(HANDLE, SE_OBJECT_TYPE, SECURITY_INFORMATION,
PSID *, PSID *, PACL *, PACL *,
PSECURITY_DESCRIPTOR *));
+DECL_WINDOWS_FUNCTION(WINSECUR_GLOBAL, DWORD, SetSecurityInfo,
+ (HANDLE, SE_OBJECT_TYPE, SECURITY_INFORMATION,
+ PSID, PSID, PACL, PACL));
DECL_WINDOWS_FUNCTION(WINSECUR_GLOBAL, DWORD, SetEntriesInAclA,
(ULONG, PEXPLICIT_ACCESS, PACL, PACL *));
int got_advapi(void);
-/*
- * Functions loaded from crypt32.dll.
- */
-DECL_WINDOWS_FUNCTION(WINSECUR_GLOBAL, BOOL, CryptProtectMemory,
- (LPVOID, DWORD, DWORD));
-int got_crypt(void);
-
/*
* Find the SID describing the current user. The return value (if not
* NULL for some error-related reason) is smalloced.
* servers, i.e. allowing access only to the current user id and also
* only local (i.e. not over SMB) connections.
*
- * If this function returns TRUE, then 'psd', 'networksid' and 'acl'
- * will all have been filled in with memory allocated using LocalAlloc
- * (and hence must be freed later using LocalFree). If it returns
- * FALSE, then instead 'error' has been filled with a dynamically
- * allocated error message.
+ * If this function returns TRUE, then 'psd' and 'acl' will have been
+ * filled in with memory allocated using LocalAlloc (and hence must be
+ * freed later using LocalFree). If it returns FALSE, then instead
+ * 'error' has been filled with a dynamically allocated error message.
*/
int make_private_security_descriptor(DWORD permissions,
PSECURITY_DESCRIPTOR *psd,
- PSID *networksid,
PACL *acl,
char **error);
+int setprocessacl(char *error);
+
#endif