~ubuntu-branches/ubuntu/quantal/open-vm-tools/quantal-201210021442

« back to all changes in this revision

Viewing changes to lib/include/win32util.h

  • Committer: Bazaar Package Importer
  • Author(s): Serge Hallyn
  • Date: 2011-03-31 14:20:05 UTC
  • mfrom: (1.4.3 upstream)
  • Revision ID: james.westby@ubuntu.com-20110331142005-3n9red91p7ogkweo
Tags: 2011.03.28-387002-0ubuntu1
* Merge latest upstream git tag.  This has the unlocked_ioctl change
  needed to fix dkms build failures (LP: #727342)
* Changes in debian/rules:
  - work around a bug in toolbox/Makefile, where install-exec-hook is
    not happening.  This needs to get fixed the right way.
  - don't install 'vmware-user' which seems to no longer exist
  - move /etc/xdg into open-vm-toolbox (which should be done using .install)
* debian/open-vm-tools.init: add 'modprobe [-r] vmblock'. (LP: #332323)
* debian/rules and debian/open-vm-toolbox.lintian-overrides:
  - Make vmware-user-suid-wrapper suid-root (LP: #332323)

Show diffs side-by-side

added added

removed removed

Lines of Context:
154
154
                              ConstUnicode paramMsgFile);
155
155
Bool W32Util_UnregisterEventLog(ConstUnicode serviceName);
156
156
 
157
 
Bool W32Util_SetSDWithVmGroupPriv(PSECURITY_DESCRIPTOR pSecurityDescriptor,
158
 
                                  DWORD accessType, PACL *pAcl,
159
 
                                  Unicode *errString);
 
157
typedef enum SetSDPrivsAccounts {
 
158
   SDPRIV_GROUP_ADMIN = 0x1,
 
159
   SDPRIV_GROUP_VMWARE = 0x2,
 
160
   SDPRIV_USER_CURRENT = 0x4,
 
161
} SetSDPrivsAccounts;
160
162
 
161
 
Bool W32Util_SetSDWithVmGroupPrivEx(PSECURITY_DESCRIPTOR pSecurityDescriptor,
162
 
                                    DWORD accessType, Bool addCurrentUser,
163
 
                                    PACL *pAcl, Unicode *errString);
 
163
Bool W32Util_SetSDPrivs(PSECURITY_DESCRIPTOR pSecurityDescriptor,
 
164
                        DWORD accessType, SetSDPrivsAccounts accounts,
 
165
                        PACL *pAcl, Unicode *errString);
164
166
 
165
167
BOOL W32Util_SetSecurityDescriptorW(PSECURITY_DESCRIPTOR pSecurityDescriptor,
166
168
                                    ConstUnicode Owner, PACL *pAcl);
187
189
 
188
190
Bool W32Util_GetCurrentUserSid(PSID *pSid);
189
191
Bool W32Util_GetLocalAdminGroupSid(PSID *pSid);
190
 
Bool W32Util_GetLocalAdminGroupSid(PSID *pSid);
 
192
Bool W32Util_GetVMwareGroupSid(PSID *pSid);
191
193
Bool W32Util_MakeSafeDirectory(ConstUnicode path);
192
194
Bool W32Util_IsDirectorySafe(ConstUnicode path);
193
195
Bool W32Util_DoesVolumeSupportAcls(ConstUnicode path);
216
218
 
217
219
Unicode W32Util_GetPipeNameFromFilePath(ConstUnicode fileName);
218
220
 
 
221
Bool W32Util_CheckGroupMembership(HANDLE hToken,
 
222
                                  BOOL respectUAC,
 
223
                                  Unicode *errString,
 
224
                                  BOOL *bMember);
 
225
 
 
226
Bool W32Util_DismountVolumes(uint16 drive,
 
227
                             uint64 offset,
 
228
                             uint64 size,
 
229
                             void **handle);
 
230
void W32Util_CloseDismountHandle(void *handle);
 
231
 
219
232
#endif // _WIN32
220
233
#endif // WIN32UTIL_H_