/****************************************************************************** * LsaOpenPolicy [ADVAPI32.@] * * PARAMS * x1 [] * x2 [] * x3 [] * x4 [] */ NTSTATUS WINAPI LsaOpenPolicy( IN PLSA_UNICODE_STRING SystemName, IN PLSA_OBJECT_ATTRIBUTES ObjectAttributes, IN ACCESS_MASK DesiredAccess, IN OUT PLSA_HANDLE PolicyHandle) { FIXME("(%s,%p,0x%08x,%p):stub\n", SystemName?debugstr_w(SystemName->Buffer):"null", ObjectAttributes, DesiredAccess, PolicyHandle); dumpLsaAttributes(ObjectAttributes); if(PolicyHandle) *PolicyHandle = (LSA_HANDLE)0xcafe; return TRUE; }
/****************************************************************************** * LsaOpenPolicy [ADVAPI32.@] * * Opens a handle to the Policy object on a local or remote system. * * PARAMS * SystemName [I] Name of the target system. * ObjectAttributes [I] Connection attributes. * DesiredAccess [I] Requested access rights. * PolicyHandle [I/O] Handle to the Policy object. * * RETURNS * Success: STATUS_SUCCESS. * Failure: NTSTATUS code. * * NOTES * Set SystemName to NULL to open the local Policy object. */ NTSTATUS WINAPI LsaOpenPolicy( IN PLSA_UNICODE_STRING SystemName, IN PLSA_OBJECT_ATTRIBUTES ObjectAttributes, IN ACCESS_MASK DesiredAccess, IN OUT PLSA_HANDLE PolicyHandle) { FIXME("(%s,%p,0x%08x,%p) stub\n", SystemName?debugstr_w(SystemName->Buffer):"(null)", ObjectAttributes, DesiredAccess, PolicyHandle); ADVAPI_ForceLocalComputer(SystemName ? SystemName->Buffer : NULL, STATUS_ACCESS_VIOLATION); dumpLsaAttributes(ObjectAttributes); if(PolicyHandle) *PolicyHandle = (LSA_HANDLE)0xcafe; return STATUS_SUCCESS; }