74 BufLen =
sizeof(Statistics);
84 ResMan->UserSid = UserSid;
154 if (pAuthzResourceManager !=
NULL &&
160 if (ResourceManagerName !=
NULL)
171 ResMan->Tag = RESMAN_TAG;
177 if (ResourceManagerName !=
NULL)
180 ResourceManagerName);
192 DPRINT1(
"Auditing not implemented!\n");
211 DPRINT1(
"Querying the token failed!\n");
233 if (AuthzResourceManager !=
NULL)
#define ERROR_INVALID_PARAMETER
AUTHZAPI BOOL WINAPI AuthzInitializeResourceManager(IN DWORD flags, IN PFN_AUTHZ_DYNAMIC_ACCESS_CHECK pfnAccessCheck OPTIONAL, IN PFN_AUTHZ_COMPUTE_DYNAMIC_GROUPS pfnComputeDynamicGroups OPTIONAL, IN PFN_AUTHZ_FREE_DYNAMIC_GROUPS pfnFreeDynamicGroups OPTIONAL, IN PCWSTR ResourceManagerName OPTIONAL, IN PAUTHZ_RESOURCE_MANAGER_HANDLE pAuthzResourceManager)
AUTHZAPI BOOL WINAPI AuthzFreeResourceManager(IN AUTHZ_RESOURCE_MANAGER_HANDLE AuthzResourceManager)
PFN_AUTHZ_FREE_DYNAMIC_GROUPS pfnFreeDynamicGroups
struct _AUTHZ_RESMAN AUTHZ_RESMAN
WCHAR ResourceManagerName[1]
HANDLE WINAPI GetCurrentThread(VOID)
HANDLE AUTHZ_RESOURCE_MANAGER_HANDLE
BOOL(CALLBACK * PFN_AUTHZ_COMPUTE_DYNAMIC_GROUPS)(IN AUTHZ_CLIENT_CONTEXT_HANDLE hAuthzClientContext, IN PVOID Args, OUT PSID_AND_ATTRIBUTES *pSidAttrArray, OUT PDWORD pSidCount, OUT PSID_AND_ATTRIBUTES *pRestrictedSidAttrArray, OUT PDWORD pRestrictedSidCount)
static BOOL AuthzpInitSelf(IN OUT PAUTHZ_RESMAN ResMan)
PFN_AUTHZ_DYNAMIC_ACCESS_CHECK pfnAccessCheck
DWORD WINAPI GetLengthSid(PSID pSid)
BOOL(CALLBACK * PFN_AUTHZ_DYNAMIC_ACCESS_CHECK)(IN AUTHZ_CLIENT_CONTEXT_HANDLE hAuthzClientContext, IN PACE_HEADER pAce, IN PVOID pArgs OPTIONAL, IN OUT PBOOL pbAceApplicable)
#define VALIDATE_RESMAN_HANDLE(handle)
struct _AUTHZ_RESMAN * PAUTHZ_RESMAN
#define AUTHZ_RM_FLAG_INITIALIZE_UNDER_IMPERSONATION
_CRTIMP wchar_t *__cdecl wcscpy(_Out_writes_z_(_String_length_(_Source)+1) wchar_t *_Dest, _In_z_ const wchar_t *_Source)
#define GetCurrentProcess()
PFN_AUTHZ_COMPUTE_DYNAMIC_GROUPS pfnComputeDynamicGroups
BOOL WINAPI OpenThreadToken(HANDLE ThreadHandle, DWORD DesiredAccess, BOOL OpenAsSelf, HANDLE *TokenHandle)
#define AUTHZ_RM_FLAG_NO_AUDIT
HLOCAL NTAPI LocalFree(HLOCAL hMem)
static BOOL AuthzpInitUnderImpersonation(IN OUT PAUTHZ_RESMAN ResMan)
BOOL WINAPI OpenProcessToken(HANDLE ProcessHandle, DWORD DesiredAccess, PHANDLE TokenHandle)
_CRTIMP size_t __cdecl wcslen(_In_z_ const wchar_t *_Str)
BOOL WINAPI GetTokenInformation(HANDLE TokenHandle, TOKEN_INFORMATION_CLASS TokenInformationClass, LPVOID TokenInformation, DWORD TokenInformationLength, PDWORD ReturnLength)
HLOCAL NTAPI LocalAlloc(UINT uFlags, SIZE_T dwBytes)
_Must_inspect_result_ _In_ WDFDEVICE _In_ PWDF_DEVICE_PROPERTY_DATA _In_ ULONG _Out_ PVOID _Out_ PULONG RequiredSize
static BOOL AuthzpQueryToken(IN OUT PAUTHZ_RESMAN ResMan, IN HANDLE hToken)
VOID(CALLBACK * PFN_AUTHZ_FREE_DYNAMIC_GROUPS)(IN PSID_AND_ATTRIBUTES pSidAttrArray)
PULONG MinorVersion OPTIONAL