update for HEAD-2003091401
[reactos.git] / lib / advapi32 / sec / lsa.c
1 /* $Id$
2  *
3  * COPYRIGHT:       See COPYING in the top level directory
4  * PROJECT:         ReactOS system libraries
5  * FILE:            lib/advapi32/sec/lsa.c
6  * PURPOSE:         Local security authority functions
7  * PROGRAMMER:      Emanuele Aliberti
8  * UPDATE HISTORY:
9  *      19990322 EA created
10  *      19990515 EA stubs
11  *      20030202 KJK compressed stubs
12  */
13 #include <windows.h>
14 #include <ddk/ntddk.h>
15 #include <ntsecapi.h>
16 /*
17  * @unimplemented
18  */
19 NTSTATUS
20 STDCALL
21 LsaOpenPolicy(PLSA_UNICODE_STRING lsaucs,PLSA_OBJECT_ATTRIBUTES lsaoa,ACCESS_MASK access,PLSA_HANDLE lsah)
22 {
23   return(FALSE);
24 }
25
26 /*
27  * @unimplemented
28  */
29 NTSTATUS
30 STDCALL
31 LsaQueryInformationPolicy(LSA_HANDLE lsah,POLICY_INFORMATION_CLASS pic,PVOID* pv)
32 {
33   return(FALSE);
34 }
35
36 /*
37  * @unimplemented
38  */
39 NTSTATUS
40 STDCALL
41 LsaFreeMemory(PVOID pv)
42 {
43   return(FALSE);
44 }
45
46 /*
47  * @unimplemented
48  */
49 NTSTATUS
50 STDCALL
51 LsaClose(LSA_HANDLE ObjectHandle)
52 {
53   return(FALSE);
54 }
55
56 /*
57  * @unimplemented
58  */
59 NTSTATUS
60 STDCALL
61 LsaAddAccountRights(
62     LSA_HANDLE PolicyHandle,
63     PSID AccountSid,
64     PLSA_UNICODE_STRING UserRights,
65     ULONG CountOfRights
66     )
67 {
68   return(FALSE);
69 }
70
71 /*
72  * @unimplemented
73  */
74 NTSTATUS
75 STDCALL
76 LsaCreateTrustedDomainEx(
77     LSA_HANDLE PolicyHandle,
78     PTRUSTED_DOMAIN_INFORMATION_EX TrustedDomainInformation,
79     PTRUSTED_DOMAIN_AUTH_INFORMATION AuthenticationInformation,
80     ACCESS_MASK DesiredAccess,
81     PLSA_HANDLE TrustedDomainHandle
82     )
83 {
84   return(FALSE);
85 }
86
87 /*
88  * @unimplemented
89  */
90 NTSTATUS
91 STDCALL
92 LsaDeleteTrustedDomain(
93     LSA_HANDLE PolicyHandle,
94     PSID TrustedDomainSid
95     )
96 {
97   return(FALSE);
98 }
99
100 /*
101  * @unimplemented
102  */
103 NTSTATUS
104 STDCALL
105 LsaEnumerateAccountRights(
106     LSA_HANDLE PolicyHandle,
107     PSID AccountSid,
108     PLSA_UNICODE_STRING *UserRights,
109     PULONG CountOfRights
110     )
111 {
112   return(FALSE);
113 }
114
115 /*
116  * @unimplemented
117  */
118 NTSTATUS
119 STDCALL
120 LsaEnumerateAccountsWithUserRight(
121     LSA_HANDLE PolicyHandle,
122     OPTIONAL PLSA_UNICODE_STRING UserRights,
123     PVOID *EnumerationBuffer,
124     PULONG CountReturned
125     )
126 {
127   return(FALSE);
128 }
129
130 /*
131  * @unimplemented
132  */
133 NTSTATUS
134 STDCALL
135 LsaEnumerateTrustedDomains(
136     LSA_HANDLE PolicyHandle,
137     PLSA_ENUMERATION_HANDLE EnumerationContext,
138     PVOID *Buffer,
139     ULONG PreferedMaximumLength,
140     PULONG CountReturned
141     )
142 {
143   return(FALSE);
144 }
145
146 /*
147  * @unimplemented
148  */
149 NTSTATUS
150 STDCALL
151 LsaEnumerateTrustedDomainsEx(
152     LSA_HANDLE PolicyHandle,
153     PLSA_ENUMERATION_HANDLE EnumerationContext,
154     PVOID *Buffer,
155     ULONG PreferedMaximumLength,
156     PULONG CountReturned
157     )
158 {
159   return(FALSE);
160 }
161
162 /*
163  * @unimplemented
164  */
165 NTSTATUS
166 STDCALL
167 LsaLookupNames(
168     LSA_HANDLE PolicyHandle,
169     ULONG Count,
170     PLSA_UNICODE_STRING Names,
171     PLSA_REFERENCED_DOMAIN_LIST *ReferencedDomains,
172     PLSA_TRANSLATED_SID *Sids
173     )
174 {
175   return(FALSE);
176 }
177
178 /*
179  * @unimplemented
180  */
181 NTSTATUS
182 STDCALL
183 LsaLookupNames2(
184     LSA_HANDLE PolicyHandle,
185     ULONG Flags,
186     ULONG Count,
187     PLSA_UNICODE_STRING Names,
188     PLSA_REFERENCED_DOMAIN_LIST *ReferencedDomains,
189     PLSA_TRANSLATED_SID2 *Sids
190     )
191 {
192   return(FALSE);
193 }
194
195 /*
196  * @unimplemented
197  */
198 NTSTATUS
199 STDCALL
200 LsaLookupSids(
201     LSA_HANDLE PolicyHandle,
202     ULONG Count,
203     PSID *Sids,
204     PLSA_REFERENCED_DOMAIN_LIST *ReferencedDomains,
205     PLSA_TRANSLATED_NAME *Names
206     )
207 {
208   return(FALSE);
209 }
210
211 /*
212  * @unimplemented
213  */
214 NTSTATUS
215 STDCALL
216 LsaOpenTrustedDomainByName(
217     LSA_HANDLE PolicyHandle,
218     PLSA_UNICODE_STRING TrustedDomainName,
219     ACCESS_MASK DesiredAccess,
220     PLSA_HANDLE TrustedDomainHandle
221     )
222 {
223   return(FALSE);
224 }
225
226 /*
227  * @unimplemented
228  */
229 NTSTATUS
230 STDCALL
231 LsaQueryDomainInformationPolicy(
232     LSA_HANDLE PolicyHandle,
233     POLICY_DOMAIN_INFORMATION_CLASS InformationClass,
234     PVOID *Buffer
235     )
236 {
237   return(FALSE);
238 }
239
240 /*
241  * @unimplemented
242  */
243 NTSTATUS
244 STDCALL
245 LsaQueryForestTrustInformation(
246     LSA_HANDLE PolicyHandle,
247     PLSA_UNICODE_STRING TrustedDomainName,
248     PLSA_FOREST_TRUST_INFORMATION * ForestTrustInfo
249     )
250 {
251   return(FALSE);
252 }
253
254 /*
255  * @unimplemented
256  */
257 NTSTATUS
258 STDCALL
259 LsaQueryTrustedDomainInfoByName(
260     LSA_HANDLE PolicyHandle,
261     PLSA_UNICODE_STRING TrustedDomainName,
262     TRUSTED_INFORMATION_CLASS InformationClass,
263     PVOID *Buffer
264     )
265 {
266   return(FALSE);
267 }
268
269 /*
270  * @unimplemented
271  */
272 NTSTATUS
273 STDCALL
274 LsaQueryTrustedDomainInfo(
275     LSA_HANDLE PolicyHandle,
276     PSID TrustedDomainSid,
277     TRUSTED_INFORMATION_CLASS InformationClass,
278     PVOID *Buffer
279     )
280 {
281   return(FALSE);
282 }
283
284 /*
285  * @unimplemented
286  */
287 NTSTATUS
288 STDCALL
289 LsaRemoveAccountRights(
290     LSA_HANDLE PolicyHandle,
291     PSID AccountSid,
292     WINBOOL AllRights,
293     PLSA_UNICODE_STRING UserRights,
294     ULONG CountOfRights
295     )
296 {
297   return(FALSE);
298 }
299
300 /*
301  * @unimplemented
302  */
303 NTSTATUS
304 STDCALL
305 LsaRetrievePrivateData(
306     LSA_HANDLE PolicyHandle,
307     PLSA_UNICODE_STRING KeyName,
308     PLSA_UNICODE_STRING * PrivateData
309     )
310 {
311   return(FALSE);
312 }
313
314 /*
315  * @unimplemented
316  */
317 NTSTATUS
318 STDCALL
319 LsaSetDomainInformationPolicy(
320     LSA_HANDLE PolicyHandle,
321     POLICY_DOMAIN_INFORMATION_CLASS InformationClass,
322     PVOID Buffer
323     )
324 {
325   return(FALSE);
326 }
327
328 /*
329  * @unimplemented
330  */
331 NTSTATUS
332 STDCALL
333 LsaSetInformationPolicy(
334     LSA_HANDLE PolicyHandle,
335     POLICY_INFORMATION_CLASS InformationClass,
336     PVOID Buffer
337     )
338 {
339   return(FALSE);
340 }
341
342 /*
343  * @unimplemented
344  */
345 NTSTATUS
346 STDCALL
347 LsaSetForestTrustInformation(
348     LSA_HANDLE PolicyHandle,
349     PLSA_UNICODE_STRING TrustedDomainName,
350     PLSA_FOREST_TRUST_INFORMATION ForestTrustInfo,
351     WINBOOL CheckOnly,
352     PLSA_FOREST_TRUST_COLLISION_INFORMATION * CollisionInfo
353     )
354 {
355   return(FALSE);
356 }
357
358 /*
359  * @unimplemented
360  */
361 NTSTATUS
362 STDCALL
363 LsaSetTrustedDomainInfoByName(
364     LSA_HANDLE PolicyHandle,
365     PLSA_UNICODE_STRING TrustedDomainName,
366     TRUSTED_INFORMATION_CLASS InformationClass,
367     PVOID Buffer
368     )
369 {
370   return(FALSE);
371 }
372
373 /*
374  * @unimplemented
375  */
376 NTSTATUS
377 STDCALL
378 LsaSetTrustedDomainInformation(
379     LSA_HANDLE PolicyHandle,
380     PSID TrustedDomainSid,
381     TRUSTED_INFORMATION_CLASS InformationClass,
382     PVOID Buffer
383     )
384 {
385   return(FALSE);
386 }
387
388 /*
389  * @unimplemented
390  */
391 NTSTATUS
392 STDCALL
393 LsaStorePrivateData(
394     LSA_HANDLE PolicyHandle,
395     PLSA_UNICODE_STRING KeyName,
396     PLSA_UNICODE_STRING PrivateData
397     )
398 {
399   return(FALSE);
400 }