAME_W,
1642     SE_CREATE_PERMANENT_NAME_W,
1643     SE_BACKUP_NAME_W,
1644     SE_RESTORE_NAME_W,
1645     SE_SHUTDOWN_NAME_W,
1646     SE_DEBUG_NAME_W,
1647     SE_AUDIT_NAME_W,
1648     SE_SYSTEM_ENVIRONMENT_NAME_W,
1649     SE_CHANGE_NOTIFY_NAME_W,
1650     SE_REMOTE_SHUTDOWN_NAME_W,
1651     SE_UNDOCK_NAME_W,
1652     SE_SYNC_AGENT_NAME_W,
1653     SE_ENABLE_DELEGATION_NAME_W,
1654     SE_MANAGE_VOLUME_NAME_W,
1655     SE_IMPERSONATE_NAME_W,
1656     SE_CREATE_GLOBAL_NAME_W,
1657 };
1658
1659 /******************************************************************************
1660  * LookupPrivilegeValueW                        [ADVAPI32.@]
1661  *
1662  * See LookupPrivilegeValueA.
1663  */
1664 BOOL WINAPI
1665 LookupPrivilegeValueW( LPCWSTR lpSystemName, LPCWSTR lpName, PLUID lpLuid )
1666 {
1667     UINT i;
1668
1669     TRACE("%s,%s,%p\n",debugstr_w(lpSystemName), debugstr_w(lpName), lpLuid);
1670
1671     if (!ADVAPI_IsLocalComputer(lpSystemName))
1672     {
1673         SetLastError(RPC_S_SERVER_UNAVAILABLE);
1674         return FALSE;
1675     }
1676     if (!lpName)
1677     {
1678         SetLastError(ERROR_NO_SUCH_PRIVILEGE);
1679         return FALSE;
1680     }
1681     for( i=SE_MIN_WELL_KNOWN_PRIVILEGE; i<SE_MAX_WELL_KNOWN_PRIVILEGE; i++ )
1682     {
1683         if( !WellKnownPrivNames[i] )
1684             continue;
1685         if( strcmpiW( WellKnownPrivNames[i], lpName) )
1686             continue;
1687         lpLuid->LowPart = i;
1688         lpLuid->HighPart = 0;
1689         TRACE( "%s -> %08x-%08x\n",debugstr_w( lpSystemName ),
1690                lpLuid->HighPart, lpLuid->LowPart );
1691         return TRUE;
1692     }
1693     SetLastError(ERROR_NO_SUCH_PRIVILEGE);
1694     return FALSE;
1695 }
1696
1697 /******************************************************************************
1698  * LookupPrivilegeValueA                        [ADVAPI32.@]
1699  *
1700  * Retrieves LUID used on a system to represent the privilege name.
1701  *
1702  * PARAMS
1703  *  lpSystemName [I] Name of the system
1704  *  lpName       [I] Name of the privilege
1705  *  lpLuid       [O] Destination for the resulting LUID
1706  *
1707  * RETURNS
1708  *  Success: TRUE. lpLuid contains the requested LUID.
1709  *  Failure: FALSE.
1710  */
1711 BOOL WINAPI
1712 LookupPrivilegeValueA( LPCSTR lpSystemName, LPCSTR lpName, PLUID lpLuid )
1713 {
1714     UNICODE_STRING lpSystemNameW;
1715     UNICODE_STRING lpNameW;
1716     BOOL ret;
1717
1718     RtlCreateUnicodeStringFromAsciiz(&lpSystemNameW, lpSystemName);
1719     RtlCreateUnicodeStringFromAsciiz(&lpNameW,lpName);
1720     ret = LookupPrivilegeValueW(lpSystemNameW.Buffer, lpNameW.Buffer, lpLuid);
1721     RtlFreeUnicodeString(&lpNameW);
1722     RtlFreeUnicodeString(&lpSystemNameW);
1723     return ret;
1724 }
1725
1726 BOOL WINAPI LookupPrivilegeDisplayNameA( LPCSTR lpSystemName, LPCSTR lpName, LPSTR lpDisplayName,
1727                                          LPDWORD cchDisplayName, LPDWORD lpLanguageId )
1728 {
1729     FIXME("%s %s %s %p %p - stub\n", debugstr_a(lpSystemName), debugstr_a(lpName),
1730           debugstr_a(lpDisplayName), cchDisplayName, lpLanguageId);
1731
1732     return FALSE;
1733 }
1734
1735 BOOL WINAPI LookupPrivilegeDisplayNameW( LPCWSTR lpSystemName, LPCWSTR lpName, LPWSTR lpDisplayName,
1736                                          LPDWORD cchDisplayName, LPDWORD lpLanguageId )
1737 {
1738     FIXME("%s %s %s %p %p - stub\n", debugstr_w(lpSystemName), debugstr_w(lpName),
1739           debugstr_w(lpDisplayName), cchDisplayName, lpLanguageId);
1740
1741     return FALSE;
1742 }
1743
1744 /******************************************************************************
1745  * LookupPrivilegeNameA                 [ADVAPI32.@]
1746  *
1747  * See LookupPrivilegeNameW.
1748  */
1749 BOOL WINAPI
1750 LookupPrivilegeNameA( LPCSTR lpSystemName, PLUID lpLuid, LPSTR lpName,
1751  LPDWORD cchName)
1752 {
1753     UNICODE_STRING lpSystemNameW;
1754     BOOL ret;
1755     DWORD wLen = 0;
1756
1757     TRACE("%s %p %p %p\n", debugstr_a(lpSystemName), lpLuid, lpName, cchName);
1758
1759     RtlCreateUnicodeStringFromAsciiz(&lpSystemNameW, lpSystemName);
1760     ret = LookupPrivilegeNameW(lpSystemNameW.Buffer, lpLuid, NULL, &wLen);
1761     if (!ret && GetLastError() == ERROR_INSUFFICIENT_BUFFER)
1762     {
1763         LPWSTR lpNameW = HeapAlloc(GetProcessHeap(), 0, wLen * sizeof(WCHAR));
1764
1765         ret = LookupPrivilegeNameW(lpSystemNameW.Buffer, lpLuid, lpNameW,
1766          &wLen);
1767         if (ret)
1768         {
1769             /* Windows crashes if cchName is NULL, so will I */
1770             unsigned int len = WideCharToMultiByte(CP_ACP, 0, lpNameW, -1, lpName,
1771              *cchName, NULL, NULL);
1772
1773             if (len == 0)
1774             {
1775                 /* WideCharToMultiByte failed */
1776                 ret = FALSE;
1777             }
1778             else if (len > *cchName)
1779             {
1780                 *cchName = len;
1781                 SetLastError(ERROR_INSUFFICIENT_BUFFER);
1782                 ret = FALSE;
1783             }
1784             else
1785             {
1786                 /* WideCharToMultiByte succeeded, output length needs to be
1787                  * length not including NULL terminator
1788                  */
1789                 *cchName = len - 1;
1790             }
1791         }
1792         HeapFree(GetProcessHeap(), 0, lpNameW);
1793     }
1794     RtlFreeUnicodeString(&lpSystemNameW);
1795     return ret;
1796 }
1797
1798 /******************************************************************************
1799  * LookupPrivilegeNameW                 [ADVAPI32.@]
1800  *
1801  * Retrieves the privilege name referred to by the LUID lpLuid.
1802  *
1803  * PARAMS
1804  *  lpSystemName [I]   Name of the system
1805  *  lpLuid       [I]   Privilege value
1806  *  lpName       [O]   Name of the privilege
1807  *  cchName      [I/O] Number of characters in lpName.
1808  *
1809  * RETURNS
1810  *  Success: TRUE. lpName contains the name of the privilege whose value is
1811  *  *lpLuid.
1812  *  Failure: FALSE.
1813  *
1814  * REMARKS
1815  *  Only well-known privilege names (those defined in winnt.h) can be retrieved
1816  *  using this function.
1817  *  If the length of lpName is too small, on return *cchName will contain the
1818  *  number of WCHARs needed to contain the privilege, including the NULL
1819  *  terminator, and GetLastError will return ERROR_INSUFFICIENT_BUFFER.
1820  *  On success, *cchName will contain the number of characters stored in
1821  *  lpName, NOT including the NULL terminator.
1822  */
1823 BOOL WINAPI
1824 LookupPrivilegeNameW( LPCWSTR lpSystemName, PLUID lpLuid, LPWSTR lpName,
1825  LPDWORD cchName)
1826 {
1827     size_t privNameLen;
1828
1829     TRACE("%s,%p,%p,%p\n",debugstr_w(lpSystemName), lpLuid, lpName, cchName);
1830
1831     if (!ADVAPI_IsLocalComputer(lpSystemName))
1832     {
1833         SetLastError(RPC_S_SERVER_UNAVAILABLE);
1834         return FALSE;
1835     }
1836     if (lpLuid->HighPart || (lpLuid->LowPart < SE_MIN_WELL_KNOWN_PRIVILEGE ||
1837      lpLuid->LowPart > SE_MAX_WELL_KNOWN_PRIVILEGE))
1838     {
1839         SetLastError(ERROR_NO_SUCH_PRIVILEGE);
1840         return FALSE;
1841     }
1842     privNameLen = strlenW(WellKnownPrivNames[lpLuid->LowPart]);
1843     /* Windows crashes if cchName is NULL, so will I */
1844     if (*cchName <= privNameLen)
1845     {
1846         *cchName = privNameLen + 1;
1847         SetLastError(ERROR_INSUFFICIENT_BUFFER);
1848         return FALSE;
1849     }
1850     else
1851     {
1852         strcpyW(lpName, WellKnownPrivNames[lpLuid->LowPart]);
1853         *cchName = privNameLen;
1854         return TRUE;
1855     }
1856 }
1857
1858 /******************************************************************************
1859  * GetFileSecurityA [ADVAPI32.@]
1860  *
1861  * Obtains Specified information about the security of a file or directory.
1862  *
1863  * PARAMS
1864  *  lpFileName           [I] Name of the file to get info for
1865  *  RequestedInformation [I] SE_ flags from "winnt.h"
1866  *  pSecurityDescriptor  [O] Destination for security information
1867  *  nLength              [I] Length of pSecurityDescriptor
1868  *  lpnLengthNeeded      [O] Destination for length of returned security information
1869  *
1870  * RETURNS
1871  *  Success: TRUE. pSecurityDescriptor contains the requested information.
1872  *  Failure: FALSE. lpnLengthNeeded contains the required space to return the info. 
1873  *
1874  * NOTES
1875  *  The information returned is constrained by the callers access rights and
1876  *  privileges.
1877  */
1878 BOOL WINAPI
1879 GetFileSecurityA( LPCSTR lpFileName,
1880                     SECURITY_INFORMATION RequestedInformation,
1881                     PSECURITY_DESCRIPTOR pSecurityDescriptor,
1882                     DWORD nLength, LPDWORD lpnLengthNeeded )
1883 {
1884     DWORD len;
1885     BOOL r;
1886     LPWSTR name = NULL;
1887
1888     if( lpFileName )
1889     {
1890         len = MultiByteToWideChar( CP_ACP, 0, lpFileName, -1, NULL, 0 );
1891         name = HeapAlloc( GetProcessHeap(), 0, len*sizeof(WCHAR) );
1892         MultiByteToWideChar( CP_ACP, 0, lpFileName, -1, name, len );
1893     }
1894
1895     r = GetFileSecurityW( name, RequestedInformation, pSecurityDescriptor,
1896                           nLength, lpnLengthNeeded );
1897     HeapFree( GetProcessHeap(), 0, name );
1898
1899     return r;
1900 }
1901
1902 /******************************************************************************
1903  * GetFileSecurityW [ADVAPI32.@]
1904  *
1905  * See GetFileSecurityA.
1906  */
1907 BOOL WINAPI
1908 GetFileSecurityW( LPCWSTR lpFileName,
1909                     SECURITY_INFORMATION RequestedInformation,
1910                     PSECURITY_DESCRIPTOR pSecurityDescriptor,
1911                     DWORD nLength, LPDWORD lpnLengthNeeded )
1912 {
1913     HANDLE hfile;
1914     NTSTATUS status;
1915     DWORD access = 0;
1916
1917     if (RequestedInformation & (OWNER_SECURITY_INFORMATION|GROUP_SECURITY_INFORMATION|
1918                                 DACL_SECURITY_INFORMATION))
1919         access |= READ_CONTROL;
1920     if (RequestedInformation & SACL_SECURITY_INFORMATION)
1921         access |= ACCESS_SYSTEM_SECURITY;
1922
1923     hfile = CreateFileW( lpFileName, access, FILE_SHARE_READ|FILE_SHARE_WRITE|FILE_SHARE_DELETE,
1924                          NULL, OPEN_EXISTING, FILE_FLAG_BACKUP_SEMANTICS, 0 );
1925     if ( hfile == INVALID_HANDLE_VALUE )
1926         return FALSE;
1927
1928     status = NtQuerySecurityObject( hfile, RequestedInformation, pSecurityDescriptor,
1929                                     nLength, lpnLengthNeeded );
1930     CloseHandle( hfile );
1931     return set_ntstatus( status );
1932 }
1933
1934
1935 /******************************************************************************
1936  * LookupAccountSidA [ADVAPI32.@]
1937  */
1938 BOOL WINAPI
1939 LookupAccountSidA(
1940         IN LPCSTR system,
1941         IN PSID sid,
1942         OUT LPSTR account,
1943         IN OUT LPDWORD accountSize,
1944         OUT LPSTR domain,
1945         IN OUT LPDWORD domainSize,
1946         OUT PSID_NAME_USE name_use )
1947 {
1948     DWORD len;
1949     BOOL r;
1950     LPWSTR systemW = NULL;
1951     LPWSTR accountW = NULL;
1952     LPWSTR domainW = NULL;
1953     DWORD accountSizeW = *accountSize;
1954     DWORD domainSizeW = *domainSize;
1955
1956     TRACE("(%s,sid=%s,%p,%p(%u),%p,%p(%u),%p)\n",
1957           debugstr_a(system),debugstr_sid(sid),
1958           account,accountSize,accountSize?*accountSize:0,
1959           domain,domainSize,domainSize?*domainSize:0,
1960           name_use);
1961
1962     if (system) {
1963         len = MultiByteToWideChar( CP_ACP, 0, system, -1, NULL, 0 );
1964         systemW = HeapAlloc( GetProcessHeap(), 0, len * sizeof(WCHAR) );
1965         MultiByteToWideChar( CP_ACP, 0, system, -1, systemW, len );
1966     }
1967     if (account)
1968         accountW = HeapAlloc( GetProcessHeap(), 0, accountSizeW * sizeof(WCHAR) );
1969     if (domain)
1970         domainW = HeapAlloc( GetProcessHeap(), 0, domainSizeW * sizeof(WCHAR) );
1971
1972     r = LookupAccountSidW( systemW, sid, accountW, &accountSizeW, domainW, &domainSizeW, name_use );
1973
1974     if (r) {
1975         if (accountW && *accountSize) {
1976             len = WideCharToMultiByte( CP_ACP, 0, accountW, -1, NULL, 0, NULL, NULL );
1977             WideCharToMultiByte( CP_ACP, 0, accountW, -1, account, len, NULL, NULL );
1978             *accountSize = len;
1979         } else
1980             *accountSize = accountSizeW + 1;
1981
1982         if (domainW && *domainSize) {
1983             len = WideCharToMultiByte( CP_ACP, 0, domainW, -1, NULL, 0, NULL, NULL );
1984             WideCharToMultiByte( CP_ACP, 0, domainW, -1, domain, len, NULL, NULL );
1985             *domainSize = len;
1986         } else
1987             *domainSize = domainSizeW + 1;
1988     }
1989
1990     HeapFree( GetProcessHeap(), 0, systemW );
1991     HeapFree( GetProcessHeap(), 0, accountW );
1992     HeapFree( GetProcessHeap(), 0, domainW );
1993
1994     return r;
1995 }
1996
1997 /******************************************************************************
1998  * LookupAccountSidW [ADVAPI32.@]
1999  *
2000  * PARAMS
2001  *   system      []
2002  *   sid         []
2003  *   account     []
2004  *   accountSize []
2005  *   domain      []
2006  *   domainSize  []
2007  *   name_use    []
2008  */
2009
2010 BOOL WINAPI
2011 LookupAccountSidW(
2012         IN LPCWSTR system,
2013         IN PSID sid,
2014         OUT LPWSTR account,
2015         IN OUT LPDWORD accountSize,
2016         OUT LPWSTR domain,
2017         IN OUT LPDWORD domainSize,
2018         OUT PSID_NAME_USE name_use )
2019 {
2020     unsigned int i, j;
2021     const WCHAR * ac = NULL;
2022     const WCHAR * dm = NULL;
2023     SID_NAME_USE use = 0;
2024     LPWSTR computer_name = NULL;
2025
2026     TRACE("(%s,sid=%s,%p,%p(%u),%p,%p(%u),%p)\n",
2027           debugstr_w(system),debugstr_sid(sid),
2028           account,accountSize,accountSize?*accountSize:0,
2029           domain,domainSize,domainSize?*domainSize:0,
2030           name_use);
2031
2032     if (!ADVAPI_IsLocalComputer(system)) {
2033         FIXME("Only local computer supported!\n");
2034         SetLastError(ERROR_NONE_MAPPED);
2035         return FALSE;
2036     }
2037
2038     /* check the well known SIDs first */
2039     for (i = 0; i <= 60; i++) {
2040         if (IsWellKnownSid(sid, i)) {
2041             for (j = 0; j < (sizeof(ACCOUNT_SIDS) / sizeof(ACCOUNT_SIDS[0])); j++) {
2042                 if (ACCOUNT_SIDS[j].type == i) {
2043                     ac = ACCOUNT_SIDS[j].account;
2044                     dm = ACCOUNT_SIDS[j].domain;
2045                     use = ACCOUNT_SIDS[j].name_use;
2046                 }
2047             }
2048             break;
2049         }
2050     }
2051
2052     if (dm == NULL) {
2053         MAX_SID local;
2054
2055         /* check for the local computer next */
2056         if (ADVAPI_GetComputerSid(&local)) {
2057             DWORD size = MAX_COMPUTERNAME_LENGTH + 1;
2058             BOOL result;
2059
2060             computer_name = HeapAlloc(GetProcessHeap(), 0, size * sizeof(WCHAR));
2061             result = GetComputerNameW(computer_name,  &size);
2062
2063             if (result) {
2064                 if (EqualSid(sid, &local)) {
2065                     dm = computer_name;
2066                     ac = Blank;
2067                     use = 3;
2068                 } else {
2069                     local.SubAuthorityCount++;
2070
2071                     if (EqualPrefixSid(sid, &local)) {
2072                         dm = computer_name;
2073                         use = 1;
2074                         switch (((MAX_SID *)sid)->SubAuthority[4]) {
2075                         case DOMAIN_USER_RID_ADMIN:
2076                             ac = Administrator;
2077                             break;
2078                         case DOMAIN_USER_RID_GUEST:
2079                             ac = Guest;
2080                             break;
2081                         case DOMAIN_GROUP_RID_ADMINS:
2082                             ac = Domain_Admins;
2083                             break;
2084                         case DOMAIN_GROUP_RID_USERS:
2085                             ac = Domain_Users;
2086                             break;
2087                         case DOMAIN_GROUP_RID_GUESTS:
2088                             ac = Domain_Guests;
2089                             break;
2090                         case DOMAIN_GROUP_RID_COMPUTERS:
2091                             ac = Domain_Computers;
2092                             break;
2093                         case DOMAIN_GROUP_RID_CONTROLLERS:
2094                             ac = Domain_Controllers;
2095                             break;
2096                         case DOMAIN_GROUP_RID_CERT_ADMINS:
2097                             ac = Cert_Publishers;
2098                             break;
2099                         case DOMAIN_GROUP_RID_SCHEMA_ADMINS:
2100                             ac = Schema_Admins;
2101                             break;
2102                         case DOMAIN_GROUP_RID_ENTERPRISE_ADMINS:
2103                             ac = Enterprise_Admins;
2104                             break;
2105                         case DOMAIN_GROUP_RID_POLICY_ADMINS:
2106                             ac = Group_Policy_Creator_Owners;
2107                             break;
2108                         case DOMAIN_ALIAS_RID_RAS_SERVERS:
2109                             ac = RAS_and_IAS_Servers;
2110                             break;
2111                         default:
2112                             dm = NULL;
2113                             break;
2114                         }
2115                     }
2116                 }
2117             }
2118         }
2119     }
2120
2121     if (dm) {
2122         DWORD ac_len = lstrlenW(ac);
2123         DWORD dm_len = lstrlenW(dm);
2124         BOOL status = TRUE;
2125
2126         if (*accountSize > ac_len) {
2127             if (account)
2128                 lstrcpyW(account, ac);
2129         }
2130         if (*domainSize > dm_len) {
2131             if (domain)
2132                 lstrcpyW(domain, dm);
2133         }
2134         if (((*accountSize != 0) && (*accountSize < ac_len)) ||
2135             ((*domainSize != 0) && (*domainSize < dm_len))) {
2136             SetLastError(ERROR_INSUFFICIENT_BUFFER);
2137             status = FALSE;
2138         }
2139         if (*domainSize)
2140             *domainSize = dm_len;
2141         else
2142             *domainSize = dm_len + 1;
2143         if (*accountSize)
2144             *accountSize = ac_len;
2145         else
2146             *accountSize = ac_len + 1;
2147         *name_use = use;
2148         HeapFree(GetProcessHeap(), 0, computer_name);
2149         return status;
2150     }
2151
2152     HeapFree(GetProcessHeap(), 0, computer_name);
2153     SetLastError(ERROR_NONE_MAPPED);
2154     return FALSE;
2155 }
2156
2157 /******************************************************************************
2158  * SetFileSecurityA [ADVAPI32.@]
2159  *
2160  * See SetFileSecurityW.
2161  */
2162 BOOL WINAPI SetFileSecurityA( LPCSTR lpFileName,
2163                                 SECURITY_INFORMATION RequestedInformation,
2164                                 PSECURITY_DESCRIPTOR pSecurityDescriptor)
2165 {
2166     DWORD len;
2167     BOOL r;
2168     LPWSTR name = NULL;
2169
2170     if( lpFileName )
2171     {
2172         len = MultiByteToWideChar( CP_ACP, 0, lpFileName, -1, NULL, 0 );
2173         name = HeapAlloc( GetProcessHeap(), 0, len*sizeof(WCHAR) );
2174         MultiByteToWideChar( CP_ACP, 0, lpFileName, -1, name, len );
2175     }
2176
2177     r = SetFileSecurityW( name, RequestedInformation, pSecurityDescriptor );
2178     HeapFree( GetProcessHeap(), 0, name );
2179
2180     return r;
2181 }
2182
2183 /******************************************************************************
2184  * SetFileSecurityW [ADVAPI32.@]
2185  *
2186  * Sets the security of a file or directory.
2187  *
2188  * PARAMS
2189  *   lpFileName           []
2190  *   RequestedInformation []
2191  *   pSecurityDescriptor  []
2192  *
2193  * RETURNS
2194  *  Success: TRUE.
2195  *  Failure: FALSE.
2196  */
2197 BOOL WINAPI
2198 SetFileSecurityW( LPCWSTR lpFileName,
2199                     SECURITY_INFORMATION RequestedInformation,
2200                     PSECURITY_DESCRIPTOR pSecurityDescriptor )
2201 {
2202     HANDLE file;
2203     DWORD access = 0;
2204     NTSTATUS status;
2205
2206     TRACE("(%s, 0x%x, %p)\n", debugstr_w(lpFileName), RequestedInformation,
2207           pSecurityDescriptor );
2208
2209     if (RequestedInformation & OWNER_SECURITY_INFORMATION ||
2210         RequestedInformation & GROUP_SECURITY_INFORMATION)
2211         access |= WRITE_OWNER;
2212     if (RequestedInformation & SACL_SECURITY_INFORMATION)
2213         access |= ACCESS_SYSTEM_SECURITY;
2214     if (RequestedInformation & DACL_SECURITY_INFORMATION)
2215         access |= WRITE_DAC;
2216
2217     file = CreateFileW( lpFileName, access, FILE_SHARE_READ|FILE_SHARE_WRITE|FILE_SHARE_DELETE,
2218                         NULL, OPEN_EXISTING, FILE_FLAG_BACKUP_SEMANTICS, NULL );
2219     if (file == INVALID_HANDLE_VALUE)
2220         return FALSE;
2221
2222     status = NtSetSecurityObject( file, RequestedInformation, pSecurityDescriptor );
2223     CloseHandle( file );
2224     return set_ntstatus( status );
2225 }
2226
2227 /******************************************************************************
2228  * QueryWindows31FilesMigration [ADVAPI32.@]
2229  *
2230  * PARAMS
2231  *   x1 []
2232  */
2233 BOOL WINAPI
2234 QueryWindows31FilesMigration( DWORD x1 )
2235 {
2236         FIXME("(%d):stub\n",x1);
2237         return TRUE;
2238 }
2239
2240 /******************************************************************************
2241  * SynchronizeWindows31FilesAndWindowsNTRegistry [ADVAPI32.@]
2242  *
2243  * PARAMS
2244  *   x1 []
2245  *   x2 []
2246  *   x3 []
2247  *   x4 []
2248  */
2249 BOOL WINAPI
2250 SynchronizeWindows31FilesAndWindowsNTRegistry( DWORD x1, DWORD x2, DWORD x3,
2251                                                DWORD x4 )
2252 {
2253         FIXME("(0x%08x,0x%08x,0x%08x,0x%08x):stub\n",x1,x2,x3,x4);
2254         return TRUE;
2255 }
2256
2257 /******************************************************************************
2258  * NotifyBootConfigStatus [ADVAPI32.@]
2259  *
2260  * PARAMS
2261  *   x1 []
2262  */
2263 BOOL WINAPI
2264 NotifyBootConfigStatus( BOOL x1 )
2265 {
2266         FIXME("(0x%08d):stub\n",x1);
2267         return 1;
2268 }
2269
2270 /******************************************************************************
2271  * RevertToSelf [ADVAPI32.@]
2272  *
2273  * Ends the impersonation of a user.
2274  *
2275  * PARAMS
2276  *   void []
2277  *
2278  * RETURNS
2279  *  Success: TRUE.
2280  *  Failure: FALSE.
2281  */
2282 BOOL WINAPI
2283 RevertToSelf( void )
2284 {
2285     HANDLE Token = NULL;
2286     return set_ntstatus( NtSetInformationThread( GetCurrentThread(),
2287         ThreadImpersonationToken, &Token, sizeof(Token) ) );
2288 }
2289
2290 /******************************************************************************
2291  * ImpersonateSelf [ADVAPI32.@]
2292  *
2293  * Makes an impersonation token that represents the process user and assigns
2294  * to the current thread.
2295  *
2296  * PARAMS
2297  *  ImpersonationLevel [I] Level at which to impersonate.
2298  *
2299  * RETURNS
2300  *  Success: TRUE.
2301  *  Failure: FALSE.
2302  */
2303 BOOL WINAPI
2304 ImpersonateSelf(SECURITY_IMPERSONATION_LEVEL ImpersonationLevel)
2305 {
2306     return set_ntstatus( RtlImpersonateSelf( ImpersonationLevel ) );
2307 }
2308
2309 /******************************************************************************
2310  * ImpersonateLoggedOnUser [ADVAPI32.@]
2311  */
2312 BOOL WINAPI ImpersonateLoggedOnUser(HANDLE hToken)
2313 {
2314     DWORD size;
2315     NTSTATUS Status;
2316     HANDLE ImpersonationToken;
2317     TOKEN_TYPE Type;
2318
2319     FIXME( "(%p)\n", hToken );
2320
2321     if (!GetTokenInformation( hToken, TokenType, &Type,
2322                               sizeof(TOKEN_TYPE), &size ))
2323         return FALSE;
2324
2325     if (Type == TokenPrimary)
2326     {
2327         OBJECT_ATTRIBUTES ObjectAttributes;
2328
2329         InitializeObjectAttributes( &ObjectAttributes, NULL, 0, NULL, NULL );
2330
2331         Status = NtDuplicateToken( hToken,
2332                                    TOKEN_IMPERSONATE | TOKEN_QUERY,
2333                                    &ObjectAttributes,
2334                                    SecurityImpersonation,
2335                                    TokenImpersonation,
2336                                    &ImpersonationToken );
2337         if (Status != STATUS_SUCCESS)
2338         {
2339             ERR( "NtDuplicateToken failed with error 0x%08x\n", Status );
2340             SetLastError( RtlNtStatusToDosError( Status ) );
2341             return FALSE;
2342         }
2343     }
2344     else
2345         ImpersonationToken = hToken;
2346
2347     Status = NtSetInformationThread( GetCurrentThread(),
2348                                      ThreadImpersonationToken,
2349                                      &ImpersonationToken,
2350                                      sizeof(ImpersonationToken) );
2351
2352     if (Type == TokenPrimary)
2353         NtClose( ImpersonationToken );
2354
2355     if (Status != STATUS_SUCCESS)
2356     {
2357         ERR( "NtSetInformationThread failed with error 0x%08x\n", Status );
2358         SetLastError( RtlNtStatusToDosError( Status ) );
2359         return FALSE;
2360     }
2361
2362     return TRUE;
2363 }
2364
2365 /******************************************************************************
2366  * AccessCheck [ADVAPI32.@]
2367  */
2368 BOOL WINAPI
2369 AccessCheck(
2370         PSECURITY_DESCRIPTOR SecurityDescriptor,
2371         HANDLE ClientToken,
2372         DWORD DesiredAccess,
2373         PGENERIC_MAPPING GenericMapping,
2374         PPRIVILEGE_SET PrivilegeSet,
2375         LPDWORD PrivilegeSetLength,
2376         LPDWORD GrantedAccess,
2377         LPBOOL AccessStatus)
2378 {
2379     NTSTATUS access_status;
2380     BOOL ret = set_ntstatus( NtAccessCheck(SecurityDescriptor, ClientToken, DesiredAccess,
2381                                            GenericMapping, PrivilegeSet, PrivilegeSetLength,
2382                                            GrantedAccess, &access_status) );
2383     if (ret) *AccessStatus = set_ntstatus( access_status );
2384     return ret;
2385 }
2386
2387
2388 /******************************************************************************
2389  * AccessCheckByType [ADVAPI32.@]
2390  */
2391 BOOL WINAPI AccessCheckByType(
2392     PSECURITY_DESCRIPTOR pSecurityDescriptor, 
2393     PSID PrincipalSelfSid,
2394     HANDLE ClientToken, 
2395     DWORD DesiredAccess, 
2396     POBJECT_TYPE_LIST ObjectTypeList,
2397     DWORD ObjectTypeListLength,
2398     PGENERIC_MAPPING GenericMapping,
2399     PPRIVILEGE_SET PrivilegeSet,
2400     LPDWORD PrivilegeSetLength, 
2401     LPDWORD GrantedAccess,
2402     LPBOOL AccessStatus)
2403 {
2404         FIXME("stub\n");
2405
2406         *AccessStatus = TRUE;
2407
2408         return !*AccessStatus;
2409 }
2410
2411 /******************************************************************************
2412  * MapGenericMask [ADVAPI32.@]
2413  *
2414  * Maps generic access rights into specific access rights according to the
2415  * supplied mapping.
2416  *
2417  * PARAMS
2418  *  AccessMask     [I/O] Access rights.
2419  *  GenericMapping [I] The mapping between generic and specific rights.
2420  *
2421  * RETURNS
2422  *  Nothing.
2423  */
2424 VOID WINAPI MapGenericMask( PDWORD AccessMask, PGENERIC_MAPPING GenericMapping )
2425 {
2426     RtlMapGenericMask( AccessMask, GenericMapping );
2427 }
2428
2429 /*************************************************************************
2430  * SetKernelObjectSecurity [ADVAPI32.@]
2431  */
2432 BOOL WINAPI SetKernelObjectSecurity (
2433         IN HANDLE Handle,
2434         IN SECURITY_INFORMATION SecurityInformation,
2435         IN PSECURITY_DESCRIPTOR SecurityDescriptor )
2436 {
2437     return set_ntstatus (NtSetSecurityObject (Handle, SecurityInformation, SecurityDescriptor));
2438 }
2439
2440
2441 /******************************************************************************
2442  *  AddAuditAccessAce [ADVAPI32.@]
2443  */
2444 BOOL WINAPI AddAuditAccessAce(
2445     IN OUT PACL pAcl, 
2446     IN DWORD dwAceRevision, 
2447     IN DWORD dwAccessMask, 
2448     IN PSID pSid, 
2449     IN BOOL bAuditSuccess, 
2450     IN BOOL bAuditFailure) 
2451 {
2452     return set_ntstatus( RtlAddAuditAccessAce(pAcl, dwAceRevision, dwAccessMask, pSid, 
2453                                               bAuditSuccess, bAuditFailure) ); 
2454 }
2455
2456 /******************************************************************************
2457  *  AddAuditAccessAce [ADVAPI32.@]
2458  */
2459 BOOL WINAPI AddAuditAccessAceEx(
2460     IN OUT PACL pAcl,
2461     IN DWORD dwAceRevision,
2462     IN DWORD dwAceFlags,
2463     IN DWORD dwAccessMask,
2464     IN PSID pSid,
2465     IN BOOL bAuditSuccess,
2466     IN BOOL bAuditFailure)
2467 {
2468     return set_ntstatus( RtlAddAuditAccessAceEx(pAcl, dwAceRevision, dwAceFlags, dwAccessMask, pSid,
2469                                               bAuditSuccess, bAuditFailure) );
2470 }
2471
2472 /******************************************************************************
2473  * LookupAccountNameA [ADVAPI32.@]
2474  */
2475 BOOL WINAPI
2476 LookupAccountNameA(
2477         IN LPCSTR system,
2478         IN LPCSTR account,
2479         OUT PSID sid,
2480         OUT LPDWORD cbSid,
2481         LPSTR ReferencedDomainName,
2482         IN OUT LPDWORD cbReferencedDomainName,
2483         OUT PSID_NAME_USE name_use )
2484 {
2485     BOOL ret;
2486     UNICODE_STRING lpSystemW;
2487     UNICODE_STRING lpAccountW;
2488     LPWSTR lpReferencedDomainNameW = NULL;
2489
2490     RtlCreateUnicodeStringFromAsciiz(&lpSystemW, system);
2491     RtlCreateUnicodeStringFromAsciiz(&lpAccountW, account);
2492
2493     if (ReferencedDomainName)
2494         lpReferencedDomainNameW = HeapAlloc(GetProcessHeap(), 0, *cbReferencedDomainName * sizeof(WCHAR));
2495
2496     ret = LookupAccountNameW(lpSystemW.Buffer, lpAccountW.Buffer, sid, cbSid, lpReferencedDomainNameW,
2497         cbReferencedDomainName, name_use);
2498
2499     if (ret && lpReferencedDomainNameW)
2500     {
2501         WideCharToMultiByte(CP_ACP, 0, lpReferencedDomainNameW, *cbReferencedDomainName,
2502             ReferencedDomainName, *cbReferencedDomainName, NULL, NULL);
2503     }
2504
2505     RtlFreeUnicodeString(&lpSystemW);
2506     RtlFreeUnicodeString(&lpAccountW);
2507     HeapFree(GetProcessHeap(), 0, lpReferencedDomainNameW);
2508
2509     return ret;
2510 }
2511
2512 /******************************************************************************
2513  * LookupAccountNameW [ADVAPI32.@]
2514  */
2515 BOOL WINAPI LookupAccountNameW( LPCWSTR lpSystemName, LPCWSTR lpAccountName, PSID Sid,
2516                                 LPDWORD cbSid, LPWSTR ReferencedDomainName,
2517                                 LPDWORD cchReferencedDomainName, PSID_NAME_USE peUse )
2518 {
2519     /* Default implementation: Always return a default SID */
2520     SID_IDENTIFIER_AUTHORITY identifierAuthority = {SECURITY_NT_AUTHORITY};
2521     BOOL ret;
2522     PSID pSid;
2523     static const WCHAR dm[] = {'D','O','M','A','I','N',0};
2524     unsigned int i;
2525
2526     FIXME("%s %s %p %p %p %p %p - stub\n", debugstr_w(lpSystemName), debugstr_w(lpAccountName),
2527           Sid, cbSid, ReferencedDomainName, cchReferencedDomainName, peUse);
2528
2529     for (i = 0; i < (sizeof(ACCOUNT_SIDS) / sizeof(ACCOUNT_SIDS[0])); i++)
2530     {
2531         if (!strcmpW(lpAccountName, ACCOUNT_SIDS[i].account))
2532         {
2533             if (*cchReferencedDomainName)
2534                 *ReferencedDomainName = '\0';
2535             *cchReferencedDomainName = 0;
2536             *peUse = SidTypeWellKnownGroup;
2537             return CreateWellKnownSid(ACCOUNT_SIDS[i].type, NULL, Sid, cbSid);
2538         }
2539     }
2540
2541     ret = AllocateAndInitializeSid(&identifierAuthority,
2542         2,
2543         SECURITY_BUILTIN_DOMAIN_RID,
2544         DOMAIN_ALIAS_RID_ADMINS,
2545         0, 0, 0, 0, 0, 0,
2546         &pSid);
2547
2548     if (!ret)
2549        return FALSE;
2550
2551     if (!RtlValidSid(pSid))
2552     {
2553        FreeSid(pSid);
2554        return FALSE;
2555     }
2556
2557     if (Sid != NULL && (*cbSid >= GetLengthSid(pSid)))
2558        CopySid(*cbSid, Sid, pSid);
2559     if (*cbSid < GetLengthSid(pSid))
2560     {
2561        SetLastError(ERROR_INSUFFICIENT_BUFFER);
2562        ret = FALSE;
2563     }
2564     *cbSid = GetLengthSid(pSid);
2565     
2566     if (ReferencedDomainName != NULL && (*cchReferencedDomainName > strlenW(dm)))
2567       strcpyW(ReferencedDomainName, dm);
2568
2569     if (*cchReferencedDomainName <= strlenW(dm))
2570     {
2571        SetLastError(ERROR_INSUFFICIENT_BUFFER);
2572        ret = FALSE;
2573     }
2574
2575     *cchReferencedDomainName = strlenW(dm)+1;
2576
2577     FreeSid(pSid);
2578
2579     return ret;
2580 }
2581
2582 /******************************************************************************
2583  * PrivilegeCheck [ADVAPI32.@]
2584  */
2585 BOOL WINAPI PrivilegeCheck( HANDLE ClientToken, PPRIVILEGE_SET RequiredPrivileges, LPBOOL pfResult)
2586 {
2587     BOOL ret;
2588     BOOLEAN Result;
2589
2590     TRACE("%p %p %p\n", ClientToken, RequiredPrivileges, pfResult);
2591
2592     ret = set_ntstatus (NtPrivilegeCheck (ClientToken, RequiredPrivileges, &Result));
2593     if (ret)
2594         *pfResult = Result;
2595     return ret;
2596 }
2597
2598 /******************************************************************************
2599  * AccessCheckAndAuditAlarmA [ADVAPI32.@]
2600  */
2601 BOOL WINAPI AccessCheckAndAuditAlarmA(LPCSTR Subsystem, LPVOID HandleId, LPSTR ObjectTypeName,
2602   LPSTR ObjectName, PSECURITY_DESCRIPTOR SecurityDescriptor, DWORD DesiredAccess,
2603   PGENERIC_MAPPING GenericMapping, BOOL ObjectCreation, LPDWORD GrantedAccess,
2604   LPBOOL AccessStatus, LPBOOL pfGenerateOnClose)
2605 {
2606         FIXME("stub (%s,%p,%s,%s,%p,%08x,%p,%x,%p,%p,%p)\n", debugstr_a(Subsystem),
2607                 HandleId, debugstr_a(ObjectTypeName), debugstr_a(ObjectName),
2608                 SecurityDescriptor, DesiredAccess, GenericMapping,
2609                 ObjectCreation, GrantedAccess, AccessStatus, pfGenerateOnClose);
2610         return TRUE;
2611 }
2612
2613 /******************************************************************************
2614  * AccessCheckAndAuditAlarmW [ADVAPI32.@]
2615  */
2616 BOOL WINAPI AccessCheckAndAuditAlarmW(LPCWSTR Subsystem, LPVOID HandleId, LPWSTR ObjectTypeName,
2617   LPWSTR ObjectName, PSECURITY_DESCRIPTOR SecurityDescriptor, DWORD DesiredAccess,
2618   PGENERIC_MAPPING GenericMapping, BOOL ObjectCreation, LPDWORD GrantedAccess,
2619   LPBOOL AccessStatus, LPBOOL pfGenerateOnClose)
2620 {
2621         FIXME("stub (%s,%p,%s,%s,%p,%08x,%p,%x,%p,%p,%p)\n", debugstr_w(Subsystem),
2622                 HandleId, debugstr_w(ObjectTypeName), debugstr_w(ObjectName),
2623                 SecurityDescriptor, DesiredAccess, GenericMapping,
2624                 ObjectCreation, GrantedAccess, AccessStatus, pfGenerateOnClose);
2625         return TRUE;
2626 }
2627
2628 BOOL WINAPI ObjectCloseAuditAlarmA(LPCSTR SubsystemName, LPVOID HandleId, BOOL GenerateOnClose)
2629 {
2630     FIXME("stub (%s,%p,%x)\n", debugstr_a(SubsystemName), HandleId, GenerateOnClose);
2631
2632     return TRUE;
2633 }
2634
2635 BOOL WINAPI ObjectCloseAuditAlarmW(LPCWSTR SubsystemName, LPVOID HandleId, BOOL GenerateOnClose)
2636 {
2637     FIXME("stub (%s,%p,%x)\n", debugstr_w(SubsystemName), HandleId, GenerateOnClose);
2638
2639     return TRUE;
2640 }
2641
2642 BOOL WINAPI ObjectDeleteAuditAlarmW(LPCWSTR SubsystemName, LPVOID HandleId, BOOL GenerateOnClose)
2643 {
2644     FIXME("stub (%s,%p,%x)\n", debugstr_w(SubsystemName), HandleId, GenerateOnClose);
2645
2646     return TRUE;
2647 }
2648
2649 BOOL WINAPI ObjectOpenAuditAlarmA(LPCSTR SubsystemName, LPVOID HandleId, LPSTR ObjectTypeName,
2650   LPSTR ObjectName, PSECURITY_DESCRIPTOR pSecurityDescriptor, HANDLE ClientToken, DWORD DesiredAccess,
2651   DWORD GrantedAccess, PPRIVILEGE_SET Privileges, BOOL ObjectCreation, BOOL AccessGranted,
2652   LPBOOL GenerateOnClose)
2653 {
2654         FIXME("stub (%s,%p,%s,%s,%p,%p,0x%08x,0x%08x,%p,%x,%x,%p)\n", debugstr_a(SubsystemName),
2655                 HandleId, debugstr_a(ObjectTypeName), debugstr_a(ObjectName), pSecurityDescriptor,
2656         ClientToken, DesiredAccess, GrantedAccess, Privileges, ObjectCreation, AccessGranted,
2657         GenerateOnClose);
2658
2659     return TRUE;
2660 }
2661
2662 BOOL WINAPI ObjectOpenAuditAlarmW(LPCWSTR SubsystemName, LPVOID HandleId, LPWSTR ObjectTypeName,
2663   LPWSTR ObjectName, PSECURITY_DESCRIPTOR pSecurityDescriptor, HANDLE ClientToken, DWORD DesiredAccess,
2664   DWORD GrantedAccess, PPRIVILEGE_SET Privileges, BOOL ObjectCreation, BOOL AccessGranted,
2665   LPBOOL GenerateOnClose)
2666 {
2667     FIXME("stub (%s,%p,%s,%s,%p,%p,0x%08x,0x%08x,%p,%x,%x,%p)\n", debugstr_w(SubsystemName),
2668         HandleId, debugstr_w(ObjectTypeName), debugstr_w(ObjectName), pSecurityDescriptor,
2669         ClientToken, DesiredAccess, GrantedAccess, Privileges, ObjectCreation, AccessGranted,
2670         GenerateOnClose);
2671
2672     return TRUE;
2673 }
2674
2675 BOOL WINAPI ObjectPrivilegeAuditAlarmA( LPCSTR SubsystemName, LPVOID HandleId, HANDLE ClientToken,
2676   DWORD DesiredAccess, PPRIVILEGE_SET Privileges, BOOL AccessGranted)
2677 {
2678     FIXME("stub (%s,%p,%p,0x%08x,%p,%x)\n", debugstr_a(SubsystemName), HandleId, ClientToken,
2679           DesiredAccess, Privileges, AccessGranted);
2680
2681     return TRUE;
2682 }
2683
2684 BOOL WINAPI ObjectPrivilegeAuditAlarmW( LPCWSTR SubsystemName, LPVOID HandleId, HANDLE ClientToken,
2685   DWORD DesiredAccess, PPRIVILEGE_SET Privileges, BOOL AccessGranted)
2686 {
2687     FIXME("stub (%s,%p,%p,0x%08x,%p,%x)\n", debugstr_w(SubsystemName), HandleId, ClientToken,
2688           DesiredAccess, Privileges, AccessGranted);
2689
2690     return TRUE;
2691 }
2692
2693 BOOL WINAPI PrivilegedServiceAuditAlarmA( LPCSTR SubsystemName, LPCSTR ServiceName, HANDLE ClientToken,
2694                                    PPRIVILEGE_SET Privileges, BOOL AccessGranted)
2695 {
2696     FIXME("stub (%s,%s,%p,%p,%x)\n", debugstr_a(SubsystemName), debugstr_a(ServiceName),
2697           ClientToken, Privileges, AccessGranted);
2698
2699     return TRUE;
2700 }
2701
2702 BOOL WINAPI PrivilegedServiceAuditAlarmW( LPCWSTR SubsystemName, LPCWSTR ServiceName, HANDLE ClientToken,
2703                                    PPRIVILEGE_SET Privileges, BOOL AccessGranted)
2704 {
2705     FIXME("stub %s,%s,%p,%p,%x)\n", debugstr_w(SubsystemName), debugstr_w(ServiceName),
2706           ClientToken, Privileges, AccessGranted);
2707
2708     return TRUE;
2709 }
2710
2711 /******************************************************************************
2712  * GetSecurityInfo [ADVAPI32.@]
2713  */
2714 DWORD WINAPI GetSecurityInfo(
2715     HANDLE hObject, SE_OBJECT_TYPE ObjectType,
2716     SECURITY_INFORMATION SecurityInfo, PSID *ppsidOwner,
2717     PSID *ppsidGroup, PACL *ppDacl, PACL *ppSacl,
2718     PSECURITY_DESCRIPTOR *ppSecurityDescriptor
2719 )
2720 {
2721   FIXME("stub!\n");
2722   return ERROR_BAD_PROVIDER;
2723 }
2724
2725 /******************************************************************************
2726  * GetSecurityInfoExW [ADVAPI32.@]
2727  */
2728 DWORD WINAPI GetSecurityInfoExW(
2729         HANDLE hObject, SE_OBJECT_TYPE ObjectType, 
2730         SECURITY_INFORMATION SecurityInfo, LPCWSTR lpProvider,
2731         LPCWSTR lpProperty, PACTRL_ACCESSW *ppAccessList, 
2732         PACTRL_AUDITW *ppAuditList, LPWSTR *lppOwner, LPWSTR *lppGroup
2733 )
2734 {
2735   FIXME("stub!\n");
2736   return ERROR_BAD_PROVIDER; 
2737 }
2738
2739 /******************************************************************************
2740  * BuildExplicitAccessWithNameA [ADVAPI32.@]
2741  */
2742 VOID WINAPI BuildExplicitAccessWithNameA( PEXPLICIT_ACCESSA pExplicitAccess,
2743                                           LPSTR pTrusteeName, DWORD AccessPermissions,
2744                                           ACCESS_MODE AccessMode, DWORD Inheritance )
2745 {
2746     TRACE("%p %s 0x%08x 0x%08x 0x%08x\n", pExplicitAccess, debugstr_a(pTrusteeName),
2747           AccessPermissions, AccessMode, Inheritance);
2748
2749     pExplicitAccess->grfAccessPermissions = AccessPermissions;
2750     pExplicitAccess->grfAccessMode = AccessMode;
2751     pExplicitAccess->grfInheritance = Inheritance;
2752
2753     pExplicitAccess->Trustee.pMultipleTrustee = NULL;
2754     pExplicitAccess->Trustee.MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE;
2755     pExplicitAccess->Trustee.TrusteeForm = TRUSTEE_IS_NAME;
2756     pExplicitAccess->Trustee.TrusteeType = TRUSTEE_IS_UNKNOWN;
2757     pExplicitAccess->Trustee.ptstrName = pTrusteeName;
2758 }
2759
2760 /******************************************************************************
2761  * BuildExplicitAccessWithNameW [ADVAPI32.@]
2762  */
2763 VOID WINAPI BuildExplicitAccessWithNameW( PEXPLICIT_ACCESSW pExplicitAccess,
2764                                           LPWSTR pTrusteeName, DWORD AccessPermissions,
2765                                           ACCESS_MODE AccessMode, DWORD Inheritance )
2766 {
2767     TRACE("%p %s 0x%08x 0x%08x 0x%08x\n", pExplicitAccess, debugstr_w(pTrusteeName),
2768           AccessPermissions, AccessMode, Inheritance);
2769
2770     pExplicitAccess->grfAccessPermissions = AccessPermissions;
2771     pExplicitAccess->grfAccessMode = AccessMode;
2772     pExplicitAccess->grfInheritance = Inheritance;
2773
2774     pExplicitAccess->Trustee.pMultipleTrustee = NULL;
2775     pExplicitAccess->Trustee.MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE;
2776     pExplicitAccess->Trustee.TrusteeForm = TRUSTEE_IS_NAME;
2777     pExplicitAccess->Trustee.TrusteeType = TRUSTEE_IS_UNKNOWN;
2778     pExplicitAccess->Trustee.ptstrName = pTrusteeName;
2779 }
2780
2781 /******************************************************************************
2782  * BuildTrusteeWithObjectsAndNameA [ADVAPI32.@]
2783  */
2784 VOID WINAPI BuildTrusteeWithObjectsAndNameA( PTRUSTEEA pTrustee, POBJECTS_AND_NAME_A pObjName,
2785                                              SE_OBJECT_TYPE ObjectType, LPSTR ObjectTypeName,
2786                                              LPSTR InheritedObjectTypeName, LPSTR Name )
2787 {
2788     DWORD ObjectsPresent = 0;
2789
2790     TRACE("%p %p 0x%08x %p %p %s\n", pTrustee, pObjName,
2791           ObjectType, ObjectTypeName, InheritedObjectTypeName, debugstr_a(Name));
2792
2793     /* Fill the OBJECTS_AND_NAME structure */
2794     pObjName->ObjectType = ObjectType;
2795     if (ObjectTypeName != NULL)
2796     {
2797         ObjectsPresent |= ACE_OBJECT_TYPE_PRESENT;
2798     }
2799
2800     pObjName->InheritedObjectTypeName = InheritedObjectTypeName;
2801     if (InheritedObjectTypeName != NULL)
2802     {
2803         ObjectsPresent |= ACE_INHERITED_OBJECT_TYPE_PRESENT;
2804     }
2805
2806     pObjName->ObjectsPresent = ObjectsPresent;
2807     pObjName->ptstrName = Name;
2808
2809     /* Fill the TRUSTEE structure */
2810     pTrustee->pMultipleTrustee = NULL;
2811     pTrustee->MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE;
2812     pTrustee->TrusteeForm = TRUSTEE_IS_OBJECTS_AND_NAME;
2813     pTrustee->TrusteeType = TRUSTEE_IS_UNKNOWN;
2814     pTrustee->ptstrName = (LPSTR)pObjName;
2815 }
2816
2817 /******************************************************************************
2818  * BuildTrusteeWithObjectsAndNameW [ADVAPI32.@]
2819  */
2820 VOID WINAPI BuildTrusteeWithObjectsAndNameW( PTRUSTEEW pTrustee, POBJECTS_AND_NAME_W pObjName,
2821                                              SE_OBJECT_TYPE ObjectType, LPWSTR ObjectTypeName,
2822                                              LPWSTR InheritedObjectTypeName, LPWSTR Name )
2823 {
2824     DWORD ObjectsPresent = 0;
2825
2826     TRACE("%p %p 0x%08x %p %p %s\n", pTrustee, pObjName,
2827           ObjectType, ObjectTypeName, InheritedObjectTypeName, debugstr_w(Name));
2828
2829     /* Fill the OBJECTS_AND_NAME structure */
2830     pObjName->ObjectType = ObjectType;
2831     if (ObjectTypeName != NULL)
2832     {
2833         ObjectsPresent |= ACE_OBJECT_TYPE_PRESENT;
2834     }
2835
2836     pObjName->InheritedObjectTypeName = InheritedObjectTypeName;
2837     if (InheritedObjectTypeName != NULL)
2838     {
2839         ObjectsPresent |= ACE_INHERITED_OBJECT_TYPE_PRESENT;
2840     }
2841
2842     pObjName->ObjectsPresent = ObjectsPresent;
2843     pObjName->ptstrName = Name;
2844
2845     /* Fill the TRUSTEE structure */
2846     pTrustee->pMultipleTrustee = NULL;
2847     pTrustee->MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE;
2848     pTrustee->TrusteeForm = TRUSTEE_IS_OBJECTS_AND_NAME;
2849     pTrustee->TrusteeType = TRUSTEE_IS_UNKNOWN;
2850     pTrustee->ptstrName = (LPWSTR)pObjName;
2851 }
2852
2853 /******************************************************************************
2854  * BuildTrusteeWithObjectsAndSidA [ADVAPI32.@]
2855  */
2856 VOID WINAPI BuildTrusteeWithObjectsAndSidA( PTRUSTEEA pTrustee, POBJECTS_AND_SID pObjSid,
2857                                             GUID* pObjectGuid, GUID* pInheritedObjectGuid, PSID pSid )
2858 {
2859     DWORD ObjectsPresent = 0;
2860
2861     TRACE("%p %p %p %p %p\n", pTrustee, pObjSid, pObjectGuid, pInheritedObjectGuid, pSid);
2862
2863     /* Fill the OBJECTS_AND_SID structure */
2864     if (pObjectGuid != NULL)
2865     {
2866         pObjSid->ObjectTypeGuid = *pObjectGuid;
2867         ObjectsPresent |= ACE_OBJECT_TYPE_PRESENT;
2868     }
2869     else
2870     {
2871         ZeroMemory(&pObjSid->ObjectTypeGuid,
2872                    sizeof(GUID));
2873     }
2874
2875     if (pInheritedObjectGuid != NULL)
2876     {
2877         pObjSid->InheritedObjectTypeGuid = *pInheritedObjectGuid;
2878         ObjectsPresent |= ACE_INHERITED_OBJECT_TYPE_PRESENT;
2879     }
2880     else
2881     {
2882         ZeroMemory(&pObjSid->InheritedObjectTypeGuid,
2883                    sizeof(GUID));
2884     }
2885
2886     pObjSid->ObjectsPresent = ObjectsPresent;
2887     pObjSid->pSid = pSid;
2888
2889     /* Fill the TRUSTEE structure */
2890     pTrustee->pMultipleTrustee = NULL;
2891     pTrustee->MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE;
2892     pTrustee->TrusteeForm = TRUSTEE_IS_OBJECTS_AND_SID;
2893     pTrustee->TrusteeType = TRUSTEE_IS_UNKNOWN;
2894     pTrustee->ptstrName = (LPSTR) pObjSid;
2895 }
2896
2897 /******************************************************************************
2898  * BuildTrusteeWithObjectsAndSidW [ADVAPI32.@]
2899  */
2900 VOID WINAPI BuildTrusteeWithObjectsAndSidW( PTRUSTEEW pTrustee, POBJECTS_AND_SID pObjSid,
2901                                             GUID* pObjectGuid, GUID* pInheritedObjectGuid, PSID pSid )
2902 {
2903     DWORD ObjectsPresent = 0;
2904
2905     TRACE("%p %p %p %p %p\n", pTrustee, pObjSid, pObjectGuid, pInheritedObjectGuid, pSid);
2906
2907     /* Fill the OBJECTS_AND_SID structure */
2908     if (pObjectGuid != NULL)
2909     {
2910         pObjSid->ObjectTypeGuid = *pObjectGuid;
2911         ObjectsPresent |= ACE_OBJECT_TYPE_PRESENT;
2912     }
2913     else
2914     {
2915         ZeroMemory(&pObjSid->ObjectTypeGuid,
2916                    sizeof(GUID));
2917     }
2918
2919     if (pInheritedObjectGuid != NULL)
2920     {
2921         pObjSid->InheritedObjectTypeGuid = *pInheritedObjectGuid;
2922         ObjectsPresent |= ACE_INHERITED_OBJECT_TYPE_PRESENT;
2923     }
2924     else
2925     {
2926         ZeroMemory(&pObjSid->InheritedObjectTypeGuid,
2927                    sizeof(GUID));
2928     }
2929
2930     pObjSid->ObjectsPresent = ObjectsPresent;
2931     pObjSid->pSid = pSid;
2932
2933     /* Fill the TRUSTEE structure */
2934     pTrustee->pMultipleTrustee = NULL;
2935     pTrustee->MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE;
2936     pTrustee->TrusteeForm = TRUSTEE_IS_OBJECTS_AND_SID;
2937     pTrustee->TrusteeType = TRUSTEE_IS_UNKNOWN;
2938     pTrustee->ptstrName = (LPWSTR) pObjSid;
2939 }
2940
2941 /******************************************************************************
2942  * BuildTrusteeWithSidA [ADVAPI32.@]
2943  */
2944 VOID WINAPI BuildTrusteeWithSidA(PTRUSTEEA pTrustee, PSID pSid)
2945 {
2946     TRACE("%p %p\n", pTrustee, pSid);
2947
2948     pTrustee->pMultipleTrustee = NULL;
2949     pTrustee->MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE;
2950     pTrustee->TrusteeForm = TRUSTEE_IS_SID;
2951     pTrustee->TrusteeType = TRUSTEE_IS_UNKNOWN;
2952     pTrustee->ptstrName = (LPSTR) pSid;
2953 }
2954
2955 /******************************************************************************
2956  * BuildTrusteeWithSidW [ADVAPI32.@]
2957  */
2958 VOID WINAPI BuildTrusteeWithSidW(PTRUSTEEW pTrustee, PSID pSid)
2959 {
2960     TRACE("%p %p\n", pTrustee, pSid);
2961
2962     pTrustee->pMultipleTrustee = NULL;
2963     pTrustee->MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE;
2964     pTrustee->TrusteeForm = TRUSTEE_IS_SID;
2965     pTrustee->TrusteeType = TRUSTEE_IS_UNKNOWN;
2966     pTrustee->ptstrName = (LPWSTR) pSid;
2967 }
2968
2969 /******************************************************************************
2970  * BuildTrusteeWithNameA [ADVAPI32.@]
2971  */
2972 VOID WINAPI BuildTrusteeWithNameA(PTRUSTEEA pTrustee, LPSTR name)
2973 {
2974     TRACE("%p %s\n", pTrustee, debugstr_a(name) );
2975
2976     pTrustee->pMultipleTrustee = NULL;
2977     pTrustee->MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE;
2978     pTrustee->TrusteeForm = TRUSTEE_IS_NAME;
2979     pTrustee->TrusteeType = TRUSTEE_IS_UNKNOWN;
2980     pTrustee->ptstrName = name;
2981 }
2982
2983 /******************************************************************************
2984  * BuildTrusteeWithNameW [ADVAPI32.@]
2985  */
2986 VOID WINAPI BuildTrusteeWithNameW(PTRUSTEEW pTrustee, LPWSTR name)
2987 {
2988     TRACE("%p %s\n", pTrustee, debugstr_w(name) );
2989
2990     pTrustee->pMultipleTrustee = NULL;
2991     pTrustee->MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE;
2992     pTrustee->TrusteeForm = TRUSTEE_IS_NAME;
2993     pTrustee->TrusteeType = TRUSTEE_IS_UNKNOWN;
2994     pTrustee->ptstrName = name;
2995 }
2996
2997 /****************************************************************************** 
2998  * GetTrusteeFormA [ADVAPI32.@] 
2999  */ 
3000 TRUSTEE_FORM WINAPI GetTrusteeFormA(PTRUSTEEA pTrustee) 
3001 {  
3002     TRACE("(%p)\n", pTrustee); 
3003   
3004     if (!pTrustee) 
3005         return TRUSTEE_BAD_FORM; 
3006   
3007     return pTrustee->TrusteeForm; 
3008 }  
3009   
3010 /****************************************************************************** 
3011  * GetTrusteeFormW [ADVAPI32.@] 
3012  */ 
3013 TRUSTEE_FORM WINAPI GetTrusteeFormW(PTRUSTEEW pTrustee) 
3014 {  
3015     TRACE("(%p)\n", pTrustee); 
3016   
3017     if (!pTrustee) 
3018         return TRUSTEE_BAD_FORM; 
3019   
3020     return pTrustee->TrusteeForm; 
3021 }  
3022   
3023 /****************************************************************************** 
3024  * GetTrusteeNameA [ADVAPI32.@] 
3025  */ 
3026 LPSTR WINAPI GetTrusteeNameA(PTRUSTEEA pTrustee) 
3027 {  
3028     TRACE("(%p)\n", pTrustee); 
3029   
3030     if (!pTrustee) 
3031         return NULL; 
3032   
3033     return pTrustee->ptstrName; 
3034 }  
3035   
3036 /****************************************************************************** 
3037  * GetTrusteeNameW [ADVAPI32.@] 
3038  */ 
3039 LPWSTR WINAPI GetTrusteeNameW(PTRUSTEEW pTrustee) 
3040 {  
3041     TRACE("(%p)\n", pTrustee); 
3042   
3043     if (!pTrustee) 
3044         return NULL; 
3045   
3046     return pTrustee->ptstrName; 
3047 }  
3048   
3049 /****************************************************************************** 
3050  * GetTrusteeTypeA [ADVAPI32.@] 
3051  */ 
3052 TRUSTEE_TYPE WINAPI GetTrusteeTypeA(PTRUSTEEA pTrustee) 
3053 {  
3054     TRACE("(%p)\n", pTrustee); 
3055   
3056     if (!pTrustee) 
3057         return TRUSTEE_IS_UNKNOWN; 
3058   
3059     return pTrustee->TrusteeType; 
3060 }  
3061   
3062 /****************************************************************************** 
3063  * GetTrusteeTypeW [ADVAPI32.@] 
3064  */ 
3065 TRUSTEE_TYPE WINAPI GetTrusteeTypeW(PTRUSTEEW pTrustee) 
3066 {  
3067     TRACE("(%p)\n", pTrustee); 
3068   
3069     if (!pTrustee) 
3070         return TRUSTEE_IS_UNKNOWN; 
3071   
3072     return pTrustee->TrusteeType; 
3073
3074  
3075 BOOL WINAPI SetAclInformation( PACL pAcl, LPVOID pAclInformation,
3076                                DWORD nAclInformationLength,
3077                                ACL_INFORMATION_CLASS dwAclInformationClass )
3078 {
3079     FIXME("%p %p 0x%08x 0x%08x - stub\n", pAcl, pAclInformation,
3080           nAclInformationLength, dwAclInformationClass);
3081
3082     return TRUE;
3083 }
3084
3085 /******************************************************************************
3086  * SetEntriesInAclA [ADVAPI32.@]
3087  */
3088 DWORD WINAPI SetEntriesInAclA( ULONG count, PEXPLICIT_ACCESSA pEntries,
3089                                PACL OldAcl, PACL* NewAcl )
3090 {
3091     FIXME("%d %p %p %p\n",count,pEntries,OldAcl,NewAcl);
3092     *NewAcl = NULL;
3093     return ERROR_SUCCESS;
3094 }
3095
3096 /******************************************************************************
3097  * SetEntriesInAclW [ADVAPI32.@]
3098  */
3099 DWORD WINAPI SetEntriesInAclW( ULONG count, PEXPLICIT_ACCESSW pEntries,
3100                                PACL OldAcl, PACL* NewAcl )
3101 {
3102     ULONG i;
3103     PSID *ppsid;
3104     DWORD ret = ERROR_SUCCESS;
3105     DWORD acl_size = sizeof(ACL);
3106     NTSTATUS status;
3107
3108     TRACE("%d %p %p %p\n", count, pEntries, OldAcl, NewAcl);
3109
3110     *NewAcl = NULL;
3111
3112     if (!count && !OldAcl)
3113         return ERROR_SUCCESS;
3114
3115     /* allocate array of maximum sized sids allowed */
3116     ppsid = HeapAlloc(GetProcessHeap(), 0, count * (sizeof(SID *) + FIELD_OFFSET(SID, SubAuthority[SID_MAX_SUB_AUTHORITIES])));
3117     if (!ppsid)
3118         return ERROR_OUTOFMEMORY;
3119
3120     for (i = 0; i < count; i++)
3121     {
3122         ppsid[i] = (char *)&ppsid[count] + i * FIELD_OFFSET(SID, SubAuthority[SID_MAX_SUB_AUTHORITIES]);
3123
3124         TRACE("[%d]:\n\tgrfAccessPermissions = 0x%x\n\tgrfAccessMode = %d\n\tgrfInheritance = 0x%x\n\t"
3125               "Trustee.pMultipleTrustee = %p\n\tMultipleTrusteeOperation = %d\n\tTrusteeForm = %d\n\t"
3126               "Trustee.TrusteeType = %d\n\tptstrName = %p\n", i,
3127               pEntries[i].grfAccessPermissions, pEntries[i].grfAccessMode, pEntries[i].grfInheritance,
3128               pEntries[i].Trustee.pMultipleTrustee, pEntries[i].Trustee.MultipleTrusteeOperation,
3129               pEntries[i].Trustee.TrusteeForm, pEntries[i].Trustee.TrusteeType,
3130               pEntries[i].Trustee.ptstrName);
3131
3132         if (pEntries[i].Trustee.MultipleTrusteeOperation != NO_MULTIPLE_TRUSTEE)
3133         {
3134             WARN("bad multiple trustee operation %d for trustee %d\n", pEntries[i].Trustee.MultipleTrusteeOperation, i);
3135             ret = ERROR_INVALID_PARAMETER;
3136             goto exit;
3137         }
3138
3139         switch (pEntries[i].Trustee.TrusteeForm)
3140         {
3141         case TRUSTEE_IS_SID:
3142             if (!CopySid(FIELD_OFFSET(SID, SubAuthority[SID_MAX_SUB_AUTHORITIES]),
3143                          ppsid[i], pEntries[i].Trustee.ptstrName))
3144             {
3145                 WARN("bad sid %p for trustee %d\n", pEntries[i].Trustee.ptstrName, i);
3146                 ret = ERROR_INVALID_PARAMETER;
3147                 goto exit;
3148             }
3149             break;
3150         case TRUSTEE_IS_NAME:
3151         {
3152             DWORD sid_size = FIELD_OFFSET(SID, SubAuthority[SID_MAX_SUB_AUTHORITIES]);
3153             DWORD domain_size = 0;
3154             SID_NAME_USE use;
3155             if (!LookupAccountNameW(NULL, pEntries[i].Trustee.ptstrName, ppsid[i], &sid_size, NULL, &domain_size, &use))
3156             {
3157                 WARN("bad user name %s for trustee %d\n", debugstr_w(pEntries[i].Trustee.ptstrName), i);
3158                 ret = ERROR_INVALID_PARAMETER;
3159                 goto exit;
3160             }
3161             break;
3162         }
3163         case TRUSTEE_IS_OBJECTS_AND_SID:
3164             FIXME("TRUSTEE_IS_OBJECTS_AND_SID unimplemented\n");
3165             break;
3166         case TRUSTEE_IS_OBJECTS_AND_NAME:
3167             FIXME("TRUSTEE_IS_OBJECTS_AND_NAME unimplemented\n");
3168             break;
3169         default:
3170             WARN("bad trustee form %d for trustee %d\n", pEntries[i].Trustee.TrusteeForm, i);
3171             ret = ERROR_INVALID_PARAMETER;
3172             goto exit;
3173         }
3174
3175         /* Note: we overestimate the ACL size here as a tradeoff between
3176          * instructions (simplicity) and memory */
3177         switch (pEntries[i].grfAccessMode)
3178         {
3179         case GRANT_ACCESS:
3180         case SET_ACCESS:
3181             acl_size += FIELD_OFFSET(ACCESS_ALLOWED_ACE, SidStart) + GetLengthSid(ppsid[i]);
3182             break;
3183         case DENY_ACCESS:
3184             acl_size += FIELD_OFFSET(ACCESS_DENIED_ACE, SidStart) + GetLengthSid(ppsid[i]);
3185             break;
3186         case SET_AUDIT_SUCCESS:
3187         case SET_AUDIT_FAILURE:
3188             acl_size += FIELD_OFFSET(SYSTEM_AUDIT_ACE, SidStart) + GetLengthSid(ppsid[i]);
3189             break;
3190         case REVOKE_ACCESS:
3191             break;
3192         default:
3193             WARN("bad access mode %d for trustee %d\n", pEntries[i].grfAccessMode, i);
3194             ret = ERROR_INVALID_PARAMETER;
3195             goto exit;
3196         }
3197     }
3198
3199     if (OldAcl)
3200     {
3201         ACL_SIZE_INFORMATION size_info;
3202
3203         status = RtlQueryInformationAcl(OldAcl, &size_info, sizeof(size_info), AclSizeInformation);
3204         if (status != STATUS_SUCCESS)
3205         {
3206             ret = RtlNtStatusToDosError(status);
3207             goto exit;
3208         }
3209         acl_size += size_info.AclBytesInUse - sizeof(ACL);
3210     }
3211
3212     *NewAcl = LocalAlloc(0, acl_size);
3213     if (!*NewAcl)
3214     {
3215         ret = ERROR_OUTOFMEMORY;
3216         goto exit;
3217     }
3218
3219     status = RtlCreateAcl( *NewAcl, acl_size, ACL_REVISION );
3220     if (status != STATUS_SUCCESS)
3221     {
3222         ret = RtlNtStatusToDosError(status);
3223         goto exit;
3224     }
3225
3226     for (i = 0; i < count; i++)
3227     {
3228         switch (pEntries[i].grfAccessMode)
3229         {
3230         case GRANT_ACCESS:
3231             status = RtlAddAccessAllowedAceEx(*NewAcl, ACL_REVISION,
3232                                               pEntries[i].grfInheritance,
3233                                               pEntries[i].grfAccessPermissions,
3234                                               ppsid[i]);
3235             break;
3236         case SET_ACCESS:
3237         {
3238             ULONG j;
3239             BOOL add = TRUE;
3240             if (OldAcl)
3241             {
3242                 for (j = 0; ; j++)
3243                 {
3244                     const ACE_HEADER *existing_ace_header;
3245                     status = RtlGetAce(OldAcl, j, (LPVOID *)&existing_ace_header);
3246                     if (status != STATUS_SUCCESS)
3247                         break;
3248                     if (pEntries[i].grfAccessMode == SET_ACCESS &&
3249                         existing_ace_header->AceType == ACCESS_ALLOWED_ACE_TYPE &&
3250                         EqualSid(ppsid[i], &((ACCESS_ALLOWED_ACE *)existing_ace_header)->SidStart))
3251                     {
3252                         add = FALSE;
3253                         break;
3254                     }
3255                 }
3256             }
3257             if (add)
3258                 status = RtlAddAccessAllowedAceEx(*NewAcl, ACL_REVISION,
3259                                                   pEntries[i].grfInheritance,
3260                                                   pEntries[i].grfAccessPermissions,
3261                                                   ppsid[i]);
3262             break;
3263         }
3264         case DENY_ACCESS:
3265             status = RtlAddAccessDeniedAceEx(*NewAcl, ACL_REVISION,
3266                                              pEntries[i].grfInheritance,
3267                                              pEntries[i].grfAccessPermissions,
3268                                              ppsid[i]);
3269             break;
3270         case SET_AUDIT_SUCCESS:
3271             status = RtlAddAuditAccessAceEx(*NewAcl, ACL_REVISION,
3272                                             pEntries[i].grfInheritance,
3273                                             pEntries[i].grfAccessPermissions,
3274                                             ppsid[i], TRUE, FALSE);
3275             break;
3276         case SET_AUDIT_FAILURE:
3277             status = RtlAddAuditAccessAceEx(*NewAcl, ACL_REVISION,
3278                                             pEntries[i].grfInheritance,
3279                                             pEntries[i].grfAccessPermissions,
3280                                             ppsid[i], FALSE, TRUE);
3281             break;
3282         default:
3283             FIXME("unhandled access mode %d\n", pEntries[i].grfAccessMode);
3284         }
3285     }
3286
3287     if (OldAcl)
3288     {
3289         for (i = 0; ; i++)
3290         {
3291             BOOL add = TRUE;
3292             ULONG j;
3293             const ACE_HEADER *old_ace_header;
3294             status = RtlGetAce(OldAcl, i, (LPVOID *)&old_ace_header);
3295             if (status != STATUS_SUCCESS) break;
3296             for (j = 0; j < count; j++)
3297             {
3298                 if (pEntries[j].grfAccessMode == SET_ACCESS &&
3299                     old_ace_header->AceType == ACCESS_ALLOWED_ACE_TYPE &&
3300                     EqualSid(ppsid[j], &((ACCESS_ALLOWED_ACE *)old_ace_header)->SidStart))
3301                 {
3302                     status = RtlAddAccessAllowedAceEx(*NewAcl, ACL_REVISION, pEntries[j].grfInheritance, pEntries[j].grfAccessPermissions, ppsid[j]);
3303                     add = FALSE;
3304                     break;
3305                 }
3306                 else if (pEntries[j].grfAccessMode == REVOKE_ACCESS)
3307                 {
3308                     switch (old_ace_header->AceType)
3309                     {
3310                     case ACCESS_ALLOWED_ACE_TYPE:
3311                         if (EqualSid(ppsid[j], &((ACCESS_ALLOWED_ACE *)old_ace_header)->SidStart))
3312                             add = FALSE;
3313                         break;
3314                     case ACCESS_DENIED_ACE_TYPE:
3315                         if (EqualSid(ppsid[j], &((ACCESS_DENIED_ACE *)old_ace_header)->SidStart))
3316                             add = FALSE;
3317                         break;
3318                     case SYSTEM_AUDIT_ACE_TYPE:
3319                         if (EqualSid(ppsid[j], &((SYSTEM_AUDIT_ACE *)old_ace_header)->SidStart))
3320                             add = FALSE;
3321                         break;
3322                     case SYSTEM_ALARM_ACE_TYPE:
3323                         if (EqualSid(ppsid[j], &((SYSTEM_ALARM_ACE *)old_ace_header)->SidStart))
3324                             add = FALSE;
3325                         break;
3326                     default:
3327                         FIXME("unhandled ace type %d\n", old_ace_header->AceType);
3328                     }
3329
3330                     if (!add)
3331                         break;
3332                 }
3333             }
3334             if (add)
3335                 status = RtlAddAce(*NewAcl, ACL_REVISION, 1, (PACE_HEADER)old_ace_header, old_ace_header->AceSize);
3336             if (status != STATUS_SUCCESS)
3337             {
3338                 WARN("RtlAddAce failed with error 0x%08x\n", status);
3339                 ret = RtlNtStatusToDosError(status);
3340                 break;
3341             }
3342         }
3343     }
3344
3345 exit:
3346     HeapFree(GetProcessHeap(), 0, ppsid);
3347     return ret;
3348 }
3349
3350 /******************************************************************************
3351  * SetNamedSecurityInfoA [ADVAPI32.@]
3352  */
3353 DWORD WINAPI SetNamedSecurityInfoA(LPSTR pObjectName,
3354         SE_OBJECT_TYPE ObjectType, SECURITY_INFORMATION SecurityInfo,
3355         PSID psidOwner, PSID psidGroup, PACL pDacl, PACL pSacl)
3356 {
3357     DWORD len;
3358     LPWSTR wstr = NULL;
3359     DWORD r;
3360
3361     TRACE("%s %d %d %p %p %p %p\n", debugstr_a(pObjectName), ObjectType,
3362            SecurityInfo, psidOwner, psidGroup, pDacl, pSacl);
3363
3364     if( pObjectName )
3365     {
3366         len = MultiByteToWideChar( CP_ACP, 0, pObjectName, -1, NULL, 0 );
3367         wstr = HeapAlloc( GetProcessHeap(), 0, len*sizeof(WCHAR));
3368         MultiByteToWideChar( CP_ACP, 0, pObjectName, -1, wstr, len );
3369     }
3370
3371     r = SetNamedSecurityInfoW( wstr, ObjectType, SecurityInfo, psidOwner,
3372                            psidGroup, pDacl, pSacl );
3373
3374     HeapFree( GetProcessHeap(), 0, wstr );
3375
3376     return r;
3377 }
3378
3379 BOOL WINAPI SetPrivateObjectSecurity( SECURITY_INFORMATION SecurityInformation,
3380     PSECURITY_DESCRIPTOR ModificationDescriptor,
3381     PSECURITY_DESCRIPTOR* ObjectsSecurityDescriptor,
3382     PGENERIC_MAPPING GenericMapping,
3383     HANDLE Token )
3384 {
3385     FIXME("0x%08x %p %p %p %p - stub\n", SecurityInformation, ModificationDescriptor,
3386           ObjectsSecurityDescriptor, GenericMapping, Token);
3387
3388     return TRUE;
3389 }
3390
3391 BOOL WINAPI AreAllAccessesGranted( DWORD GrantedAccess, DWORD DesiredAccess )
3392 {
3393     return RtlAreAllAccessesGranted( GrantedAccess, DesiredAccess );
3394 }
3395
3396 /******************************************************************************
3397  * AreAnyAccessesGranted [ADVAPI32.@]
3398  *
3399  * Determines whether or not any of a set of specified access permissions have
3400  * been granted or not.
3401  *
3402  * PARAMS
3403  *   GrantedAccess [I] The permissions that have been granted.
3404  *   DesiredAccess [I] The permissions that you want to have.
3405  *
3406  * RETURNS
3407  *   Nonzero if any of the permissions have been granted, zero if none of the
3408  *   permissions have been granted.
3409  */
3410
3411 BOOL WINAPI AreAnyAccessesGranted( DWORD GrantedAccess, DWORD DesiredAccess )
3412 {
3413     return RtlAreAnyAccessesGranted( GrantedAccess, DesiredAccess );
3414 }
3415
3416 /******************************************************************************
3417  * SetNamedSecurityInfoW [ADVAPI32.@]
3418  */
3419 DWORD WINAPI SetNamedSecurityInfoW(LPWSTR pObjectName,
3420         SE_OBJECT_TYPE ObjectType, SECURITY_INFORMATION SecurityInfo,
3421         PSID psidOwner, PSID psidGroup, PACL pDacl, PACL pSacl)
3422 {
3423     FIXME("%s %d %d %p %p %p %p\n", debugstr_w(pObjectName), ObjectType,
3424            SecurityInfo, psidOwner, psidGroup, pDacl, pSacl);
3425     return ERROR_SUCCESS;
3426 }
3427
3428 /******************************************************************************
3429  * GetExplicitEntriesFromAclA [ADVAPI32.@]
3430  */
3431 DWORD WINAPI GetExplicitEntriesFromAclA( PACL pacl, PULONG pcCountOfExplicitEntries,
3432         PEXPLICIT_ACCESSA* pListOfExplicitEntries)
3433 {
3434     FIXME("%p %p %p\n",pacl, pcCountOfExplicitEntries, pListOfExplicitEntries);
3435     return ERROR_CALL_NOT_IMPLEMENTED;
3436 }
3437
3438 /******************************************************************************
3439  * GetExplicitEntriesFromAclW [ADVAPI32.@]
3440  */
3441 DWORD WINAPI GetExplicitEntriesFromAclW( PACL pacl, PULONG pcCountOfExplicitEntries,
3442         PEXPLICIT_ACCESSW* pListOfExplicitEntries)
3443 {
3444     FIXME("%p %p %p\n",pacl, pcCountOfExplicitEntries, pListOfExplicitEntries);
3445     return ERROR_CALL_NOT_IMPLEMENTED;
3446 }
3447
3448 /******************************************************************************
3449  * GetAuditedPermissionsFromAclA [ADVAPI32.@]
3450  */
3451 DWORD WINAPI GetAuditedPermissionsFromAclA( PACL pacl, PTRUSTEEA pTrustee, PACCESS_MASK pSuccessfulAuditedRights,
3452         PACCESS_MASK pFailedAuditRights)
3453 {
3454     FIXME("%p %p %p %p\n",pacl, pTrustee, pSuccessfulAuditedRights, pFailedAuditRights);
3455     return ERROR_CALL_NOT_IMPLEMENTED;
3456
3457 }
3458
3459 /******************************************************************************
3460  * GetAuditedPermissionsFromAclW [ADVAPI32.@]
3461  */
3462 DWORD WINAPI GetAuditedPermissionsFromAclW( PACL pacl, PTRUSTEEW pTrustee, PACCESS_MASK pSuccessfulAuditedRights,
3463         PACCESS_MASK pFailedAuditRights)
3464 {
3465     FIXME("%p %p %p %p\n",pacl, pTrustee, pSuccessfulAuditedRights, pFailedAuditRights);
3466     return ERROR_CALL_NOT_IMPLEMENTED;
3467
3468 }
3469
3470 /******************************************************************************
3471  * ParseAclStringFlags
3472  */
3473 static DWORD ParseAclStringFlags(LPCWSTR* StringAcl)
3474 {
3475     DWORD flags = 0;
3476     LPCWSTR szAcl = *StringAcl;
3477
3478     while (*szAcl != '(')
3479     {
3480         if (*szAcl == 'P')
3481         {
3482             flags |= SE_DACL_PROTECTED;
3483         }
3484         else if (*szAcl == 'A')
3485         {
3486             szAcl++;
3487             if (*szAcl == 'R')
3488                 flags |= SE_DACL_AUTO_INHERIT_REQ;
3489             else if (*szAcl == 'I')
3490                 flags |= SE_DACL_AUTO_INHERITED;
3491         }
3492         szAcl++;
3493     }
3494
3495     *StringAcl = szAcl;
3496     return flags;
3497 }
3498
3499 /******************************************************************************
3500  * ParseAceStringType
3501  */
3502 static const ACEFLAG AceType[] =
3503 {
3504     { SDDL_ALARM,          SYSTEM_ALARM_ACE_TYPE },
3505     { SDDL_AUDIT,          SYSTEM_AUDIT_ACE_TYPE },
3506     { SDDL_ACCESS_ALLOWED, ACCESS_ALLOWED_ACE_TYPE },
3507     { SDDL_ACCESS_DENIED,  ACCESS_DENIED_ACE_TYPE },
3508     /*
3509     { SDDL_OBJECT_ACCESS_ALLOWED, ACCESS_ALLOWED_OBJECT_ACE_TYPE },
3510     { SDDL_OBJECT_ACCESS_DENIED,  ACCESS_DENIED_OBJECT_ACE_TYPE },
3511     { SDDL_OBJECT_ALARM,          SYSTEM_ALARM_OBJECT_ACE_TYPE },
3512     { SDDL_OBJECT_AUDIT,          SYSTEM_AUDIT_OBJECT_ACE_TYPE },
3513     */
3514     { NULL, 0 },
3515 };
3516
3517 static BYTE ParseAceStringType(LPCWSTR* StringAcl)
3518 {
3519     UINT len = 0;
3520     LPCWSTR szAcl = *StringAcl;
3521     const ACEFLAG *lpaf = AceType;
3522
3523     while (lpaf->wstr &&
3524         (len = strlenW(lpaf->wstr)) &&
3525         strncmpW(lpaf->wstr, szAcl, len))
3526         lpaf++;
3527
3528     if (!lpaf->wstr)
3529         return 0;
3530
3531     *StringAcl += len;
3532     return lpaf->value;
3533 }
3534
3535
3536 /******************************************************************************
3537  * ParseAceStringFlags
3538  */
3539 static const ACEFLAG AceFlags[] =
3540 {
3541     { SDDL_CONTAINER_INHERIT, CONTAINER_INHERIT_ACE },
3542     { SDDL_AUDIT_FAILURE,     FAILED_ACCESS_ACE_FLAG },
3543     { SDDL_INHERITED,         INHERITED_ACE },
3544     { SDDL_INHERIT_ONLY,      INHERIT_ONLY_ACE },
3545     { SDDL_NO_PROPAGATE,      NO_PROPAGATE_INHERIT_ACE },
3546     { SDDL_OBJECT_INHERIT,    OBJECT_INHERIT_ACE },
3547     { SDDL_AUDIT_SUCCESS,     SUCCESSFUL_ACCESS_ACE_FLAG },
3548     { NULL, 0 },
3549 };
3550
3551 static BYTE ParseAceStringFlags(LPCWSTR* StringAcl)
3552 {
3553     UINT len = 0;
3554     BYTE flags = 0;
3555     LPCWSTR szAcl = *StringAcl;
3556
3557     while (*szAcl != ';')
3558     {
3559         const ACEFLAG *lpaf = AceFlags;
3560
3561         while (lpaf->wstr &&
3562                (len = strlenW(lpaf->wstr)) &&
3563                strncmpW(lpaf->wstr, szAcl, len))
3564             lpaf++;
3565
3566         if (!lpaf->wstr)
3567             return 0;
3568
3569         flags |= lpaf->value;
3570         szAcl += len;
3571     }
3572
3573     *StringAcl = szAcl;
3574     return flags;
3575 }
3576
3577
3578 /******************************************************************************
3579  * ParseAceStringRights
3580  */
3581 static const ACEFLAG AceRights[] =
3582 {
3583     { SDDL_GENERIC_ALL,     GENERIC_ALL },
3584     { SDDL_GENERIC_READ,    GENERIC_READ },
3585     { SDDL_GENERIC_WRITE,   GENERIC_WRITE },
3586     { SDDL_GENERIC_EXECUTE, GENERIC_EXECUTE },
3587
3588     { SDDL_READ_CONTROL,    READ_CONTROL },
3589     { SDDL_STANDARD_DELETE, DELETE },
3590     { SDDL_WRITE_DAC,       WRITE_DAC },
3591     { SDDL_WRITE_OWNER,     WRITE_OWNER },
3592
3593     { SDDL_READ_PROPERTY,   ADS_RIGHT_DS_READ_PROP},
3594     { SDDL_WRITE_PROPERTY,  ADS_RIGHT_DS_WRITE_PROP},
3595     { SDDL_CREATE_CHILD,    ADS_RIGHT_DS_CREATE_CHILD},
3596     { SDDL_DELETE_CHILD,    ADS_RIGHT_DS_DELETE_CHILD},
3597     { SDDL_LIST_CHILDREN,   ADS_RIGHT_ACTRL_DS_LIST},
3598     { SDDL_SELF_WRITE,      ADS_RIGHT_DS_SELF},
3599     { SDDL_LIST_OBJECT,     ADS_RIGHT_DS_LIST_OBJECT},
3600     { SDDL_DELETE_TREE,     ADS_RIGHT_DS_DELETE_TREE},
3601     { SDDL_CONTROL_ACCESS,  ADS_RIGHT_DS_CONTROL_ACCESS},
3602
3603     { SDDL_FILE_ALL,        FILE_ALL_ACCESS },
3604     { SDDL_FILE_READ,       FILE_GENERIC_READ },
3605     { SDDL_FILE_WRITE,      FILE_GENERIC_WRITE },
3606     { SDDL_FILE_EXECUTE,    FILE_GENERIC_EXECUTE },
3607
3608     { SDDL_KEY_ALL,         KEY_ALL_ACCESS },
3609     { SDDL_KEY_READ,        KEY_READ },
3610     { SDDL_KEY_WRITE,       KEY_WRITE },
3611     { SDDL_KEY_EXECUTE,     KEY_EXECUTE },
3612     { NULL, 0 },
3613 };
3614
3615 static DWORD ParseAceStringRights(LPCWSTR* StringAcl)
3616 {
3617     UINT len = 0;
3618     DWORD rights = 0;
3619     LPCWSTR szAcl = *StringAcl;
3620
3621     if ((*szAcl == '0') && (*(szAcl + 1) == 'x'))
3622     {
3623         LPCWSTR p = szAcl;
3624
3625         while (*p && *p != ';')
3626             p++;
3627
3628         if (p - szAcl <= 10 /* 8 hex digits + "0x" */ )
3629         {
3630             rights = strtoulW(szAcl, NULL, 16);
3631             szAcl = p;
3632         }
3633         else
3634             WARN("Invalid rights string format: %s\n", debugstr_wn(szAcl, p - szAcl));
3635     }
3636     else
3637     {
3638         while (*szAcl != ';')
3639         {
3640             const ACEFLAG *lpaf = AceRights;
3641
3642             while (lpaf->wstr &&
3643                (len = strlenW(lpaf->wstr)) &&
3644                strncmpW(lpaf->wstr, szAcl, len))
3645             {
3646                lpaf++;
3647             }
3648
3649             if (!lpaf->wstr)
3650                 return 0;
3651
3652             rights |= lpaf->value;
3653             szAcl += len;
3654         }
3655     }
3656
3657     *StringAcl = szAcl;
3658     return rights;
3659 }
3660
3661
3662 /******************************************************************************
3663  * ParseStringAclToAcl
3664  * 
3665  * dacl_flags(string_ace1)(string_ace2)... (string_acen) 
3666  */
3667 static BOOL ParseStringAclToAcl(LPCWSTR StringAcl, LPDWORD lpdwFlags, 
3668     PACL pAcl, LPDWORD cBytes)
3669 {
3670     DWORD val;
3671     DWORD sidlen;
3672     DWORD length = sizeof(ACL);
3673     DWORD acesize = 0;
3674     DWORD acecount = 0;
3675     PACCESS_ALLOWED_ACE pAce = NULL; /* pointer to current ACE */
3676
3677     TRACE("%s\n", debugstr_w(StringAcl));
3678
3679     if (!StringAcl)
3680         return FALSE;
3681
3682     if (pAcl) /* pAce is only useful if we're setting values */
3683         pAce = (PACCESS_ALLOWED_ACE) (pAcl + 1);
3684
3685     /* Parse ACL flags */
3686     *lpdwFlags = ParseAclStringFlags(&StringAcl);
3687
3688     /* Parse ACE */
3689     while (*StringAcl == '(')
3690     {
3691         StringAcl++;
3692
3693         /* Parse ACE type */
3694         val = ParseAceStringType(&StringAcl);
3695         if (pAce)
3696             pAce->Header.AceType = (BYTE) val;
3697         if (*StringAcl != ';')
3698             goto lerr;
3699         StringAcl++;
3700
3701         /* Parse ACE flags */
3702         val = ParseAceStringFlags(&StringAcl);
3703         if (pAce)
3704             pAce->Header.AceFlags = (BYTE) val;
3705         if (*StringAcl != ';')
3706             goto lerr;
3707         StringAcl++;
3708
3709         /* Parse ACE rights */
3710         val = ParseAceStringRights(&StringAcl);
3711         if (pAce)
3712             pAce->Mask = val;
3713         if (*StringAcl != ';')
3714             goto lerr;
3715         StringAcl++;
3716
3717         /* Parse ACE object guid */
3718         if (*StringAcl != ';')
3719         {
3720             FIXME("Support for *_OBJECT_ACE_TYPE not implemented\n");
3721             goto lerr;
3722         }
3723         StringAcl++;
3724
3725         /* Parse ACE inherit object guid */
3726         if (*StringAcl != ';')
3727         {
3728             FIXME("Support for *_OBJECT_ACE_TYPE not implemented\n");
3729             goto lerr;
3730         }
3731         StringAcl++;
3732
3733         /* Parse ACE account sid */
3734         if (ParseStringSidToSid(StringAcl, pAce ? (PSID)&pAce->SidStart : NULL, &sidlen))
3735         {
3736             while (*StringAcl && *StringAcl != ')')
3737                 StringAcl++;
3738         }
3739
3740         if (*StringAcl != ')')
3741             goto lerr;
3742         StringAcl++;
3743
3744         acesize = sizeof(ACCESS_ALLOWED_ACE) - sizeof(DWORD) + sidlen;
3745         length += acesize;
3746         if (pAce)
3747         {
3748             pAce->Header.AceSize = acesize;
3749             pAce = (PACCESS_ALLOWED_ACE)((LPBYTE)pAce + acesize);
3750         }
3751         acecount++;
3752     }
3753
3754     *cBytes = length;
3755
3756     if (length > 0xffff)
3757     {
3758         ERR("ACL too large\n");
3759         goto lerr;
3760     }
3761
3762     if (pAcl)
3763     {
3764         pAcl->AclRevision = ACL_REVISION;
3765         pAcl->Sbz1 = 0;
3766         pAcl->AclSize = length;
3767         pAcl->AceCount = acecount++;
3768         pAcl->Sbz2 = 0;
3769     }
3770     return TRUE;
3771
3772 lerr:
3773     WARN("Invalid ACE string format\n");
3774     return FALSE;
3775 }
3776
3777
3778 /******************************************************************************
3779  * ParseStringSecurityDescriptorToSecurityDescriptor
3780  */
3781 static BOOL ParseStringSecurityDescriptorToSecurityDescriptor(
3782     LPCWSTR StringSecurityDescriptor,
3783     SECURITY_DESCRIPTOR* SecurityDescriptor,
3784     LPDWORD cBytes)
3785 {
3786     BOOL bret = FALSE;
3787     WCHAR toktype;
3788     WCHAR tok[MAX_PATH];
3789     LPCWSTR lptoken;
3790     LPBYTE lpNext = NULL;
3791     DWORD len;
3792
3793     *cBytes = sizeof(SECURITY_DESCRIPTOR);
3794
3795     if (SecurityDescriptor)
3796         lpNext = ((LPBYTE) SecurityDescriptor) + sizeof(SECURITY_DESCRIPTOR);
3797
3798     while (*StringSecurityDescriptor)
3799     {
3800         toktype = *StringSecurityDescriptor;
3801
3802         /* Expect char identifier followed by ':' */
3803         StringSecurityDescriptor++;
3804         if (*StringSecurityDescriptor != ':')
3805         {
3806             SetLastError(ERROR_INVALID_PARAMETER);
3807             goto lend;
3808         }
3809         StringSecurityDescriptor++;
3810
3811         /* Extract token */
3812         lptoken = StringSecurityDescriptor;
3813         while (*lptoken && *lptoken != ':')
3814             lptoken++;
3815
3816         if (*lptoken)
3817             lptoken--;
3818
3819         len = lptoken - StringSecurityDescriptor;
3820         memcpy( tok, StringSecurityDescriptor, len * sizeof(WCHAR) );
3821         tok[len] = 0;
3822
3823         switch (toktype)
3824         {
3825             case 'O':
3826             {
3827                 DWORD bytes;
3828
3829                 if (!ParseStringSidToSid(tok, (PSID)lpNext, &bytes))
3830                     goto lend;
3831
3832                 if (SecurityDescriptor)
3833                 {
3834                     SecurityDescriptor->Owner = (PSID)(lpNext - (LPBYTE)SecurityDescriptor);
3835                     lpNext += bytes; /* Advance to next token */
3836                 }
3837
3838                 *cBytes += bytes;
3839
3840                 break;
3841             }
3842
3843             case 'G':
3844             {
3845                 DWORD bytes;
3846
3847                 if (!ParseStringSidToSid(tok, (PSID)lpNext, &bytes))
3848                     goto lend;
3849
3850                 if (SecurityDescriptor)
3851                 {
3852                     SecurityDescriptor->Group = (PSID)(lpNext - (LPBYTE)SecurityDescriptor);
3853                     lpNext += bytes; /* Advance to next token */
3854                 }
3855
3856                 *cBytes += bytes;
3857
3858                 break;
3859             }
3860
3861             case 'D':
3862             {
3863                 DWORD flags;
3864                 DWORD bytes;
3865
3866                 if (!ParseStringAclToAcl(tok, &flags, (PACL)lpNext, &bytes))
3867                     goto lend;
3868
3869                 if (SecurityDescriptor)
3870                 {
3871                     SecurityDescriptor->Control |= SE_DACL_PRESENT | flags;
3872                     SecurityDescriptor->Dacl = (PACL)(lpNext - (LPBYTE)SecurityDescriptor);
3873                     lpNext += bytes; /* Advance to next token */
3874                 }
3875
3876                 *cBytes += bytes;
3877
3878                 break;
3879             }
3880
3881             case 'S':
3882             {
3883                 DWORD flags;
3884                 DWORD bytes;
3885
3886                 if (!ParseStringAclToAcl(tok, &flags, (PACL)lpNext, &bytes))
3887                     goto lend;
3888
3889                 if (SecurityDescriptor)
3890                 {
3891                     SecurityDescriptor->Control |= SE_SACL_PRESENT | flags;
3892                     SecurityDescriptor->Sacl = (PACL)(lpNext - (LPBYTE)SecurityDescriptor);
3893                     lpNext += bytes; /* Advance to next token */
3894                 }
3895
3896                 *cBytes += bytes;
3897
3898                 break;
3899             }
3900
3901             default:
3902                 FIXME("Unknown token\n");
3903                 SetLastError(ERROR_INVALID_PARAMETER);
3904                 goto lend;
3905         }
3906
3907         StringSecurityDescriptor = lptoken;
3908     }
3909
3910     bret = TRUE;
3911
3912 lend:
3913     return bret;
3914 }
3915
3916 /******************************************************************************
3917  * ConvertStringSecurityDescriptorToSecurityDescriptorA [ADVAPI32.@]
3918  */
3919 BOOL WINAPI ConvertStringSecurityDescriptorToSecurityDescriptorA(
3920         LPCSTR StringSecurityDescriptor,
3921         DWORD StringSDRevision,
3922         PSECURITY_DESCRIPTOR* SecurityDescriptor,
3923         PULONG SecurityDescriptorSize)
3924 {
3925     UINT len;
3926     BOOL ret = FALSE;
3927     LPWSTR StringSecurityDescriptorW;
3928
3929     len = MultiByteToWideChar(CP_ACP, 0, StringSecurityDescriptor, -1, NULL, 0);
3930     StringSecurityDescriptorW = HeapAlloc(GetProcessHeap(), 0, len * sizeof(WCHAR));
3931
3932     if (StringSecurityDescriptorW)
3933     {
3934         MultiByteToWideChar(CP_ACP, 0, StringSecurityDescriptor, -1, StringSecurityDescriptorW, len);
3935
3936         ret = ConvertStringSecurityDescriptorToSecurityDescriptorW(StringSecurityDescriptorW,
3937                                                                    StringSDRevision, SecurityDescriptor,
3938                                                                    SecurityDescriptorSize);
3939         HeapFree(GetProcessHeap(), 0, StringSecurityDescriptorW);
3940     }
3941
3942     return ret;
3943 }
3944
3945 /******************************************************************************
3946  * ConvertStringSecurityDescriptorToSecurityDescriptorW [ADVAPI32.@]
3947  */
3948 BOOL WINAPI ConvertStringSecurityDescriptorToSecurityDescriptorW(
3949         LPCWSTR StringSecurityDescriptor,
3950         DWORD StringSDRevision,
3951         PSECURITY_DESCRIPTOR* SecurityDescriptor,
3952         PULONG SecurityDescriptorSize)
3953 {
3954     DWORD cBytes;
3955     SECURITY_DESCRIPTOR* psd;
3956     BOOL bret = FALSE;
3957
3958     TRACE("%s\n", debugstr_w(StringSecurityDescriptor));
3959
3960     if (GetVersion() & 0x80000000)
3961     {
3962         SetLastError(ERROR_CALL_NOT_IMPLEMENTED);
3963         goto lend;
3964     }
3965     else if (StringSDRevision != SID_REVISION)
3966     {
3967         SetLastError(ERROR_UNKNOWN_REVISION);
3968         goto lend;
3969     }
3970
3971     /* Compute security descriptor length */
3972     if (!ParseStringSecurityDescriptorToSecurityDescriptor(StringSecurityDescriptor,
3973         NULL, &cBytes))
3974         goto lend;
3975
3976     psd = *SecurityDescriptor = (SECURITY_DESCRIPTOR*) LocalAlloc(
3977         GMEM_ZEROINIT, cBytes);
3978     if (!psd) goto lend;
3979
3980     psd->Revision = SID_REVISION;
3981     psd->Control |= SE_SELF_RELATIVE;
3982
3983     if (!ParseStringSecurityDescriptorToSecurityDescriptor(StringSecurityDescriptor,
3984         psd, &cBytes))
3985     {
3986         LocalFree(psd);
3987         goto lend;
3988     }
3989
3990     if (SecurityDescriptorSize)
3991         *SecurityDescriptorSize = cBytes;
3992
3993     bret = TRUE;
3994  
3995 lend:
3996     TRACE(" ret=%d\n", bret);
3997     return bret;
3998 }
3999
4000 static void DumpString(LPCWSTR string, int cch, WCHAR **pwptr, ULONG *plen)
4001 {
4002     if (cch == -1)
4003         cch = strlenW(string);
4004
4005     if (plen)
4006         *plen += cch;
4007
4008     if (pwptr)
4009     {
4010         memcpy(*pwptr, string, sizeof(WCHAR)*cch);
4011         *pwptr += cch;
4012     }
4013 }
4014
4015 static BOOL DumpSidNumeric(PSID psid, WCHAR **pwptr, ULONG *plen)
4016 {
4017     DWORD i;
4018     WCHAR fmt[] = { 'S','-','%','u','-','%','d',0 };
4019     WCHAR subauthfmt[] = { '-','%','u',0 };
4020     WCHAR buf[26];
4021     SID *pisid = psid;
4022
4023     if( !IsValidSid( psid ) || pisid->Revision != SDDL_REVISION)
4024     {
4025         SetLastError(ERROR_INVALID_SID);
4026         return FALSE;
4027     }
4028
4029     if (pisid->IdentifierAuthority.Value[0] ||
4030      pisid->IdentifierAuthority.Value[1])
4031     {
4032         FIXME("not matching MS' bugs\n");
4033         SetLastError(ERROR_INVALID_SID);
4034         return FALSE;
4035     }
4036
4037     sprintfW( buf, fmt, pisid->Revision,
4038         MAKELONG(
4039             MAKEWORD( pisid->IdentifierAuthority.Value[5],
4040                     pisid->IdentifierAuthority.Value[4] ),
4041             MAKEWORD( pisid->IdentifierAuthority.Value[3],
4042                     pisid->IdentifierAuthority.Value[2] )
4043         ) );
4044     DumpString(buf, -1, pwptr, plen);
4045
4046     for( i=0; i<pisid->SubAuthorityCount; i++ )
4047     {
4048         sprintfW( buf, subauthfmt, pisid->SubAuthority[i] );
4049         DumpString(buf, -1, pwptr, plen);
4050     }
4051     return TRUE;
4052 }
4053
4054 static BOOL DumpSid(PSID psid, WCHAR **pwptr, ULONG *plen)
4055 {
4056     size_t i;
4057     for (i = 0; i < sizeof(WellKnownSids) / sizeof(WellKnownSids[0]); i++)
4058     {
4059         if (WellKnownSids[i].wstr[0] && EqualSid(psid, (PSID)&(WellKnownSids[i].Sid.Revision)))
4060         {
4061             DumpString(WellKnownSids[i].wstr, 2, pwptr, plen);
4062             return TRUE;
4063         }
4064     }
4065
4066     return DumpSidNumeric(psid, pwptr, plen);
4067 }
4068
4069 static const LPCWSTR AceRightBitNames[32] = {
4070         SDDL_CREATE_CHILD,        /*  0 */
4071         SDDL_DELETE_CHILD,
4072         SDDL_LIST_CHILDREN,
4073         SDDL_SELF_WRITE,
4074         SDDL_READ_PROPERTY,       /*  4 */
4075         SDDL_WRITE_PROPERTY,
4076         SDDL_DELETE_TREE,
4077         SDDL_LIST_OBJECT,
4078         SDDL_CONTROL_ACCESS,      /*  8 */
4079         NULL,
4080         NULL,
4081         NULL,
4082         NULL,                     /* 12 */
4083         NULL,
4084         NULL,
4085         NULL,
4086         SDDL_STANDARD_DELETE,     /* 16 */
4087         SDDL_READ_CONTROL,
4088         SDDL_WRITE_DAC,
4089         SDDL_WRITE_OWNER,
4090         NULL,                     /* 20 */
4091         NULL,
4092         NULL,
4093         NULL,
4094         NULL,                     /* 24 */
4095         NULL,
4096         NULL,
4097         NULL,
4098         SDDL_GENERIC_ALL,         /* 28 */
4099         SDDL_GENERIC_EXECUTE,
4100         SDDL_GENERIC_WRITE,
4101         SDDL_GENERIC_READ
4102 };
4103
4104 static void DumpRights(DWORD mask, WCHAR **pwptr, ULONG *plen)
4105 {
4106     static const WCHAR fmtW[] = {'0','x','%','x',0};
4107     WCHAR buf[15];
4108     size_t i;
4109
4110     if (mask == 0)
4111         return;
4112
4113     /* first check if the right have name */
4114     for (i = 0; i < sizeof(AceRights)/sizeof(AceRights[0]); i++)
4115     {
4116         if (AceRights[i].wstr == NULL)
4117             break;
4118         if (mask == AceRights[i].value)
4119         {
4120             DumpString(AceRights[i].wstr, -1, pwptr, plen);
4121             return;
4122         }
4123     }
4124
4125     /* then check if it can be built from bit names */
4126     for (i = 0; i < 32; i++)
4127     {
4128         if ((mask & (1 << i)) && (AceRightBitNames[i] == NULL))
4129         {
4130             /* can't be built from bit names */
4131             sprintfW(buf, fmtW, mask);
4132             DumpString(buf, -1, pwptr, plen);
4133             return;
4134         }
4135     }
4136
4137     /* build from bit names */
4138     for (i = 0; i < 32; i++)
4139         if (mask & (1 << i))
4140             DumpString(AceRightBitNames[i], -1, pwptr, plen);
4141 }
4142
4143 static BOOL DumpAce(LPVOID pace, WCHAR **pwptr, ULONG *plen)
4144 {
4145     ACCESS_ALLOWED_ACE *piace; /* all the supported ACEs have the same memory layout */
4146     static const WCHAR openbr = '(';
4147     static const WCHAR closebr = ')';
4148     static const WCHAR semicolon = ';';
4149
4150     if (((PACE_HEADER)pace)->AceType > SYSTEM_ALARM_ACE_TYPE || ((PACE_HEADER)pace)->AceSize < sizeof(ACCESS_ALLOWED_ACE))
4151     {
4152         SetLastError(ERROR_INVALID_ACL);
4153         return FALSE;
4154     }
4155
4156     piace = (ACCESS_ALLOWED_ACE *)pace;
4157     DumpString(&openbr, 1, pwptr, plen);
4158     switch (piace->Header.AceType)
4159     {
4160         case ACCESS_ALLOWED_ACE_TYPE:
4161             DumpString(SDDL_ACCESS_ALLOWED, -1, pwptr, plen);
4162             break;
4163         case ACCESS_DENIED_ACE_TYPE:
4164             DumpString(SDDL_ACCESS_DENIED, -1, pwptr, plen);
4165             break;
4166         case SYSTEM_AUDIT_ACE_TYPE:
4167             DumpString(SDDL_AUDIT, -1, pwptr, plen);
4168             break;
4169         case SYSTEM_ALARM_ACE_TYPE:
4170             DumpString(SDDL_ALARM, -1, pwptr, plen);
4171             break;
4172     }
4173     DumpString(&semicolon, 1, pwptr, plen);
4174
4175     if (piace->Header.AceFlags & OBJECT_INHERIT_ACE)
4176         DumpString(SDDL_OBJECT_INHERIT, -1, pwptr, plen);
4177     if (piace->Header.AceFlags & CONTAINER_INHERIT_ACE)
4178         DumpString(SDDL_CONTAINER_INHERIT, -1, pwptr, plen);
4179     if (piace->Header.AceFlags & NO_PROPAGATE_INHERIT_ACE)
4180         DumpString(SDDL_NO_PROPAGATE, -1, pwptr, plen);
4181     if (piace->Header.AceFlags & INHERIT_ONLY_ACE)
4182         DumpString(SDDL_INHERIT_ONLY, -1, pwptr, plen);
4183     if (piace->Header.AceFlags & INHERITED_ACE)
4184         DumpString(SDDL_INHERITED, -1, pwptr, plen);
4185     if (piace->Header.AceFlags & SUCCESSFUL_ACCESS_ACE_FLAG)
4186         DumpString(SDDL_AUDIT_SUCCESS, -1, pwptr, plen);
4187     if (piace->Header.AceFlags & FAILED_ACCESS_ACE_FLAG)
4188         DumpString(SDDL_AUDIT_FAILURE, -1, pwptr, plen);
4189     DumpString(&semicolon, 1, pwptr, plen);
4190     DumpRights(piace->Mask, pwptr, plen);
4191     DumpString(&semicolon, 1, pwptr, plen);
4192     /* objects not supported */
4193     DumpString(&semicolon, 1, pwptr, plen);
4194     /* objects not supported */
4195     DumpString(&semicolon, 1, pwptr, plen);
4196     if (!DumpSid((PSID)&piace->SidStart, pwptr, plen))
4197         return FALSE;
4198     DumpString(&closebr, 1, pwptr, plen);
4199     return TRUE;
4200 }
4201
4202 static BOOL DumpAcl(PACL pacl, WCHAR **pwptr, ULONG *plen, BOOL protected, BOOL autoInheritReq, BOOL autoInherited)
4203 {
4204     WORD count;
4205     int i;
4206
4207     if (protected)
4208         DumpString(SDDL_PROTECTED, -1, pwptr, plen);
4209     if (autoInheritReq)
4210         DumpString(SDDL_AUTO_INHERIT_REQ, -1, pwptr, plen);
4211     if (autoInherited)
4212         DumpString(SDDL_AUTO_INHERITED, -1, pwptr, plen);
4213
4214     if (pacl == NULL)
4215         return TRUE;
4216
4217     if (!IsValidAcl(pacl))
4218         return FALSE;
4219
4220     count = pacl->AceCount;
4221     for (i = 0; i < count; i++)
4222     {
4223         LPVOID ace;
4224         if (!GetAce(pacl, i, &ace))
4225             return FALSE;
4226         if (!DumpAce(ace, pwptr, plen))
4227             return FALSE;
4228     }
4229
4230     return TRUE;
4231 }
4232
4233 static BOOL DumpOwner(PSECURITY_DESCRIPTOR SecurityDescriptor, WCHAR **pwptr, ULONG *plen)
4234 {
4235     static const WCHAR prefix[] = {'O',':',0};
4236     BOOL bDefaulted;
4237     PSID psid;
4238
4239     if (!GetSecurityDescriptorOwner(SecurityDescriptor, &psid, &bDefaulted))
4240         return FALSE;
4241
4242     if (psid == NULL)
4243         return TRUE;
4244
4245     DumpString(prefix, -1, pwptr, plen);
4246     if (!DumpSid(psid, pwptr, plen))
4247         return FALSE;
4248     return TRUE;
4249 }
4250
4251 static BOOL DumpGroup(PSECURITY_DESCRIPTOR SecurityDescriptor, WCHAR **pwptr, ULONG *plen)
4252 {
4253     static const WCHAR prefix[] = {'G',':',0};
4254     BOOL bDefaulted;
4255     PSID psid;
4256
4257     if (!GetSecurityDescriptorGroup(SecurityDescriptor, &psid, &bDefaulted))
4258         return FALSE;
4259
4260     if (psid == NULL)
4261         return TRUE;
4262
4263     DumpString(prefix, -1, pwptr, plen);
4264     if (!DumpSid(psid, pwptr, plen))
4265         return FALSE;
4266     return TRUE;
4267 }
4268
4269 static BOOL DumpDacl(PSECURITY_DESCRIPTOR SecurityDescriptor, WCHAR **pwptr, ULONG *plen)
4270 {
4271     static const WCHAR dacl[] = {'D',':',0};
4272     SECURITY_DESCRIPTOR_CONTROL control;
4273     BOOL present, defaulted;
4274     DWORD revision;
4275     PACL pacl;
4276
4277     if (!GetSecurityDescriptorDacl(SecurityDescriptor, &present, &pacl, &defaulted))
4278         return FALSE;
4279
4280     if (!GetSecurityDescriptorControl(SecurityDescriptor, &control, &revision))
4281         return FALSE;
4282
4283     if (!present)
4284         return TRUE;
4285
4286     DumpString(dacl, 2, pwptr, plen);
4287     if (!DumpAcl(pacl, pwptr, plen, control & SE_DACL_PROTECTED, control & SE_DACL_AUTO_INHERIT_REQ, control & SE_DACL_AUTO_INHERITED))
4288         return FALSE;
4289     return TRUE;
4290 }
4291
4292 static BOOL DumpSacl(PSECURITY_DESCRIPTOR SecurityDescriptor, WCHAR **pwptr, ULONG *plen)
4293 {
4294     static const WCHAR sacl[] = {'S',':',0};
4295     SECURITY_DESCRIPTOR_CONTROL control;
4296     BOOL present, defaulted;
4297     DWORD revision;
4298     PACL pacl;
4299
4300     if (!GetSecurityDescriptorSacl(SecurityDescriptor, &present, &pacl, &defaulted))
4301         return FALSE;
4302
4303     if (!GetSecurityDescriptorControl(SecurityDescriptor, &control, &revision))
4304         return FALSE;
4305
4306     if (!present)
4307         return TRUE;
4308
4309     DumpString(sacl, 2, pwptr, plen);
4310     if (!DumpAcl(pacl, pwptr, plen, control & SE_SACL_PROTECTED, control & SE_SACL_AUTO_INHERIT_REQ, control & SE_SACL_AUTO_INHERITED))
4311         return FALSE;
4312     return TRUE;
4313 }
4314
4315 /******************************************************************************
4316  * ConvertSecurityDescriptorToStringSecurityDescriptorA [ADVAPI32.@]
4317  */
4318 BOOL WINAPI ConvertSecurityDescriptorToStringSecurityDescriptorW(PSECURITY_DESCRIPTOR SecurityDescriptor, DWORD SDRevision, SECURITY_INFORMATION RequestedInformation, LPWSTR *OutputString, PULONG OutputLen)
4319 {
4320     ULONG len;
4321     WCHAR *wptr, *wstr;
4322
4323     if (SDRevision != SDDL_REVISION_1)
4324     {
4325         ERR("Pogram requested unknown SDDL revision %d\n", SDRevision);
4326         SetLastError(ERROR_UNKNOWN_REVISION);
4327         return FALSE;
4328     }
4329
4330     len = 0;
4331     if (RequestedInformation & OWNER_SECURITY_INFORMATION)
4332         if (!DumpOwner(SecurityDescriptor, NULL, &len))
4333             return FALSE;
4334     if (RequestedInformation & GROUP_SECURITY_INFORMATION)
4335         if (!DumpGroup(SecurityDescriptor, NULL, &len))
4336             return FALSE;
4337     if (RequestedInformation & DACL_SECURITY_INFORMATION)
4338         if (!DumpDacl(SecurityDescriptor, NULL, &len))
4339             return FALSE;
4340     if (RequestedInformation & SACL_SECURITY_INFORMATION)
4341         if (!DumpSacl(SecurityDescriptor, NULL, &len))
4342             return FALSE;
4343
4344     wstr = wptr = LocalAlloc(0, (len + 1)*sizeof(WCHAR));
4345     if (RequestedInformation & OWNER_SECURITY_INFORMATION)
4346         if (!DumpOwner(SecurityDescriptor, &wptr, NULL))
4347             return FALSE;
4348     if (RequestedInformation & GROUP_SECURITY_INFORMATION)
4349         if (!DumpGroup(SecurityDescriptor, &wptr, NULL))
4350             return FALSE;
4351     if (RequestedInformation & DACL_SECURITY_INFORMATION)
4352         if (!DumpDacl(SecurityDescriptor, &wptr, NULL))
4353             return FALSE;
4354     if (RequestedInformation & SACL_SECURITY_INFORMATION)
4355         if (!DumpSacl(SecurityDescriptor, &wptr, NULL))
4356             return FALSE;
4357     *wptr = 0;
4358
4359     TRACE("ret: %s, %d\n", wine_dbgstr_w(wstr), len);
4360     *OutputString = wstr;
4361     if (OutputLen)
4362         *OutputLen = strlenW(*OutputString)+1;
4363     return TRUE;
4364 }
4365
4366 /******************************************************************************
4367  * ConvertSecurityDescriptorToStringSecurityDescriptorA [ADVAPI32.@]
4368  */
4369 BOOL WINAPI ConvertSecurityDescriptorToStringSecurityDescriptorA(PSECURITY_DESCRIPTOR SecurityDescriptor, DWORD SDRevision, SECURITY_INFORMATION Information, LPSTR *OutputString, PULONG OutputLen)
4370 {
4371     LPWSTR wstr;
4372     ULONG len;
4373     if (ConvertSecurityDescriptorToStringSecurityDescriptorW(SecurityDescriptor, SDRevision, Information, &wstr, &len))
4374     {
4375         int lenA;
4376
4377         lenA = WideCharToMultiByte(CP_ACP, 0, wstr, len, NULL, 0, NULL, NULL);
4378         *OutputString = HeapAlloc(GetProcessHeap(), 0, lenA);
4379         WideCharToMultiByte(CP_ACP, 0, wstr, len, *OutputString, lenA, NULL, NULL);
4380         LocalFree(wstr);
4381
4382         if (OutputLen != NULL)
4383             *OutputLen = lenA;
4384         return TRUE;
4385     }
4386     else
4387     {
4388         *OutputString = NULL;
4389         if (OutputLen)
4390             *OutputLen = 0;
4391         return FALSE;
4392     }
4393 }
4394
4395 /******************************************************************************
4396  * ConvertStringSidToSidW [ADVAPI32.@]
4397  */
4398 BOOL WINAPI ConvertStringSidToSidW(LPCWSTR StringSid, PSID* Sid)
4399 {
4400     BOOL bret = FALSE;
4401     DWORD cBytes;
4402
4403     TRACE("%s, %p\n", debugstr_w(StringSid), Sid);
4404     if (GetVersion() & 0x80000000)
4405         SetLastError(ERROR_CALL_NOT_IMPLEMENTED);
4406     else if (!StringSid || !Sid)
4407         SetLastError(ERROR_INVALID_PARAMETER);
4408     else if (ParseStringSidToSid(StringSid, NULL, &cBytes))
4409     {
4410         PSID pSid = *Sid = LocalAlloc(0, cBytes);
4411
4412         bret = ParseStringSidToSid(StringSid, pSid, &cBytes);
4413         if (!bret)
4414             LocalFree(*Sid); 
4415     }
4416     TRACE("returning %s\n", bret ? "TRUE" : "FALSE");
4417     return bret;
4418 }
4419
4420 /******************************************************************************
4421  * ConvertStringSidToSidA [ADVAPI32.@]
4422  */
4423 BOOL WINAPI ConvertStringSidToSidA(LPCSTR StringSid, PSID* Sid)
4424 {
4425     BOOL bret = FALSE;
4426
4427     TRACE("%s, %p\n", debugstr_a(StringSid), Sid);
4428     if (GetVersion() & 0x80000000)
4429         SetLastError(ERROR_CALL_NOT_IMPLEMENTED);
4430     else if (!StringSid || !Sid)
4431         SetLastError(ERROR_INVALID_PARAMETER);
4432     else
4433     {
4434         UINT len = MultiByteToWideChar(CP_ACP, 0, StringSid, -1, NULL, 0);
4435         LPWSTR wStringSid = HeapAlloc(GetProcessHeap(), 0,
4436          len * sizeof(WCHAR));
4437
4438         MultiByteToWideChar(CP_ACP, 0, StringSid, -1, wStringSid, len);
4439         bret = ConvertStringSidToSidW(wStringSid, Sid);
4440         HeapFree(GetProcessHeap(), 0, wStringSid);
4441     }
4442     TRACE("returning %s\n", bret ? "TRUE" : "FALSE");
4443     return bret;
4444 }
4445
4446 /******************************************************************************
4447  * ConvertSidToStringSidW [ADVAPI32.@]
4448  *
4449  *  format of SID string is:
4450  *    S-<count>-<auth>-<subauth1>-<subauth2>-<subauth3>...
4451  *  where
4452  *    <rev> is the revision of the SID encoded as decimal
4453  *    <auth> is the identifier authority encoded as hex
4454  *    <subauthN> is the subauthority id encoded as decimal
4455  */
4456 BOOL WINAPI ConvertSidToStringSidW( PSID pSid, LPWSTR *pstr )
4457 {
4458     DWORD len = 0;
4459     LPWSTR wstr, wptr;
4460
4461     TRACE("%p %p\n", pSid, pstr );
4462
4463     len = 0;
4464     if (!DumpSidNumeric(pSid, NULL, &len))
4465         return FALSE;
4466     wstr = wptr = LocalAlloc(0, (len+1) * sizeof(WCHAR));
4467     DumpSidNumeric(pSid, &wptr, NULL);
4468     *wptr = 0;
4469
4470     *pstr = wstr;
4471     return TRUE;
4472 }
4473
4474 /******************************************************************************
4475  * ConvertSidToStringSidA [ADVAPI32.@]
4476  */
4477 BOOL WINAPI ConvertSidToStringSidA(PSID pSid, LPSTR *pstr)
4478 {
4479     LPWSTR wstr = NULL;
4480     LPSTR str;
4481     UINT len;
4482
4483     TRACE("%p %p\n", pSid, pstr );
4484
4485     if( !ConvertSidToStringSidW( pSid, &wstr ) )
4486         return FALSE;
4487
4488     len = WideCharToMultiByte( CP_ACP, 0, wstr, -1, NULL, 0, NULL, NULL );
4489     str = LocalAlloc( 0, len );
4490     WideCharToMultiByte( CP_ACP, 0, wstr, -1, str, len, NULL, NULL );
4491     LocalFree( wstr );
4492
4493     *pstr = str;
4494
4495     return TRUE;
4496 }
4497
4498 BOOL WINAPI CreatePrivateObjectSecurity(
4499         PSECURITY_DESCRIPTOR ParentDescriptor,
4500         PSECURITY_DESCRIPTOR CreatorDescriptor,
4501         PSECURITY_DESCRIPTOR* NewDescriptor,
4502         BOOL IsDirectoryObject,
4503         HANDLE Token,
4504         PGENERIC_MAPPING GenericMapping )
4505 {
4506     FIXME("%p %p %p %d %p %p - stub\n", ParentDescriptor, CreatorDescriptor,
4507           NewDescriptor, IsDirectoryObject, Token, GenericMapping);
4508
4509     return FALSE;
4510 }
4511
4512 BOOL WINAPI DestroyPrivateObjectSecurity( PSECURITY_DESCRIPTOR* ObjectDescriptor )
4513 {
4514     FIXME("%p - stub\n", ObjectDescriptor);
4515
4516     return TRUE;
4517 }
4518
4519 BOOL WINAPI CreateProcessAsUserA(
4520         HANDLE hToken,
4521         LPCSTR lpApplicationName,
4522         LPSTR lpCommandLine,
4523         LPSECURITY_ATTRIBUTES lpProcessAttributes,
4524         LPSECURITY_ATTRIBUTES lpThreadAttributes,
4525         BOOL bInheritHandles,
4526         DWORD dwCreationFlags,
4527         LPVOID lpEnvironment,
4528         LPCSTR lpCurrentDirectory,
4529         LPSTARTUPINFOA lpStartupInfo,
4530         LPPROCESS_INFORMATION lpProcessInformation )
4531 {
4532     FIXME("%p %s %s %p %p %d 0x%08x %p %s %p %p - stub\n", hToken, debugstr_a(lpApplicationName),
4533           debugstr_a(lpCommandLine), lpProcessAttributes, lpThreadAttributes, bInheritHandles,
4534           dwCreationFlags, lpEnvironment, debugstr_a(lpCurrentDirectory), lpStartupInfo, lpProcessInformation);
4535
4536     return FALSE;
4537 }
4538
4539 BOOL WINAPI CreateProcessAsUserW(
4540         HANDLE hToken,
4541         LPCWSTR lpApplicationName,
4542         LPWSTR lpCommandLine,
4543         LPSECURITY_ATTRIBUTES lpProcessAttributes,
4544         LPSECURITY_ATTRIBUTES lpThreadAttributes,
4545         BOOL bInheritHandles,
4546         DWORD dwCreationFlags,
4547         LPVOID lpEnvironment,
4548         LPCWSTR lpCurrentDirectory,
4549         LPSTARTUPINFOW lpStartupInfo,
4550         LPPROCESS_INFORMATION lpProcessInformation )
4551 {
4552     FIXME("%p %s %s %p %p %d 0x%08x %p %s %p %p - semi- stub\n", hToken, 
4553           debugstr_w(lpApplicationName), debugstr_w(lpCommandLine), lpProcessAttributes,
4554           lpThreadAttributes, bInheritHandles, dwCreationFlags, lpEnvironment, 
4555           debugstr_w(lpCurrentDirectory), lpStartupInfo, lpProcessInformation);
4556
4557     /* We should create the process with a suspended main thread */
4558     if (!CreateProcessW (lpApplicationName,
4559                          lpCommandLine,
4560                          lpProcessAttributes,
4561                          lpThreadAttributes,
4562                          bInheritHandles,
4563                          dwCreationFlags, /* CREATE_SUSPENDED */
4564                          lpEnvironment,
4565                          lpCurrentDirectory,
4566                          lpStartupInfo,
4567                          lpProcessInformation))
4568     {
4569       return FALSE;
4570     }
4571
4572     return TRUE;
4573 }
4574
4575 /******************************************************************************
4576  * CreateProcessWithLogonW
4577  */
4578 BOOL WINAPI CreateProcessWithLogonW( LPCWSTR lpUsername, LPCWSTR lpDomain, LPCWSTR lpPassword, DWORD dwLogonFlags,
4579     LPCWSTR lpApplicationName, LPWSTR lpCommandLine, DWORD dwCreationFlags, LPVOID lpEnvironment,
4580     LPCWSTR lpCurrentDirectory, LPSTARTUPINFOW lpStartupInfo, LPPROCESS_INFORMATION lpProcessInformation )
4581 {
4582     FIXME("%s %s %s 0x%08x %s %s 0x%08x %p %s %p %p stub\n", debugstr_w(lpUsername), debugstr_w(lpDomain),
4583     debugstr_w(lpPassword), dwLogonFlags, debugstr_w(lpApplicationName),
4584     debugstr_w(lpCommandLine), dwCreationFlags, lpEnvironment, debugstr_w(lpCurrentDirectory),
4585     lpStartupInfo, lpProcessInformation);
4586
4587     return FALSE;
4588 }
4589
4590 /******************************************************************************
4591  * DuplicateTokenEx [ADVAPI32.@]
4592  */
4593 BOOL WINAPI DuplicateTokenEx(
4594         HANDLE ExistingTokenHandle, DWORD dwDesiredAccess,
4595         LPSECURITY_ATTRIBUTES lpTokenAttributes,
4596         SECURITY_IMPERSONATION_LEVEL ImpersonationLevel,
4597         TOKEN_TYPE TokenType,
4598         PHANDLE DuplicateTokenHandle )
4599 {
4600     OBJECT_ATTRIBUTES ObjectAttributes;
4601
4602     TRACE("%p 0x%08x 0x%08x 0x%08x %p\n", ExistingTokenHandle, dwDesiredAccess,
4603           ImpersonationLevel, TokenType, DuplicateTokenHandle);
4604
4605     InitializeObjectAttributes(
4606         &ObjectAttributes,
4607         NULL,
4608         (lpTokenAttributes && lpTokenAttributes->bInheritHandle) ? OBJ_INHERIT : 0,
4609         NULL,
4610         lpTokenAttributes ? lpTokenAttributes->lpSecurityDescriptor : NULL );
4611
4612     return set_ntstatus( NtDuplicateToken( ExistingTokenHandle,
4613                                            dwDesiredAccess,
4614                                            &ObjectAttributes,
4615                                            ImpersonationLevel,
4616                                            TokenType,
4617                                            DuplicateTokenHandle ) );
4618 }
4619
4620 BOOL WINAPI DuplicateToken(
4621         HANDLE ExistingTokenHandle,
4622         SECURITY_IMPERSONATION_LEVEL ImpersonationLevel,
4623         PHANDLE DuplicateTokenHandle )
4624 {
4625     return DuplicateTokenEx( ExistingTokenHandle, TOKEN_IMPERSONATE | TOKEN_QUERY,
4626                              NULL, ImpersonationLevel, TokenImpersonation,
4627                              DuplicateTokenHandle );
4628 }
4629
4630 /******************************************************************************
4631  * ComputeStringSidSize
4632  */
4633 static DWORD ComputeStringSidSize(LPCWSTR StringSid)
4634 {
4635     if (StringSid[0] == 'S' && StringSid[1] == '-') /* S-R-I(-S)+ */
4636     {
4637         int ctok = 0;
4638         while (*StringSid)
4639         {
4640             if (*StringSid == '-')
4641                 ctok++;
4642             StringSid++;
4643         }
4644
4645         if (ctok >= 3)
4646             return GetSidLengthRequired(ctok - 2);
4647     }
4648     else /* String constant format  - Only available in winxp and above */
4649     {
4650         unsigned int i;
4651
4652         for (i = 0; i < sizeof(WellKnownSids)/sizeof(WellKnownSids[0]); i++)
4653             if (!strncmpW(WellKnownSids[i].wstr, StringSid, 2))
4654                 return GetSidLengthRequired(WellKnownSids[i].Sid.SubAuthorityCount);
4655     }
4656
4657     return GetSidLengthRequired(0);
4658 }
4659
4660 /******************************************************************************
4661  * ParseStringSidToSid
4662  */
4663 static BOOL ParseStringSidToSid(LPCWSTR StringSid, PSID pSid, LPDWORD cBytes)
4664 {
4665     BOOL bret = FALSE;
4666     SID* pisid=pSid;
4667
4668     TRACE("%s, %p, %p\n", debugstr_w(StringSid), pSid, cBytes);
4669     if (!StringSid)
4670     {
4671         SetLastError(ERROR_INVALID_PARAMETER);
4672         TRACE("StringSid is NULL, returning FALSE\n");
4673         return FALSE;
4674     }
4675
4676     *cBytes = ComputeStringSidSize(StringSid);
4677     if (!pisid) /* Simply compute the size */
4678     {
4679         TRACE("only size requested, returning TRUE\n");
4680         return TRUE;
4681     }
4682
4683     if (StringSid[0] == 'S' && StringSid[1] == '-') /* S-R-I-S-S */
4684     {
4685         DWORD i = 0, identAuth;
4686         DWORD csubauth = ((*cBytes - GetSidLengthRequired(0)) / sizeof(DWORD));
4687
4688         StringSid += 2; /* Advance to Revision */
4689         pisid->Revision = atoiW(StringSid);
4690
4691         if (pisid->Revision != SDDL_REVISION)
4692         {
4693             TRACE("Revision %d is unknown\n", pisid->Revision);
4694             goto lend; /* ERROR_INVALID_SID */
4695         }
4696         if (csubauth == 0)
4697         {
4698             TRACE("SubAuthorityCount is 0\n");
4699             goto lend; /* ERROR_INVALID_SID */
4700         }
4701
4702         pisid->SubAuthorityCount = csubauth;
4703
4704         /* Advance to identifier authority */
4705         while (*StringSid && *StringSid != '-')
4706             StringSid++;
4707         if (*StringSid == '-')
4708             StringSid++;
4709
4710         /* MS' implementation can't handle values greater than 2^32 - 1, so
4711          * we don't either; assume most significant bytes are always 0
4712          */
4713         pisid->IdentifierAuthority.Value[0] = 0;
4714         pisid->IdentifierAuthority.Value[1] = 0;
4715         identAuth = atoiW(StringSid);
4716         pisid->IdentifierAuthority.Value[5] = identAuth & 0xff;
4717         pisid->IdentifierAuthority.Value[4] = (identAuth & 0xff00) >> 8;
4718         pisid->IdentifierAuthority.Value[3] = (identAuth & 0xff0000) >> 16;
4719         pisid->IdentifierAuthority.Value[2] = (identAuth & 0xff000000) >> 24;
4720
4721         /* Advance to first sub authority */
4722         while (*StringSid && *StringSid != '-')
4723             StringSid++;
4724         if (*StringSid == '-')
4725             StringSid++;
4726
4727         while (*StringSid)
4728         {
4729             pisid->SubAuthority[i++] = atoiW(StringSid);
4730
4731             while (*StringSid && *StringSid != '-')
4732                 StringSid++;
4733             if (*StringSid == '-')
4734                 StringSid++;
4735         }
4736
4737         if (i != pisid->SubAuthorityCount)
4738             goto lend; /* ERROR_INVALID_SID */
4739
4740         bret = TRUE;
4741     }
4742     else /* String constant format  - Only available in winxp and above */
4743     {
4744         unsigned int i;
4745         pisid->Revision = SDDL_REVISION;
4746
4747         for (i = 0; i < sizeof(WellKnownSids)/sizeof(WellKnownSids[0]); i++)
4748             if (!strncmpW(WellKnownSids[i].wstr, StringSid, 2))
4749             {
4750                 DWORD j;
4751                 pisid->SubAuthorityCount = WellKnownSids[i].Sid.SubAuthorityCount;
4752                 pisid->IdentifierAuthority = WellKnownSids[i].Sid.IdentifierAuthority;
4753                 for (j = 0; j < WellKnownSids[i].Sid.SubAuthorityCount; j++)
4754                     pisid->SubAuthority[j] = WellKnownSids[i].Sid.SubAuthority[j];
4755                 bret = TRUE;
4756             }
4757
4758         if (!bret)
4759             FIXME("String constant not supported: %s\n", debugstr_wn(StringSid, 2));
4760     }
4761
4762 lend:
4763     if (!bret)
4764         SetLastError(ERROR_INVALID_SID);
4765
4766     TRACE("returning %s\n", bret ? "TRUE" : "FALSE");
4767     return bret;
4768 }
4769
4770 /******************************************************************************
4771  * GetNamedSecurityInfoA [ADVAPI32.@]
4772  */
4773 DWORD WINAPI GetNamedSecurityInfoA(LPSTR pObjectName,
4774         SE_OBJECT_TYPE ObjectType, SECURITY_INFORMATION SecurityInfo,
4775         PSID* ppsidOwner, PSID* ppsidGroup, PACL* ppDacl, PACL* ppSacl,
4776         PSECURITY_DESCRIPTOR* ppSecurityDescriptor)
4777 {
4778     DWORD len;
4779     LPWSTR wstr = NULL;
4780     DWORD r;
4781
4782     TRACE("%s %d %d %p %p %p %p %p\n", pObjectName, ObjectType, SecurityInfo,
4783         ppsidOwner, ppsidGroup, ppDacl, ppSacl, ppSecurityDescriptor);
4784
4785     if( pObjectName )
4786     {
4787         len = MultiByteToWideChar( CP_ACP, 0, pObjectName, -1, NULL, 0 );
4788         wstr = HeapAlloc( GetProcessHeap(), 0, len*sizeof(WCHAR));
4789         MultiByteToWideChar( CP_ACP, 0, pObjectName, -1, wstr, len );
4790     }
4791
4792     r = GetNamedSecurityInfoW( wstr, ObjectType, SecurityInfo, ppsidOwner,
4793                            ppsidGroup, ppDacl, ppSacl, ppSecurityDescriptor );
4794
4795     HeapFree( GetProcessHeap(), 0, wstr );
4796
4797     return r;
4798 }
4799
4800 /******************************************************************************
4801  * GetNamedSecurityInfoW [ADVAPI32.@]
4802  */
4803 DWORD WINAPI GetNamedSecurityInfoW( LPWSTR name, SE_OBJECT_TYPE type,
4804     SECURITY_INFORMATION info, PSID* owner, PSID* group, PACL* dacl,
4805     PACL* sacl, PSECURITY_DESCRIPTOR* descriptor )
4806 {
4807     DWORD needed, offset;
4808     SECURITY_DESCRIPTOR_RELATIVE *relative;
4809     BYTE *buffer;
4810
4811     TRACE( "%s %d %d %p %p %p %p %p\n", debugstr_w(name), type, info, owner,
4812            group, dacl, sacl, descriptor );
4813
4814     if (!name || !descriptor) return ERROR_INVALID_PARAMETER;
4815
4816     needed = sizeof(SECURITY_DESCRIPTOR_RELATIVE);
4817     if (info & OWNER_SECURITY_INFORMATION)
4818         needed += sizeof(sidWorld);
4819     if (info & GROUP_SECURITY_INFORMATION)
4820         needed += sizeof(sidWorld);
4821     if (info & DACL_SECURITY_INFORMATION)
4822         needed += WINE_SIZE_OF_WORLD_ACCESS_ACL;
4823     if (info & SACL_SECURITY_INFORMATION)
4824         needed += WINE_SIZE_OF_WORLD_ACCESS_ACL;
4825
4826     /* must be freed by caller */
4827     *descriptor = HeapAlloc( GetProcessHeap(), 0, needed );
4828     if (!*descriptor) return ERROR_NOT_ENOUGH_MEMORY;
4829
4830     if (!InitializeSecurityDescriptor( *descriptor, SECURITY_DESCRIPTOR_REVISION ))
4831     {
4832         HeapFree( GetProcessHeap(), 0, *descriptor );
4833         return ERROR_INVALID_SECURITY_DESCR;
4834     }
4835
4836     relative = (SECURITY_DESCRIPTOR_RELATIVE *)*descriptor;
4837     relative->Control |= SE_SELF_RELATIVE;
4838     buffer = (BYTE *)relative;
4839     offset = sizeof(SECURITY_DESCRIPTOR_RELATIVE);
4840
4841     if (info & OWNER_SECURITY_INFORMATION)
4842     {
4843         memcpy( buffer + offset, &sidWorld, sizeof(sidWorld) );
4844         relative->Owner = offset;
4845         if (owner)
4846             *owner = buffer + offset;
4847         offset += sizeof(sidWorld);
4848     }
4849     if (info & GROUP_SECURITY_INFORMATION)
4850     {
4851         memcpy( buffer + offset, &sidWorld, sizeof(sidWorld) );
4852         relative->Group = offset;
4853         if (group)
4854             *group = buffer + offset;
4855         offset += sizeof(sidWorld);
4856     }
4857     if (info & DACL_SECURITY_INFORMATION)
4858     {
4859         relative->Control |= SE_DACL_PRESENT;
4860         GetWorldAccessACL( (PACL)(buffer + offset) );
4861         relative->Dacl = offset;
4862         if (dacl)
4863             *dacl = (PACL)(buffer + offset);
4864         offset += WINE_SIZE_OF_WORLD_ACCESS_ACL;
4865     }
4866     if (info & SACL_SECURITY_INFORMATION)
4867     {
4868         relative->Control |= SE_SACL_PRESENT;
4869         GetWorldAccessACL( (PACL)(buffer + offset) );
4870         relative->Sacl = offset;
4871         if (sacl)
4872             *sacl = (PACL)(buffer + offset);
4873     }
4874     return ERROR_SUCCESS;
4875 }
4876
4877 /******************************************************************************
4878  * DecryptFileW [ADVAPI32.@]
4879  */
4880 BOOL WINAPI DecryptFileW(LPCWSTR lpFileName, DWORD dwReserved)
4881 {
4882     FIXME("%s %08x\n", debugstr_w(lpFileName), dwReserved);
4883     return TRUE;
4884 }
4885
4886 /******************************************************************************
4887  * DecryptFileA [ADVAPI32.@]
4888  */
4889 BOOL WINAPI DecryptFileA(LPCSTR lpFileName, DWORD dwReserved)
4890 {
4891     FIXME("%s %08x\n", debugstr_a(lpFileName), dwReserved);
4892     return TRUE;
4893 }
4894
4895 /******************************************************************************
4896  * EncryptFileW [ADVAPI32.@]
4897  */
4898 BOOL WINAPI EncryptFileW(LPCWSTR lpFileName)
4899 {
4900     FIXME("%s\n", debugstr_w(lpFileName));
4901     return TRUE;
4902 }
4903
4904 /******************************************************************************
4905  * EncryptFileA [ADVAPI32.@]
4906  */
4907 BOOL WINAPI EncryptFileA(LPCSTR lpFileName)
4908 {
4909     FIXME("%s\n", debugstr_a(lpFileName));
4910     return TRUE;
4911 }
4912
4913 /******************************************************************************
4914  * FileEncryptionStatusW [ADVAPI32.@]
4915  */
4916 BOOL WINAPI FileEncryptionStatusW(LPCWSTR lpFileName, LPDWORD lpStatus)
4917 {
4918     FIXME("(%s %p): stub\n", debugstr_w(lpFileName), lpStatus);
4919     if (!lpStatus)
4920         return FALSE;
4921     *lpStatus = FILE_SYSTEM_NOT_SUPPORT;
4922     return TRUE;
4923 }
4924
4925 /******************************************************************************
4926  * FileEncryptionStatusA [ADVAPI32.@]
4927  */
4928 BOOL WINAPI FileEncryptionStatusA(LPCSTR lpFileName, LPDWORD lpStatus)
4929 {
4930     FIXME("(%s %p): stub\n", debugstr_a(lpFileName), lpStatus);
4931     if (!lpStatus)
4932         return FALSE;
4933     *lpStatus = FILE_SYSTEM_NOT_SUPPORT;
4934     return TRUE;
4935 }
4936
4937 /******************************************************************************
4938  * SetSecurityInfo [ADVAPI32.@]
4939  */
4940 DWORD WINAPI SetSecurityInfo(HANDLE handle, SE_OBJECT_TYPE ObjectType, 
4941                       SECURITY_INFORMATION SecurityInfo, PSID psidOwner,
4942                       PSID psidGroup, PACL pDacl, PACL pSacl) {
4943     FIXME("stub\n");
4944     return ERROR_SUCCESS;
4945 }