wine.inf: We should not override existing associations.
[wine/hacks.git] / dlls / advapi32 / lsa.c
blob42221f3d3075e5cd580a158ec4063abe4e47359c
1 /*
2 * Implementation of the Local Security Authority API
4 * Copyright 1999 Juergen Schmied
5 * Copyright 2002 Andriy Palamarchuk
6 * Copyright 2004 Mike McCormack
7 * Copyright 2005 Hans Leidekker
9 * This library is free software; you can redistribute it and/or
10 * modify it under the terms of the GNU Lesser General Public
11 * License as published by the Free Software Foundation; either
12 * version 2.1 of the License, or (at your option) any later version.
14 * This library is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
17 * Lesser General Public License for more details.
19 * You should have received a copy of the GNU Lesser General Public
20 * License along with this library; if not, write to the Free Software
21 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
24 #include <stdarg.h>
26 #include "ntstatus.h"
27 #define WIN32_NO_STATUS
28 #include "windef.h"
29 #include "winbase.h"
30 #include "winreg.h"
31 #include "winternl.h"
32 #include "ntsecapi.h"
33 #include "advapi32_misc.h"
35 #include "wine/debug.h"
37 WINE_DEFAULT_DEBUG_CHANNEL(advapi);
39 #define ADVAPI_ForceLocalComputer(ServerName, FailureCode) \
40 if (!ADVAPI_IsLocalComputer(ServerName)) \
41 { \
42 FIXME("Action Implemented for local computer only. " \
43 "Requested for server %s\n", debugstr_w(ServerName)); \
44 return FailureCode; \
47 static void dumpLsaAttributes(PLSA_OBJECT_ATTRIBUTES oa)
49 if (oa)
51 TRACE("\n\tlength=%lu, rootdir=%p, objectname=%s\n\tattr=0x%08lx, sid=%p qos=%p\n",
52 oa->Length, oa->RootDirectory,
53 oa->ObjectName?debugstr_w(oa->ObjectName->Buffer):"null",
54 oa->Attributes, oa->SecurityDescriptor, oa->SecurityQualityOfService);
58 /******************************************************************************
59 * LsaAddAccountRights [ADVAPI32.@]
62 NTSTATUS WINAPI LsaAddAccountRights(
63 LSA_HANDLE policy,
64 PSID sid,
65 PLSA_UNICODE_STRING rights,
66 ULONG count)
68 FIXME("(%p,%p,%p,0x%08lx) stub\n", policy, sid, rights, count);
69 return STATUS_OBJECT_NAME_NOT_FOUND;
72 /******************************************************************************
73 * LsaClose [ADVAPI32.@]
75 * Closes a handle to a Policy or TrustedDomain.
77 * PARAMS
78 * ObjectHandle [I] Handle to a Policy or TrustedDomain.
80 * RETURNS
81 * Success: STATUS_SUCCESS.
82 * Failure: NTSTATUS code.
84 NTSTATUS WINAPI LsaClose(IN LSA_HANDLE ObjectHandle)
86 FIXME("(%p) stub\n", ObjectHandle);
87 return STATUS_SUCCESS;
90 /******************************************************************************
91 * LsaCreateTrustedDomainEx [ADVAPI32.@]
94 NTSTATUS WINAPI LsaCreateTrustedDomainEx(
95 LSA_HANDLE policy,
96 PTRUSTED_DOMAIN_INFORMATION_EX domain_info,
97 PTRUSTED_DOMAIN_AUTH_INFORMATION auth_info,
98 ACCESS_MASK access,
99 PLSA_HANDLE domain)
101 FIXME("(%p,%p,%p,0x%08lx,%p) stub\n", policy, domain_info, auth_info,
102 access, domain);
103 return STATUS_SUCCESS;
106 /******************************************************************************
107 * LsaDeleteTrustedDomain [ADVAPI32.@]
110 NTSTATUS WINAPI LsaDeleteTrustedDomain(LSA_HANDLE policy, PSID sid)
112 FIXME("(%p,%p) stub\n", policy, sid);
113 return STATUS_SUCCESS;
116 /******************************************************************************
117 * LsaEnumerateAccountRights [ADVAPI32.@]
120 NTSTATUS WINAPI LsaEnumerateAccountRights(
121 LSA_HANDLE policy,
122 PSID sid,
123 PLSA_UNICODE_STRING *rights,
124 PULONG count)
126 FIXME("(%p,%p,%p,%p) stub\n", policy, sid, rights, count);
127 return STATUS_OBJECT_NAME_NOT_FOUND;
130 /******************************************************************************
131 * LsaEnumerateAccountsWithUserRight [ADVAPI32.@]
134 NTSTATUS WINAPI LsaEnumerateAccountsWithUserRight(
135 LSA_HANDLE policy,
136 PLSA_UNICODE_STRING rights,
137 PVOID *buffer,
138 PULONG count)
140 FIXME("(%p,%p,%p,%p) stub\n", policy, rights, buffer, count);
141 return STATUS_NO_MORE_ENTRIES;
144 /******************************************************************************
145 * LsaEnumerateTrustedDomains [ADVAPI32.@]
147 * Returns the names and SIDs of trusted domains.
149 * PARAMS
150 * PolicyHandle [I] Handle to a Policy object.
151 * EnumerationContext [I] Pointer to an enumeration handle.
152 * Buffer [O] Contains the names and SIDs of trusted domains.
153 * PreferredMaximumLength[I] Preferred maximum size in bytes of Buffer.
154 * CountReturned [O] Number of elements in Buffer.
156 * RETURNS
157 * Success: STATUS_SUCCESS,
158 * STATUS_MORE_ENTRIES,
159 * STATUS_NO_MORE_ENTRIES
160 * Failure: NTSTATUS code.
162 * NOTES
163 * LsaEnumerateTrustedDomains can be called multiple times to enumerate
164 * all trusted domains.
166 NTSTATUS WINAPI LsaEnumerateTrustedDomains(
167 IN LSA_HANDLE PolicyHandle,
168 IN PLSA_ENUMERATION_HANDLE EnumerationContext,
169 OUT PVOID* Buffer,
170 IN ULONG PreferredMaximumLength,
171 OUT PULONG CountReturned)
173 FIXME("(%p,%p,%p,0x%08lx,%p) stub\n", PolicyHandle, EnumerationContext,
174 Buffer, PreferredMaximumLength, CountReturned);
176 if (CountReturned) *CountReturned = 0;
177 return STATUS_SUCCESS;
180 /******************************************************************************
181 * LsaEnumerateTrustedDomainsEx [ADVAPI32.@]
184 NTSTATUS WINAPI LsaEnumerateTrustedDomainsEx(
185 LSA_HANDLE policy,
186 PLSA_ENUMERATION_HANDLE context,
187 PVOID *buffer,
188 ULONG length,
189 PULONG count)
191 FIXME("(%p,%p,%p,0x%08lx,%p) stub\n", policy, context, buffer, length, count);
193 if (count) *count = 0;
194 return STATUS_SUCCESS;
197 /******************************************************************************
198 * LsaFreeMemory [ADVAPI32.@]
200 * Frees memory allocated by a LSA function.
202 * PARAMS
203 * Buffer [I] Memory buffer to free.
205 * RETURNS
206 * Success: STATUS_SUCCESS.
207 * Failure: NTSTATUS code.
209 NTSTATUS WINAPI LsaFreeMemory(IN PVOID Buffer)
211 TRACE("(%p)\n", Buffer);
212 return HeapFree(GetProcessHeap(), 0, Buffer);
215 /******************************************************************************
216 * LsaLookupNames [ADVAPI32.@]
218 * Returns the SIDs of an array of user, group, or local group names.
220 * PARAMS
221 * PolicyHandle [I] Handle to a Policy object.
222 * Count [I] Number of names in Names.
223 * Names [I] Array of names to lookup.
224 * ReferencedDomains [O] Array of domains where the names were found.
225 * Sids [O] Array of SIDs corresponding to Names.
227 * RETURNS
228 * Success: STATUS_SUCCESS,
229 * STATUS_SOME_NOT_MAPPED
230 * Failure: STATUS_NONE_MAPPED or NTSTATUS code.
232 NTSTATUS WINAPI LsaLookupNames(
233 IN LSA_HANDLE PolicyHandle,
234 IN ULONG Count,
235 IN PLSA_UNICODE_STRING Names,
236 OUT PLSA_REFERENCED_DOMAIN_LIST* ReferencedDomains,
237 OUT PLSA_TRANSLATED_SID* Sids)
239 FIXME("(%p,0x%08lx,%p,%p,%p) stub\n", PolicyHandle, Count, Names,
240 ReferencedDomains, Sids);
242 return STATUS_NONE_MAPPED;
245 /******************************************************************************
246 * LsaLookupNames2 [ADVAPI32.@]
249 NTSTATUS WINAPI LsaLookupNames2(
250 LSA_HANDLE policy,
251 ULONG flags,
252 ULONG count,
253 PLSA_UNICODE_STRING names,
254 PLSA_REFERENCED_DOMAIN_LIST *domains,
255 PLSA_TRANSLATED_SID2 *sids)
257 FIXME("(%p,0x%08lx,0x%08lx,%p,%p,%p) stub\n", policy, flags, count, names, domains, sids);
258 return STATUS_NONE_MAPPED;
261 /******************************************************************************
262 * LsaLookupSids [ADVAPI32.@]
264 * Looks up the names that correspond to an array of SIDs.
266 * PARAMS
267 * PolicyHandle [I] Handle to a Policy object.
268 * Count [I] Number of SIDs in the Sids array.
269 * Sids [I] Array of SIDs to lookup.
270 * ReferencedDomains [O] Array of domains where the sids were found.
271 * Names [O] Array of names corresponding to Sids.
273 * RETURNS
274 * Success: STATUS_SUCCESS,
275 * STATUS_SOME_NOT_MAPPED
276 * Failure: STATUS_NONE_MAPPED or NTSTATUS code.
278 NTSTATUS WINAPI LsaLookupSids(
279 IN LSA_HANDLE PolicyHandle,
280 IN ULONG Count,
281 IN PSID *Sids,
282 OUT PLSA_REFERENCED_DOMAIN_LIST *ReferencedDomains,
283 OUT PLSA_TRANSLATED_NAME *Names )
285 FIXME("(%p,%lu,%p,%p,%p) stub\n", PolicyHandle, Count, Sids,
286 ReferencedDomains, Names);
288 return STATUS_NONE_MAPPED;
291 /******************************************************************************
292 * LsaNtStatusToWinError [ADVAPI32.@]
294 * Converts an LSA NTSTATUS code to a Windows error code.
296 * PARAMS
297 * Status [I] NTSTATUS code.
299 * RETURNS
300 * Success: Corresponding Windows error code.
301 * Failure: ERROR_MR_MID_NOT_FOUND.
303 ULONG WINAPI LsaNtStatusToWinError(NTSTATUS Status)
305 return RtlNtStatusToDosError(Status);
308 /******************************************************************************
309 * LsaOpenPolicy [ADVAPI32.@]
311 * Opens a handle to the Policy object on a local or remote system.
313 * PARAMS
314 * SystemName [I] Name of the target system.
315 * ObjectAttributes [I] Connection attributes.
316 * DesiredAccess [I] Requested access rights.
317 * PolicyHandle [I/O] Handle to the Policy object.
319 * RETURNS
320 * Success: STATUS_SUCCESS.
321 * Failure: NTSTATUS code.
323 * NOTES
324 * Set SystemName to NULL to open the local Policy object.
326 NTSTATUS WINAPI LsaOpenPolicy(
327 IN PLSA_UNICODE_STRING SystemName,
328 IN PLSA_OBJECT_ATTRIBUTES ObjectAttributes,
329 IN ACCESS_MASK DesiredAccess,
330 IN OUT PLSA_HANDLE PolicyHandle)
332 FIXME("(%s,%p,0x%08lx,%p) stub\n",
333 SystemName?debugstr_w(SystemName->Buffer):"(null)",
334 ObjectAttributes, DesiredAccess, PolicyHandle);
336 ADVAPI_ForceLocalComputer(SystemName ? SystemName->Buffer : NULL,
337 STATUS_ACCESS_VIOLATION);
338 dumpLsaAttributes(ObjectAttributes);
340 if(PolicyHandle) *PolicyHandle = (LSA_HANDLE)0xcafe;
341 return STATUS_SUCCESS;
344 /******************************************************************************
345 * LsaOpenTrustedDomainByName [ADVAPI32.@]
348 NTSTATUS WINAPI LsaOpenTrustedDomainByName(
349 LSA_HANDLE policy,
350 PLSA_UNICODE_STRING name,
351 ACCESS_MASK access,
352 PLSA_HANDLE handle)
354 FIXME("(%p,%p,0x%08lx,%p) stub\n", policy, name, access, handle);
355 return STATUS_OBJECT_NAME_NOT_FOUND;
358 /******************************************************************************
359 * LsaQueryInformationPolicy [ADVAPI32.@]
361 * Returns information about a Policy object.
363 * PARAMS
364 * PolicyHandle [I] Handle to a Policy object.
365 * InformationClass [I] Type of information to retrieve.
366 * Buffer [O] Pointer to the requested information.
368 * RETURNS
369 * Success: STATUS_SUCCESS.
370 * Failure: NTSTATUS code.
372 NTSTATUS WINAPI LsaQueryInformationPolicy(
373 IN LSA_HANDLE PolicyHandle,
374 IN POLICY_INFORMATION_CLASS InformationClass,
375 OUT PVOID *Buffer)
377 TRACE("(%p,0x%08x,%p)\n", PolicyHandle, InformationClass, Buffer);
379 if(!Buffer) return STATUS_INVALID_PARAMETER;
380 switch (InformationClass)
382 case PolicyAuditEventsInformation: /* 2 */
384 PPOLICY_AUDIT_EVENTS_INFO p = HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY,
385 sizeof(POLICY_AUDIT_EVENTS_INFO));
386 p->AuditingMode = FALSE; /* no auditing */
387 *Buffer = p;
389 break;
390 case PolicyPrimaryDomainInformation: /* 3 */
392 /* Only the domain name is valid for the local computer.
393 * All other fields are zero.
395 PPOLICY_PRIMARY_DOMAIN_INFO pinfo = HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY,
396 sizeof(POLICY_PRIMARY_DOMAIN_INFO));
397 HKEY key;
398 BOOL useDefault = TRUE;
399 LONG ret;
401 if ((ret = RegOpenKeyExA(HKEY_LOCAL_MACHINE,
402 "System\\CurrentControlSet\\Services\\VxD\\VNETSUP", 0,
403 KEY_READ, &key)) == ERROR_SUCCESS)
405 DWORD size = 0;
406 static const WCHAR wg[] = { 'W','o','r','k','g','r','o','u','p',0 };
408 ret = RegQueryValueExW(key, wg, NULL, NULL, NULL, &size);
409 if (ret == ERROR_MORE_DATA || ret == ERROR_SUCCESS)
411 pinfo->Name.Buffer = HeapAlloc(GetProcessHeap(),
412 HEAP_ZERO_MEMORY, size);
414 if ((ret = RegQueryValueExW(key, wg, NULL, NULL,
415 (LPBYTE)pinfo->Name.Buffer, &size)) == ERROR_SUCCESS)
417 pinfo->Name.Length = (USHORT)(size - sizeof(WCHAR));
418 pinfo->Name.MaximumLength = (USHORT)size;
419 useDefault = FALSE;
421 else
423 HeapFree(GetProcessHeap(), 0, pinfo->Name.Buffer);
424 pinfo->Name.Buffer = NULL;
427 RegCloseKey(key);
429 if (useDefault)
430 RtlCreateUnicodeStringFromAsciiz(&(pinfo->Name), "DOMAIN");
432 TRACE("setting domain to %s\n", debugstr_w(pinfo->Name.Buffer));
434 *Buffer = pinfo;
436 break;
437 case PolicyAccountDomainInformation: /* 5 */
439 struct di
441 POLICY_ACCOUNT_DOMAIN_INFO info;
442 SID sid;
443 DWORD padding[3];
446 struct di * xdi = HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, sizeof(*xdi));
447 DWORD dwSize = MAX_COMPUTERNAME_LENGTH + 1;
448 LPWSTR buf = HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, dwSize * sizeof(WCHAR));
450 xdi->info.DomainName.MaximumLength = dwSize * sizeof(WCHAR);
452 if (GetComputerNameW(buf, &dwSize))
454 xdi->info.DomainName.Buffer = buf;
455 xdi->info.DomainName.Length = dwSize * sizeof(WCHAR);
458 TRACE("setting name to %s\n", debugstr_w(xdi->info.DomainName.Buffer));
460 xdi->info.DomainSid = &(xdi->sid);
462 /* read the computer SID from the registry */
463 if (!ADVAPI_GetComputerSid(&(xdi->sid)))
465 HeapFree(GetProcessHeap(), 0, buf);
466 HeapFree(GetProcessHeap(), 0, xdi);
468 WARN("Computer SID not found\n");
470 return STATUS_UNSUCCESSFUL;
473 TRACE("setting SID to %s\n", debugstr_sid(&xdi->sid));
475 *Buffer = xdi;
477 break;
478 case PolicyDnsDomainInformation: /* 12 (0xc) */
480 /* Only the domain name is valid for the local computer.
481 * All other fields are zero.
483 PPOLICY_DNS_DOMAIN_INFO pinfo = HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY,
484 sizeof(POLICY_DNS_DOMAIN_INFO));
485 HKEY key;
486 BOOL useDefault = TRUE;
487 LONG ret;
489 if ((ret = RegOpenKeyExA(HKEY_LOCAL_MACHINE,
490 "System\\CurrentControlSet\\Services\\VxD\\VNETSUP", 0,
491 KEY_READ, &key)) == ERROR_SUCCESS)
493 DWORD size = 0;
494 static const WCHAR wg[] = { 'W','o','r','k','g','r','o','u','p',0 };
496 ret = RegQueryValueExW(key, wg, NULL, NULL, NULL, &size);
497 if (ret == ERROR_MORE_DATA || ret == ERROR_SUCCESS)
499 pinfo->Name.Buffer = HeapAlloc(GetProcessHeap(),
500 HEAP_ZERO_MEMORY, size);
502 if ((ret = RegQueryValueExW(key, wg, NULL, NULL,
503 (LPBYTE)pinfo->Name.Buffer, &size)) == ERROR_SUCCESS)
505 pinfo->Name.Length = (USHORT)(size - sizeof(WCHAR));
506 pinfo->Name.MaximumLength = (USHORT)size;
507 useDefault = FALSE;
509 else
511 HeapFree(GetProcessHeap(), 0, pinfo->Name.Buffer);
512 pinfo->Name.Buffer = NULL;
515 RegCloseKey(key);
517 if (useDefault)
518 RtlCreateUnicodeStringFromAsciiz(&(pinfo->Name), "DOMAIN");
520 TRACE("setting domain to %s\n", debugstr_w(pinfo->Name.Buffer));
522 *Buffer = pinfo;
524 break;
525 case PolicyAuditLogInformation:
526 case PolicyPdAccountInformation:
527 case PolicyLsaServerRoleInformation:
528 case PolicyReplicaSourceInformation:
529 case PolicyDefaultQuotaInformation:
530 case PolicyModificationInformation:
531 case PolicyAuditFullSetInformation:
532 case PolicyAuditFullQueryInformation:
534 FIXME("category %d not implemented\n", InformationClass);
535 return STATUS_UNSUCCESSFUL;
538 return STATUS_SUCCESS;
541 /******************************************************************************
542 * LsaQueryTrustedDomainInfo [ADVAPI32.@]
545 NTSTATUS WINAPI LsaQueryTrustedDomainInfo(
546 LSA_HANDLE policy,
547 PSID sid,
548 TRUSTED_INFORMATION_CLASS class,
549 PVOID *buffer)
551 FIXME("(%p,%p,%d,%p) stub\n", policy, sid, class, buffer);
552 return STATUS_OBJECT_NAME_NOT_FOUND;
555 /******************************************************************************
556 * LsaQueryTrustedDomainInfoByName [ADVAPI32.@]
559 NTSTATUS WINAPI LsaQueryTrustedDomainInfoByName(
560 LSA_HANDLE policy,
561 PLSA_UNICODE_STRING name,
562 TRUSTED_INFORMATION_CLASS class,
563 PVOID *buffer)
565 FIXME("(%p,%p,%d,%p) stub\n", policy, name, class, buffer);
566 return STATUS_OBJECT_NAME_NOT_FOUND;
569 /******************************************************************************
570 * LsaRegisterPolicyChangeNotification [ADVAPI32.@]
573 NTSTATUS WINAPI LsaRegisterPolicyChangeNotification(
574 POLICY_NOTIFICATION_INFORMATION_CLASS class,
575 HANDLE event)
577 FIXME("(%d,%p) stub\n", class, event);
578 return STATUS_UNSUCCESSFUL;
581 /******************************************************************************
582 * LsaRemoveAccountRights [ADVAPI32.@]
585 NTSTATUS WINAPI LsaRemoveAccountRights(
586 LSA_HANDLE policy,
587 PSID sid,
588 BOOLEAN all,
589 PLSA_UNICODE_STRING rights,
590 ULONG count)
592 FIXME("(%p,%p,%d,%p,0x%08lx) stub\n", policy, sid, all, rights, count);
593 return STATUS_SUCCESS;
596 /******************************************************************************
597 * LsaRetrievePrivateData [ADVAPI32.@]
599 * Retrieves data stored by LsaStorePrivateData.
601 * PARAMS
602 * PolicyHandle [I] Handle to a Policy object.
603 * KeyName [I] Name of the key where the data is stored.
604 * PrivateData [O] Pointer to the private data.
606 * RETURNS
607 * Success: STATUS_SUCCESS.
608 * Failure: STATUS_OBJECT_NAME_NOT_FOUND or NTSTATUS code.
610 NTSTATUS WINAPI LsaRetrievePrivateData(
611 IN LSA_HANDLE PolicyHandle,
612 IN PLSA_UNICODE_STRING KeyName,
613 OUT PLSA_UNICODE_STRING* PrivateData)
615 FIXME("(%p,%p,%p) stub\n", PolicyHandle, KeyName, PrivateData);
616 return STATUS_OBJECT_NAME_NOT_FOUND;
619 /******************************************************************************
620 * LsaSetInformationPolicy [ADVAPI32.@]
622 * Modifies information in a Policy object.
624 * PARAMS
625 * PolicyHandle [I] Handle to a Policy object.
626 * InformationClass [I] Type of information to set.
627 * Buffer [I] Pointer to the information to set.
629 * RETURNS
630 * Success: STATUS_SUCCESS.
631 * Failure: NTSTATUS code.
633 NTSTATUS WINAPI LsaSetInformationPolicy(
634 IN LSA_HANDLE PolicyHandle,
635 IN POLICY_INFORMATION_CLASS InformationClass,
636 IN PVOID Buffer)
638 FIXME("(%p,0x%08x,%p) stub\n", PolicyHandle, InformationClass, Buffer);
640 return STATUS_UNSUCCESSFUL;
643 /******************************************************************************
644 * LsaSetTrustedDomainInfoByName [ADVAPI32.@]
647 NTSTATUS WINAPI LsaSetTrustedDomainInfoByName(
648 LSA_HANDLE policy,
649 PLSA_UNICODE_STRING name,
650 TRUSTED_INFORMATION_CLASS class,
651 PVOID buffer)
653 FIXME("(%p,%p,%d,%p) stub\n", policy, name, class, buffer);
654 return STATUS_SUCCESS;
657 /******************************************************************************
658 * LsaSetTrustedDomainInformation [ADVAPI32.@]
661 NTSTATUS WINAPI LsaSetTrustedDomainInformation(
662 LSA_HANDLE policy,
663 PSID sid,
664 TRUSTED_INFORMATION_CLASS class,
665 PVOID buffer)
667 FIXME("(%p,%p,%d,%p) stub\n", policy, sid, class, buffer);
668 return STATUS_SUCCESS;
671 /******************************************************************************
672 * LsaStorePrivateData [ADVAPI32.@]
674 * Stores or deletes a Policy object's data under the specified reg key.
676 * PARAMS
677 * PolicyHandle [I] Handle to a Policy object.
678 * KeyName [I] Name of the key where the data will be stored.
679 * PrivateData [O] Pointer to the private data.
681 * RETURNS
682 * Success: STATUS_SUCCESS.
683 * Failure: STATUS_OBJECT_NAME_NOT_FOUND or NTSTATUS code.
685 NTSTATUS WINAPI LsaStorePrivateData(
686 IN LSA_HANDLE PolicyHandle,
687 IN PLSA_UNICODE_STRING KeyName,
688 IN PLSA_UNICODE_STRING PrivateData)
690 FIXME("(%p,%p,%p) stub\n", PolicyHandle, KeyName, PrivateData);
691 return STATUS_OBJECT_NAME_NOT_FOUND;
694 /******************************************************************************
695 * LsaUnregisterPolicyChangeNotification [ADVAPI32.@]
698 NTSTATUS WINAPI LsaUnregisterPolicyChangeNotification(
699 POLICY_NOTIFICATION_INFORMATION_CLASS class,
700 HANDLE event)
702 FIXME("(%d,%p) stub\n", class, event);
703 return STATUS_SUCCESS;