Advertisement
Guest User

Untitled

a guest
Jun 26th, 2018
166
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 51.59 KB | None | 0 0
  1. [REG_ERROR] RegCloseKey(HKEY hKey);
  2. [REG_ERROR] RegConnectRegistry(LPCTSTR lpMachineName,HKEY hKey,PHKEY phkResult);
  3. [REG_ERROR] RegCopyTree(HKEY hKeySrc,LPCTSTR lpSubKey,HKEY hKeyDest);
  4. [REG_ERROR] RegCreateKeyEx(HKEY hKey,LPCTSTR lpSubKey,DWORD Reserved,LPTSTR lpClass,[RegOptions] dwOptions,REGSAM samDesired,LPSECURITY_ATTRIBUTES lpSecurityAttributes,PHKEY phkResult,[RegDisposition*] lpdwDisposition);
  5. [REG_ERROR] RegCreateKeyTransacted(HKEY hKey,LPCTSTR lpSubKey,DWORD Reserved,LPTSTR lpClass,[RegOptions] dwOptions,REGSAM samDesired,const LPSECURITY_ATTRIBUTES lpSecurityAttributes,PHKEY phkResult,[RegDisposition*] lpdwDisposition,HANDLE hTransaction,PVOID pExtendedParemeter);
  6. [REG_ERROR] RegDeleteKey(HKEY hKey,LPCTSTR lpSubKey);
  7. [REG_ERROR] RegDeleteKeyEx(HKEY hKey,LPCTSTR lpSubKey,REGSAM samDesired,DWORD Reserved);
  8. [REG_ERROR] RegDeleteKeyTransacted(HKEY hKey,LPCTSTR lpSubKey,REGSAM samDesired,DWORD Reserved,HANDLE hTransaction,PVOID pExtendedParameter);
  9. [REG_ERROR] RegDeleteKeyValue(HKEY hKey,LPCTSTR lpSubKey,LPCTSTR lpValueName);
  10. [REG_ERROR] RegDeleteTree(HKEY hKey,LPCTSTR lpSubKey);
  11. [REG_ERROR] RegDeleteValue(HKEY hKey,LPCTSTR lpValueName);
  12. [REG_ERROR] RegDisablePredefinedCache();
  13. [REG_ERROR] RegDisablePredefinedCacheEx();
  14. [REG_ERROR] RegDisableReflectionKey(HKEY hBase);
  15. [REG_ERROR] RegEnableReflectionKey(HKEY hBase);
  16. [REG_ERROR] RegEnumKeyEx(HKEY hKey,DWORD dwIndex,LPTSTR lpName,LPDWORD lpcName,LPDWORD lpReserved,LPTSTR lpClass,LPDWORD lpcClass,PFILETIME lpftLastWriteTime);
  17. [REG_ERROR] RegEnumValue(HKEY hKey,DWORD dwIndex,LPTSTR lpValueName,LPDWORD lpcchValueName,LPDWORD lpReserved,[RegType*] lpType,LPBYTE lpData,LPDWORD lpcbData);
  18. [REG_ERROR] RegFlushKey(HKEY hKey);
  19. [REG_ERROR] RegGetValue(HKEY hkey,LPCTSTR lpSubKey,LPCTSTR lpValue,DWORD dwFlags,[RegType*] pdwType,PVOID pvData,LPDWORD pcbData);
  20. [REG_ERROR] RegLoadAppKey(LPCTSTR lpFile,PHKEY phkResult,REGSAM samDesired,[RegLoadAppKey_Options] dwOptions,DWORD Reserved);
  21. [REG_ERROR] RegLoadKey(HKEY hKey,LPCTSTR lpSubKey,LPCTSTR lpFile);
  22. [REG_ERROR] RegLoadMUIString(HKEY hKey,LPCTSTR pszValue,LPTSTR pszOutBuf,DWORD cbOutBuf,LPDWORD pcbData,[RegMuiFlags] Flags,LPCTSTR pszDirectory);
  23. [REG_ERROR] RegNotifyChangeKeyValue(HKEY hKey,BOOL bWatchSubtree,[RegNotifyFlags] dwNotifyFilter,HANDLE hEvent,BOOL fAsynchronous);
  24. [REG_ERROR] RegOpenCurrentUser(REGSAM samDesired,PHKEY phkResult);
  25. [REG_ERROR] RegOpenKeyEx(HKEY hKey,LPCTSTR lpSubKey,DWORD ulOptions,REGSAM samDesired,PHKEY phkResult);
  26. [REG_ERROR] RegOpenKeyTransacted(HKEY hKey,LPCTSTR lpSubKey,DWORD ulOptions,REGSAM samDesired,PHKEY phkResult,HANDLE hTransaction,PVOID pExtendedParameter);
  27. [REG_ERROR] RegOpenUserClassesRoot(HANDLE hToken,DWORD dwOptions,REGSAM samDesired,PHKEY phkResult);
  28. [REG_ERROR] RegOverridePredefKey(HKEY hKey,HKEY hNewHKey);
  29. [REG_ERROR] RegQueryInfoKey(HKEY hKey,LPTSTR lpClass,LPDWORD lpcClass,LPDWORD lpReserved,LPDWORD lpcSubKeys,LPDWORD lpcMaxSubKeyLen,LPDWORD lpcMaxClassLen,LPDWORD lpcValues,LPDWORD lpcMaxValueNameLen,LPDWORD lpcMaxValueLen,LPDWORD lpcbSecurityDescriptor,PFILETIME lpftLastWriteTime);
  30. [REG_ERROR] RegQueryMultipleValues(HKEY hKey,PVALENT val_list,DWORD num_vals,LPVOID lpValueBuf,LPDWORD ldwTotsize);
  31. [REG_ERROR] RegQueryReflectionKey(HKEY hBase,BOOL* bIsReflectionDisabled);
  32. [REG_ERROR] RegQueryValueEx(HKEY hKey,LPCTSTR lpValueName,LPDWORD lpReserved,[RegType*] lpType,LPBYTE lpData,LPDWORD lpcbData);
  33. [REG_ERROR] RegReplaceKey(HKEY hKey,LPCTSTR lpSubKey,LPCTSTR lpNewFile,LPCTSTR lpOldFile);
  34. [REG_ERROR] RegRestoreKey(HKEY hKey,LPCTSTR lpFile,DWORD dwFlags);
  35. [REG_ERROR] RegSaveKey(HKEY hKey,LPCTSTR lpFile,LPSECURITY_ATTRIBUTES lpSecurityAttributes);
  36. [REG_ERROR] RegSaveKeyEx(HKEY hKey,LPCTSTR lpFile,LPSECURITY_ATTRIBUTES lpSecurityAttributes,DWORD Flags);
  37. [REG_ERROR] RegSetKeyValue(HKEY hKey,LPCTSTR lpSubKey,LPCTSTR lpValueName,[RegType] dwType,LPCVOID lpData,DWORD cbData);
  38. [REG_ERROR] RegSetValueEx(HKEY hKey,LPCTSTR lpValueName,DWORD Reserved,[RegType] dwType,const BYTE* lpData,DWORD cbData);
  39. [REG_ERROR] RegUnLoadKey(HKEY hKey,LPCTSTR lpSubKey);
  40. [REG_ERROR] RegCreateKey(HKEY hKey,LPCTSTR lpSubKey,PHKEY phkResult);
  41. [REG_ERROR] RegEnumKey(HKEY hKey,DWORD dwIndex,LPTSTR lpName,DWORD cchName);
  42. [REG_ERROR] RegOpenKey(HKEY hKey,LPCTSTR lpSubKey,PHKEY phkResult);
  43. [REG_ERROR] RegQueryValue(HKEY hKey,LPCTSTR lpSubKey,LPTSTR lpValue,PLONG lpcbValue);
  44. [REG_ERROR] RegSetValue(HKEY hKey,LPCTSTR lpSubKey,[RegType] dwType,LPCTSTR lpData,DWORD cbData);
  45. [ERROR_CODE] AddUsersToEncryptedFile(LPCWSTR lpFileName,PENCRYPTION_CERTIFICATE_LIST pUsers);
  46. void CloseEncryptedFileRaw(PVOID pvContext);
  47. BOOL DecryptFile(LPCTSTR lpFileName,DWORD dwReserved);
  48. [ERROR_CODE] DuplicateEncryptionInfoFile(LPCTSTR SrcFileName,LPCTSTR DstFileName,DWORD dwCreationDistribution,DWORD dwAttributes,const LPSECURITY_ATTRIBUTES lpSecurityAttributes);
  49. BOOL EncryptFile(LPCTSTR lpFileName);
  50. BOOL EncryptionDisable(LPCWSTR DirPath,BOOL Disable);
  51. BOOL FileEncryptionStatus(LPCTSTR lpFileName,LPDWORD lpStatus);
  52. void FreeEncryptionCertificateHashList(PENCRYPTION_CERTIFICATE_HASH_LIST pHashes);
  53. [ERROR_CODE] OpenEncryptedFileRaw(LPCTSTR lpFileName,ULONG ulFlags,PVOID* pvContext);
  54. [ERROR_CODE] QueryRecoveryAgentsOnEncryptedFile(LPCWSTR lpFileName,PENCRYPTION_CERTIFICATE_HASH_LIST* pRecoveryAgents);
  55. [ERROR_CODE] QueryUsersOnEncryptedFile(LPCWSTR lpFileName,PENCRYPTION_CERTIFICATE_HASH_LIST* pUsers);
  56. [ERROR_CODE] ReadEncryptedFileRaw(PFE_EXPORT_FUNC pfExportCallback,PVOID pvCallbackContext,PVOID pvContext);
  57. [ERROR_CODE] RemoveUsersFromEncryptedFile(LPCWSTR lpFileName,PENCRYPTION_CERTIFICATE_HASH_LIST pHashes);
  58. [ERROR_CODE] SetUserFileEncryptionKey(PENCRYPTION_CERTIFICATE pEncryptionCertificate);
  59. [ERROR_CODE] WriteEncryptedFileRaw(PFE_IMPORT_FUNC pfImportCallback,PVOID pvCallbackContext,PVOID pvContext);
  60. BOOL CreateProcessAsUser(HANDLE hToken,LPCTSTR lpApplicationName,LPTSTR lpCommandLine,LPSECURITY_ATTRIBUTES lpProcessAttributes,LPSECURITY_ATTRIBUTES lpThreadAttributes,BOOL bInheritHandles,[CreateProcessFlags] dwCreationFlags,LPVOID lpEnvironment,LPCTSTR lpCurrentDirectory,LPSTARTUPINFO lpStartupInfo,LPPROCESS_INFORMATION lpProcessInformation);
  61. BOOL CreateProcessWithLogonW(LPCWSTR lpUsername,LPCWSTR lpDomain,LPCWSTR lpPassword,[LogonFlags] dwLogonFlags,LPCWSTR lpApplicationName,LPWSTR lpCommandLine,[CreateProcessFlags] dwCreationFlags,LPVOID lpEnvironment,LPCWSTR lpCurrentDirectory,LPSTARTUPINFOW lpStartupInfo,LPPROCESS_INFORMATION lpProcessInfo);
  62. BOOL CreateProcessWithTokenW(HANDLE hToken,[LogonFlags] dwLogonFlags,LPCWSTR lpApplicationName,LPWSTR lpCommandLine,[CreateProcessFlags] dwCreationFlags,LPVOID lpEnvironment,LPCWSTR lpCurrentDirectory,LPSTARTUPINFOW lpStartupInfo,LPPROCESS_INFORMATION lpProcessInfo);
  63. [ERROR_CODE] GetLocalManagedApplications(BOOL bUserApps,LPDWORD pdwApps,PLOCALMANAGEDAPPLICATION* prgLocalApps);
  64. [ERROR_CODE] GetManagedApplications(GUID* pCategory,DWORD dwQueryFlags,DWORD dwInfoLevel,LPDWORD pdwApps,PMANAGEDAPPLICATION* prgManagedApps);
  65. [ERROR_CODE] GetManagedApplicationCategories(DWORD dwReserved,APPCATEGORYINFOLIST* pAppCategory);
  66. [ERROR_CODE] InstallApplication(PINSTALLDATA* pInstallInfo);
  67. [ERROR_CODE] UninstallApplication(WCHAR* ProductCode,DWORD dwStatus);
  68. BOOL AbortSystemShutdown(LPTSTR lpMachineName);
  69. [ERROR_CODE] InitiateShutdown(LPTSTR lpMachineName,LPTSTR lpMessage,DWORD dwGracePeriod,[SHUTDOWN_FLAGS] dwShutdownFlags,[SHTDN_REASON] dwReason);
  70. BOOL InitiateSystemShutdown(LPTSTR lpMachineName,LPTSTR lpMessage,DWORD dwTimeout,BOOL bForceAppsClosed,BOOL bRebootAfterShutdown);
  71. BOOL InitiateSystemShutdownEx(LPTSTR lpMachineName,LPTSTR lpMessage,DWORD dwTimeout,BOOL bForceAppsClosed,BOOL bRebootAfterShutdown,[SHTDN_REASON] dwReason);
  72. BOOL BackupEventLog(HANDLE hEventLog,LPCTSTR lpBackupFileName);
  73. BOOL ClearEventLog(HANDLE hEventLog,LPCTSTR lpBackupFileName);
  74. BOOL CloseEventLog(HANDLE hEventLog);
  75. BOOL DeregisterEventSource(HANDLE hEventLog);
  76. BOOL GetEventLogInformation(HANDLE hEventLog,DWORD dwInfoLevel,LPVOID lpBuffer,DWORD cbBufSize,LPDWORD pcbBytesNeeded);
  77. BOOL GetNumberOfEventLogRecords(HANDLE hEventLog,PDWORD NumberOfRecords);
  78. BOOL GetOldestEventLogRecord(HANDLE hEventLog,PDWORD OldestRecord);
  79. BOOL NotifyChangeEventLog(HANDLE hEventLog,HANDLE hEvent);
  80. HANDLE OpenBackupEventLog(LPCTSTR lpUNCServerName,LPCTSTR lpFileName);
  81. HANDLE OpenEventLog(LPCTSTR lpUNCServerName,LPCTSTR lpSourceName);
  82. BOOL ReadEventLog(HANDLE hEventLog,DWORD dwReadFlags,DWORD dwRecordOffset,LPVOID lpBuffer,DWORD nNumberOfBytesToRead,DWORD* pnBytesRead,DWORD* pnMinNumberOfBytesNeeded);
  83. HANDLE RegisterEventSource(LPCTSTR lpUNCServerName,LPCTSTR lpSourceName);
  84. BOOL ReportEvent(HANDLE hEventLog,[EventLogType] wType,WORD wCategory,DWORD dwEventID,PSID lpUserSid,WORD wNumStrings,DWORD dwDataSize,LPCTSTR* lpStrings,LPVOID lpRawData);
  85. PPERF_COUNTERSET_INSTANCE PerfCreateInstance(HANDLE hProvider,LPCGUID CounterSetGuid,LPCWSTR szInstanceName,ULONG dwInstance);
  86. [ERROR_CODE_ULONG] PerfDecrementULongCounterValue(HANDLE hProvider,PPERF_COUNTERSET_INSTANCE pInstance,ULONG CounterId,ULONG lValue);
  87. [ERROR_CODE_ULONG] PerfDecrementULongLongCounterValue(HANDLE hProvider,PPERF_COUNTERSET_INSTANCE pInstance,ULONG CounterId,ULONGLONG llValue);
  88. [ERROR_CODE_ULONG] PerfDeleteInstance(HANDLE hProvider,PPERF_COUNTERSET_INSTANCE InstanceBlock);
  89. [ERROR_CODE_ULONG] PerfIncrementULongCounterValue(HANDLE hProvider,PPERF_COUNTERSET_INSTANCE pInstance,ULONG CounterId,ULONG lValue);
  90. [ERROR_CODE_ULONG] PerfIncrementULongLongCounterValue(HANDLE hProvider,PPERF_COUNTERSET_INSTANCE pInstance,ULONG CounterId,ULONGLONG llValue);
  91. PPERF_COUNTERSET_INSTANCE PerfQueryInstance(HANDLE hProvider,LPCGUID CounterSetGuid,LPCWSTR szInstance,ULONG dwInstance);
  92. [ERROR_CODE_ULONG] PerfSetCounterSetInfo(HANDLE hProvider,PPERF_COUNTERSET_INFO pTemplate,ULONG dwTemplateSize);
  93. [ERROR_CODE_ULONG] PerfSetULongCounterValue(HANDLE hProvider,PPERF_COUNTERSET_INSTANCE pInstance,ULONG CounterId,ULONG lValue);
  94. [ERROR_CODE_ULONG] PerfSetULongLongCounterValue(HANDLE hProvider,PPERF_COUNTERSET_INSTANCE pInstance,ULONG CounterId,ULONGLONG llValue);
  95. [ERROR_CODE_ULONG] PerfSetCounterRefValue(HANDLE hProvider,PPERF_COUNTERSET_INSTANCE pInstance,ULONG CounterId,PVOID lpAddr);
  96. [ERROR_CODE_ULONG] PerfStartProvider(LPGUID ProviderGuid,PERFLIBREQUEST ControlCallback,HANDLE* phProvider);
  97. [ERROR_CODE_ULONG] PerfStartProviderEx(LPGUID ProviderGuid,PPERF_PROVIDER_CONTEXT ProviderContext,HANDLE* phProvider);
  98. [ERROR_CODE_ULONG] PerfStopProvider(HANDLE hProvider);
  99. SERVICE_STATUS_HANDLE RegisterServiceCtrlHandler(LPCTSTR lpServiceName,LPHANDLER_FUNCTION lpHandlerProc);
  100. SERVICE_STATUS_HANDLE RegisterServiceCtrlHandlerEx(LPCTSTR lpServiceName,LPHANDLER_FUNCTION_EX lpHandlerProc,LPVOID lpContext);
  101. BOOL SetServiceBits(SERVICE_STATUS_HANDLE hServiceStatus,DWORD dwServiceBits,BOOL bSetBitsOn,BOOL bUpdateImmediately);
  102. BOOL SetServiceStatus(SERVICE_STATUS_HANDLE hServiceStatus,LPSERVICE_STATUS lpServiceStatus);
  103. BOOL StartServiceCtrlDispatcher(const SERVICE_TABLE_ENTRY* lpServiceTable);
  104. BOOL ChangeServiceConfig(SC_HANDLE hService,[ServiceType] dwServiceType,[ServiceStartType] dwStartType,[ServiceErrorControl] dwErrorControl,LPCTSTR lpBinaryPathName,LPCTSTR lpLoadOrderGroup,LPDWORD lpdwTagId,LPCTSTR lpDependencies,LPCTSTR lpServiceStartName,LPCTSTR lpPassword,LPCTSTR lpDisplayName);
  105. BOOL ChangeServiceConfig2(SC_HANDLE hService,[ServiceInfoLevel] dwInfoLevel,LPVOID lpInfo);
  106. BOOL CloseServiceHandle(SC_HANDLE hSCObject);
  107. BOOL ControlService(SC_HANDLE hService,[ServiceControl] dwControl,LPSERVICE_STATUS lpServiceStatus);
  108. BOOL ControlServiceEx(SC_HANDLE hService,DWORD dwControl,DWORD dwInfoLevel,PVOID pControlParams);
  109. SC_HANDLE CreateService(SC_HANDLE hSCManager,LPCTSTR lpServiceName,LPCTSTR lpDisplayName,[ServiceAccess] dwDesiredAccess,[ServiceType] dwServiceType,[ServiceStartType] dwStartType,[ServiceErrorControl] dwErrorControl,LPCTSTR lpBinaryPathName,LPCTSTR lpLoadOrderGroup,LPDWORD lpdwTagId,LPCTSTR lpDependencies,LPCTSTR lpServiceStartName,LPCTSTR lpPassword);
  110. BOOL DeleteService(SC_HANDLE hService);
  111. BOOL EnumDependentServices(SC_HANDLE hService,[ServiceState] dwServiceState,LPENUM_SERVICE_STATUS lpServices,DWORD cbBufSize,LPDWORD pcbBytesNeeded,LPDWORD lpServicesReturned);
  112. BOOL EnumServicesStatusEx(SC_HANDLE hSCManager,SC_ENUM_TYPE InfoLevel,[ServiceType] dwServiceType,[ServiceState] dwServiceState,LPBYTE lpServices,DWORD cbBufSize,LPDWORD pcbBytesNeeded,LPDWORD lpServicesReturned,LPDWORD lpResumeHandle,LPCTSTR pszGroupName);
  113. BOOL GetServiceDisplayName(SC_HANDLE hSCManager,LPCTSTR lpServiceName,LPTSTR lpDisplayName,LPDWORD lpcchBuffer);
  114. BOOL GetServiceKeyName(SC_HANDLE hSCManager,LPCTSTR lpDisplayName,LPTSTR lpServiceName,LPDWORD lpcchBuffer);
  115. BOOL NotifyBootConfigStatus(BOOL BootAcceptable);
  116. [ERROR_CODE] NotifyServiceStatusChange(SC_HANDLE hService,[ServiceNotifyMask] dwNotifyMask,PSERVICE_NOTIFYA pNotifyBuffer);
  117. [ERROR_CODE] NotifyServiceStatusChange(SC_HANDLE hService,[ServiceNotifyMask] dwNotifyMask,PSERVICE_NOTIFY pNotifyBuffer);
  118. SC_HANDLE OpenSCManager(LPCTSTR lpMachineName,LPCTSTR lpDatabaseName,[SCManagerAccess] dwDesiredAccess);
  119. SC_HANDLE OpenService(SC_HANDLE hSCManager,LPCTSTR lpServiceName,[ServiceAccess] dwDesiredAccess);
  120. BOOL QueryServiceConfig(SC_HANDLE hService,LPQUERY_SERVICE_CONFIG lpServiceConfig,DWORD cbBufSize,LPDWORD pcbBytesNeeded);
  121. BOOL QueryServiceConfig2(SC_HANDLE hService,[ServiceInfoLevel] dwInfoLevel,LPBYTE lpBuffer,DWORD cbBufSize,LPDWORD pcbBytesNeeded);
  122. BOOL QueryServiceDynamicInformation(SERVICE_STATUS_HANDLE hServiceStatus,DWORD dwInfoLevel,PVOID* ppDynamicInfo);
  123. BOOL QueryServiceStatus(SC_HANDLE hService,LPSERVICE_STATUS lpServiceStatus);
  124. BOOL QueryServiceStatusEx(SC_HANDLE hService,SC_STATUS_TYPE InfoLevel,LPBYTE lpBuffer,DWORD cbBufSize,LPDWORD pcbBytesNeeded);
  125. BOOL StartService(SC_HANDLE hService,DWORD dwNumServiceArgs,LPCTSTR* lpServiceArgVectors);
  126. BOOL EnumServicesStatus(SC_HANDLE hSCManager,[ServiceType] dwServiceType,[ServiceState] dwServiceState,LPENUM_SERVICE_STATUS lpServices,DWORD cbBufSize,LPDWORD pcbBytesNeeded,LPDWORD lpServicesReturned,LPDWORD lpResumeHandle);
  127. SC_LOCK LockServiceDatabase(SC_HANDLE hSCManager);
  128. BOOL QueryServiceLockStatus(SC_HANDLE hSCManager,LPQUERY_SERVICE_LOCK_STATUS lpLockStatus,DWORD cbBufSize,LPDWORD pcbBytesNeeded);
  129. BOOL UnlockServiceDatabase(SC_LOCK ScLock);
  130. BOOL GetCurrentHwProfile(LPHW_PROFILE_INFO lpHwProfileInfo);
  131. BOOL GetUserName(LPTSTR lpBuffer,LPDWORD lpnSize);
  132. BOOL IsTextUnicode(const VOID* lpv,int iSize,[IsTextUnicodeFlags*] lpiResult);
  133. BOOL CryptAcquireContext(HCRYPTPROV* phProv,LPCTSTR pszContainer,LPCTSTR pszProvider,[CryptProv] dwProvType,[CryptAcquireContextFlags] dwFlags);
  134. BOOL CryptContextAddRef(HCRYPTPROV hProv,DWORD* pdwReserved,DWORD dwFlags);
  135. BOOL CryptEnumProviders(DWORD dwIndex,DWORD* pdwReserved,DWORD dwFlags,[CryptProv*] pdwProvType,LPTSTR pszProvName,DWORD* pcbProvName);
  136. BOOL CryptEnumProviderTypes(DWORD dwIndex,DWORD* pdwReserved,DWORD dwFlags,[CryptProv*] pdwProvType,LPTSTR pszTypeName,DWORD* pcbTypeName);
  137. BOOL CryptGetDefaultProvider([CryptProv] dwProvType,DWORD* pdwReserved,DWORD dwFlags,LPTSTR pszProvName,DWORD* pcbProvName);
  138. BOOL CryptGetProvParam(HCRYPTPROV hProv,[CryptGetProvParam] dwParam,BYTE* pbData,DWORD* pdwDataLen,DWORD dwFlags);
  139. BOOL CryptReleaseContext(HCRYPTPROV hProv,DWORD dwFlags);
  140. BOOL CryptSetProvider(LPCTSTR pszProvName,[CryptProv] dwProvType);
  141. BOOL CryptSetProviderEx(LPCTSTR pszProvName,[CryptProv] dwProvType,DWORD* pdwReserved,DWORD dwFlags);
  142. BOOL CryptSetProvParam(HCRYPTPROV hProv,[CryptSetProvParam] dwParam,const BYTE* pbData,DWORD dwFlags);
  143. BOOL CryptDeriveKey(HCRYPTPROV hProv,ALG_ID Algid,HCRYPTHASH hBaseData,DWORD dwFlags,HCRYPTKEY* phKey);
  144. BOOL CryptDestroyKey(HCRYPTKEY hKey);
  145. BOOL CryptDuplicateKey(HCRYPTKEY hKey,DWORD* pdwReserved,DWORD dwFlags,HCRYPTKEY* phKey);
  146. BOOL CryptExportKey(HCRYPTKEY hKey,HCRYPTKEY hExpKey,[CryptBlobType] dwBlobType,[CryptExportKeyFlags] dwFlags,BYTE* pbData,DWORD* pdwDataLen);
  147. BOOL CryptGenKey(HCRYPTPROV hProv,ALG_ID Algid,DWORD dwFlags,HCRYPTKEY* phKey);
  148. BOOL CryptGenRandom(HCRYPTPROV hProv,DWORD dwLen,BYTE* pbBuffer);
  149. BOOL CryptGetKeyParam(HCRYPTKEY hKey,[CryptKeyParam] dwParam,BYTE* pbData,DWORD* pdwDataLen,DWORD dwFlags);
  150. BOOL CryptGetUserKey(HCRYPTPROV hProv,[CryptKeySpec] dwKeySpec,HCRYPTKEY* phUserKey);
  151. BOOL CryptImportKey(HCRYPTPROV hProv,BYTE* pbData,DWORD dwDataLen,HCRYPTKEY hPubKey,[CryptImportKeyFlags] dwFlags,HCRYPTKEY* phKey);
  152. BOOL CryptSetKeyParam(HCRYPTKEY hKey,[CryptKeyParam] dwParam,const BYTE* pbData,DWORD dwFlags);
  153. BOOL CryptDecrypt(HCRYPTKEY hKey,HCRYPTHASH hHash,BOOL Final,DWORD dwFlags,BYTE* pbData,DWORD* pdwDataLen);
  154. BOOL CryptEncrypt(HCRYPTKEY hKey,HCRYPTHASH hHash,BOOL Final,DWORD dwFlags,BYTE* pbData,DWORD* pdwDataLen,DWORD dwBufLen);
  155. BOOL CryptCreateHash(HCRYPTPROV hProv,ALG_ID Algid,HCRYPTKEY hKey,[CryptCreateHashFlags] dwFlags,HCRYPTHASH* phHash);
  156. BOOL CryptDestroyHash(HCRYPTHASH hHash);
  157. BOOL CryptDuplicateHash(HCRYPTHASH hHash,DWORD* pdwReserved,DWORD dwFlags,HCRYPTHASH* phHash);
  158. BOOL CryptGetHashParam(HCRYPTHASH hHash,[CryptHashParam] dwParam,BYTE* pbData,DWORD* pdwDataLen,DWORD dwFlags);
  159. BOOL CryptHashData(HCRYPTHASH hHash,BYTE* pbData,DWORD dwDataLen,[CryptHashDataFlags] dwFlags);
  160. BOOL CryptHashSessionKey(HCRYPTHASH hHash,HCRYPTKEY hKey,DWORD dwFlags);
  161. BOOL CryptSetHashParam(HCRYPTHASH hHash,[CryptHashParam] dwParam,const BYTE* pbData,DWORD dwFlags);
  162. BOOL CryptSignHash(HCRYPTHASH hHash,[CryptKeySpec] dwKeySpec,LPCTSTR sDescription,[CryptSignFlags] dwFlags,BYTE* pbSignature,DWORD* pdwSigLen);
  163. BOOL CryptVerifySignature(HCRYPTHASH hHash,BYTE* pbSignature,DWORD dwSigLen,HCRYPTKEY hPubKey,LPCTSTR sDescription,[CryptSignFlags] dwFlags);
  164. [ERROR_CODE_ULONG] ControlTrace(TRACEHANDLE SessionHandle,LPCTSTR SessionName,PEVENT_TRACE_PROPERTIES Properties,ULONG ControlCode);
  165. [ERROR_CODE_ULONG] EnableTrace(ULONG Enable,ULONG EnableFlag,ULONG EnableLevel,LPCGUID ControlGuid,TRACEHANDLE SessionHandle);
  166. [ERROR_CODE_ULONG] EnableTraceEx(LPCGUID ProviderId,LPCGUID SourceId,TRACEHANDLE TraceHandle,ULONG IsEnabled,UCHAR Level,ULONGLONG MatchAnyKeyword,ULONGLONG MatchAllKeyword,ULONG EnableProperty,PEVENT_FILTER_DESCRIPTOR EnableFilterDesc);
  167. [ERROR_CODE_ULONG] EnableTraceEx2(TRACEHANDLE TraceHandle,LPCGUID ProviderId,ULONG ControlCode,UCHAR Level,ULONGLONG MatchAnyKeyword,ULONGLONG MatchAllKeyword,ULONG Timeout,PENABLE_TRACE_PARAMETERS EnableParameters);
  168. [ERROR_CODE_ULONG] EnumerateTraceGuids(PTRACE_GUID_PROPERTIES* GuidPropertiesArray,ULONG PropertyArrayCount,PULONG GuidCount);
  169. [ERROR_CODE_ULONG] EnumerateTraceGuidsEx(TRACE_QUERY_INFO_CLASS TraceQueryInfoClass,PVOID InBuffer,ULONG InBufferSize,PVOID OutBuffer,ULONG OutBufferSize,PULONG ReturnLength);
  170. [ERROR_CODE_ULONG] FlushTrace(TRACEHANDLE SessionHandle,LPCTSTR SessionName,PEVENT_TRACE_PROPERTIES Properties);
  171. [ERROR_CODE_ULONG] QueryAllTraces(PEVENT_TRACE_PROPERTIES* PropertyArray,ULONG PropertyArrayCount,PULONG SessionCount);
  172. [ERROR_CODE_ULONG] QueryTrace(TRACEHANDLE SessionHandle,LPCTSTR SessionName,PEVENT_TRACE_PROPERTIES Properties);
  173. [ERROR_CODE_ULONG] StartTrace(PTRACEHANDLE SessionHandle,LPCTSTR SessionName,PEVENT_TRACE_PROPERTIES Properties);
  174. [ERROR_CODE_ULONG] StopTrace(TRACEHANDLE SessionHandle,LPCTSTR SessionName,PEVENT_TRACE_PROPERTIES Properties);
  175. [ERROR_CODE_ULONG] TraceQueryInformation(TRACEHANDLE SessionHandle,TRACE_QUERY_INFO_CLASS InformationClass,PVOID TraceInformation,ULONG InformationLength,PULONG ReturnLength);
  176. [ERROR_CODE_ULONG] TraceSetInformation(TRACEHANDLE SessionHandle,TRACE_INFO_CLASS InformationClass,PVOID TraceInformation,ULONG InformationLength);
  177. [ERROR_CODE_ULONG] UpdateTrace(TRACEHANDLE SessionHandle,LPCTSTR SessionName,PEVENT_TRACE_PROPERTIES Properties);
  178. [ERROR_CODE_ULONG] CreateTraceInstanceId(HANDLE RegHandle,PEVENT_INSTANCE_INFO pInstInfo);
  179. [ERROR_CODE_ULONG] GetTraceEnableFlags(TRACEHANDLE SessionHandle);
  180. UCHAR GetTraceEnableLevel(TRACEHANDLE SessionHandle);
  181. TRACEHANDLE GetTraceLoggerHandle(PVOID Buffer);
  182. [ERROR_CODE_ULONG] RegisterTraceGuids(WMIDPREQUEST RequestAddress,PVOID RequestContext,LPCGUID ControlGuid,ULONG GuidCount,PTRACE_GUID_REGISTRATION TraceGuidReg,LPCTSTR MofImagePath,LPCTSTR MofResourceName,PTRACEHANDLE RegistrationHandle);
  183. [ERROR_CODE_ULONG] TraceEvent(TRACEHANDLE SessionHandle,PEVENT_TRACE_HEADER EventTrace);
  184. [ERROR_CODE_ULONG] TraceEventInstance(TRACEHANDLE SessionHandle,PEVENT_INSTANCE_HEADER EventTrace,PEVENT_INSTANCE_INFO pInstInfo,PEVENT_INSTANCE_INFO pParentInstInfo);
  185. [ERROR_CODE_ULONG] TraceMessage(TRACEHANDLE SessionHandle,[TRACE_MESSAGE_FLAGS] MessageFlags,LPGUID MessageGuid,USHORT MessageNumber);
  186. [ERROR_CODE_ULONG] TraceMessageVa(TRACEHANDLE SessionHandle,ULONG MessageFlags,LPGUID MessageGuid,USHORT MessageNumber,va_list MessageArgList);
  187. [ERROR_CODE_ULONG] UnregisterTraceGuids(TRACEHANDLE RegistrationHandle);
  188. [ERROR_CODE_ULONG] EventActivityIdControl([EventActivity] ControlCode,LPGUID ActivityId);
  189. BOOLEAN EventEnabled(REGHANDLE RegHandle,PCEVENT_DESCRIPTOR EventDescriptor);
  190. BOOLEAN EventProviderEnabled(REGHANDLE RegHandle,UCHAR Level,ULONGLONG Keyword);
  191. [ERROR_CODE_ULONG] EventRegister(LPCGUID ProviderId,ENABLECALLBACK EnableCallback,PVOID CallbackContext,PREGHANDLE RegHandle);
  192. [ERROR_CODE_ULONG] EventSetInformation(REGHANDLE RegHandle,EVENT_INFO_CLASS InformationClass,PVOID EventInformation,ULONG InformationLength);
  193. [ERROR_CODE_ULONG] EventUnregister(REGHANDLE RegHandle);
  194. [ERROR_CODE_ULONG] EventWrite(REGHANDLE RegHandle,PCEVENT_DESCRIPTOR EventDescriptor,ULONG UserDataCount,PEVENT_DATA_DESCRIPTOR UserData);
  195. [ERROR_CODE_ULONG] EventWriteEx(REGHANDLE RegHandle,PCEVENT_DESCRIPTOR EventDescriptor,ULONG64 Filter,ULONG Flags,LPCGUID ActivityId,LPCGUID RelatedActivityId,ULONG UserDataCount,PEVENT_DATA_DESCRIPTOR UserData);
  196. [ERROR_CODE_ULONG] EventWriteString(REGHANDLE RegHandle,UCHAR Level,ULONGLONG Keyword,PCWSTR String);
  197. [ERROR_CODE_ULONG] EventWriteTransfer(REGHANDLE RegHandle,PCEVENT_DESCRIPTOR EventDescriptor,LPCGUID ActivityId,LPCGUID RelatedActivityId,ULONG UserDataCount,PEVENT_DATA_DESCRIPTOR UserData);
  198. [ERROR_CODE_ULONG] CloseTrace(TRACEHANDLE TraceHandle);
  199. TRACEHANDLE OpenTrace(PEVENT_TRACE_LOGFILE Logfile);
  200. [ERROR_CODE_ULONG] ProcessTrace(PTRACEHANDLE HandleArray,ULONG HandleCount,LPFILETIME StartTime,LPFILETIME EndTime);
  201. [ERROR_CODE_ULONG] RemoveTraceCallback(LPCGUID pGuid);
  202. [ERROR_CODE_ULONG] SetTraceCallback(LPCGUID pGuid,PEVENT_CALLBACK EventCallback);
  203. [ERROR_CODE_ULONG] EventAccessControl(LPGUID Guid,ULONG Operation,PSID Sid,ULONG Rights,BOOLEAN AllowOrDeny);
  204. [ERROR_CODE_ULONG] EventAccessQuery(LPGUID Guid,PSECURITY_DESCRIPTOR Buffer,PULONG BufferSize);
  205. [ERROR_CODE_ULONG] EventAccessRemove(LPGUID Guid);
  206. BOOL AccessCheck(PSECURITY_DESCRIPTOR pSecurityDescriptor,HANDLE ClientToken,DWORD DesiredAccess,PGENERIC_MAPPING GenericMapping,PPRIVILEGE_SET PrivilegeSet,LPDWORD PrivilegeSetLength,LPDWORD GrantedAccess,LPBOOL AccessStatus);
  207. BOOL AccessCheckByType(PSECURITY_DESCRIPTOR pSecurityDescriptor,PSID PrincipalSelfSid,HANDLE ClientToken,DWORD DesiredAccess,POBJECT_TYPE_LIST ObjectTypeList,DWORD ObjectTypeListLength,PGENERIC_MAPPING GenericMapping,PPRIVILEGE_SET PrivilegeSet,LPDWORD PrivilegeSetLength,LPDWORD GrantedAccess,LPBOOL AccessStatus);
  208. BOOL AccessCheckByTypeResultList(PSECURITY_DESCRIPTOR pSecurityDescriptor,PSID PrincipalSelfSid,HANDLE ClientToken,DWORD DesiredAccess,POBJECT_TYPE_LIST ObjectTypeList,DWORD ObjectTypeListLength,PGENERIC_MAPPING GenericMapping,PPRIVILEGE_SET PrivilegeSet,LPDWORD PrivilegeSetLength,LPDWORD GrantedAccessList,LPDWORD AccessStatusList);
  209. BOOL AdjustTokenGroups(HANDLE TokenHandle,BOOL ResetToDefault,PTOKEN_GROUPS NewState,DWORD BufferLength,PTOKEN_GROUPS PreviousState,PDWORD ReturnLength);
  210. BOOL AdjustTokenPrivileges(HANDLE TokenHandle,BOOL DisableAllPrivileges,PTOKEN_PRIVILEGES NewState,DWORD BufferLength,PTOKEN_PRIVILEGES PreviousState,PDWORD ReturnLength);
  211. BOOL AllocateAndInitializeSid(PSID_IDENTIFIER_AUTHORITY pIdentifierAuthority,BYTE nSubAuthorityCount,DWORD dwSubAuthority0,DWORD dwSubAuthority1,DWORD dwSubAuthority2,DWORD dwSubAuthority3,DWORD dwSubAuthority4,DWORD dwSubAuthority5,DWORD dwSubAuthority6,DWORD dwSubAuthority7,PSID* pSid);
  212. BOOL AllocateLocallyUniqueId(PLUID Luid);
  213. VOID BuildExplicitAccessWithName(PEXPLICIT_ACCESS pExplicitAccess,LPTSTR pTrusteeName,DWORD AccessPermissions,ACCESS_MODE AccessMode,[AceFlags] Inheritance);
  214. VOID BuildImpersonateExplicitAccessWithName(PEXPLICIT_ACCESS pExplicitAccess,LPTSTR pTrusteeName,PTRUSTEE pTrustee,DWORD AccessPermissions,ACCESS_MODE AccessMode,[AceFlags] Inheritance);
  215. VOID BuildImpersonateTrustee(PTRUSTEE pTrustee,PTRUSTEE pImpersonateTrustee);
  216. VOID BuildTrusteeWithName(PTRUSTEE pTrustee,LPTSTR pName);
  217. void BuildTrusteeWithObjectsAndName(PTRUSTEE pTrustee,POBJECTS_AND_NAME pObjName,SE_OBJECT_TYPE ObjectType,LPTSTR ObjectTypeName,LPTSTR InheritedObjectTypeName,LPTSTR Name);
  218. void BuildTrusteeWithObjectsAndSid(PTRUSTEE pTrustee,POBJECTS_AND_SID pObjSid,GUID* pObjectGuid,GUID* pInheritedObjectGuid,PSID pSid);
  219. VOID BuildTrusteeWithSid(PTRUSTEE pTrustee,PSID pSid);
  220. BOOL CheckTokenMembership(HANDLE TokenHandle,PSID SidToCheck,PBOOL IsMember);
  221. BOOL ConvertSecurityDescriptorToStringSecurityDescriptor(PSECURITY_DESCRIPTOR SecurityDescriptor,DWORD RequestedStringSDRevision,SECURITY_INFORMATION SecurityInformation,LPTSTR* StringSecurityDescriptor,PULONG StringSecurityDescriptorLen);
  222. BOOL ConvertSidToStringSid(PSID Sid,LPTSTR* StringSid);
  223. BOOL ConvertStringSecurityDescriptorToSecurityDescriptor(LPCTSTR StringSecurityDescriptor,DWORD StringSDRevision,PSECURITY_DESCRIPTOR* SecurityDescriptor,PULONG SecurityDescriptorSize);
  224. BOOL ConvertStringSidToSid(LPCTSTR StringSid,PSID* Sid);
  225. BOOL CopySid(DWORD nDestinationSidLength,PSID pDestinationSid,PSID pSourceSid);
  226. BOOL CreateRestrictedToken(HANDLE ExistingTokenHandle,[CreateRestrictedTokenFlags] Flags,DWORD DisableSidCount,PSID_AND_ATTRIBUTES SidsToDisable,DWORD DeletePrivilegeCount,PLUID_AND_ATTRIBUTES PrivilegesToDelete,DWORD RestrictedSidCount,PSID_AND_ATTRIBUTES SidsToRestrict,PHANDLE NewTokenHandle);
  227. BOOL CreateWellKnownSid(WELL_KNOWN_SID_TYPE WellKnownSidType,PSID DomainSid,PSID pSid,DWORD* cbSid);
  228. BOOL DuplicateToken(HANDLE ExistingTokenHandle,SECURITY_IMPERSONATION_LEVEL ImpersonationLevel,PHANDLE DuplicateTokenHandle);
  229. BOOL DuplicateTokenEx(HANDLE hExistingToken,[TOKEN_ACCESS_MASK_DWORD] dwDesiredAccess,LPSECURITY_ATTRIBUTES lpTokenAttributes,SECURITY_IMPERSONATION_LEVEL ImpersonationLevel,TOKEN_TYPE TokenType,PHANDLE phNewToken);
  230. BOOL EqualDomainSid(PSID pSid1,PSID pSid2,BOOL* pfEqual);
  231. BOOL EqualPrefixSid(PSID pSid1,PSID pSid2);
  232. BOOL EqualSid(PSID pSid1,PSID pSid2);
  233. PVOID FreeSid(PSID pSid);
  234. [ERROR_CODE] GetAuditedPermissionsFromAcl(PACL pacl,PTRUSTEE pTrustee,PACCESS_MASK pSuccessfulAuditedRights,PACCESS_MASK pFailedAuditRights);
  235. [ERROR_CODE] GetEffectiveRightsFromAcl(PACL pacl,PTRUSTEE pTrustee,PACCESS_MASK pAccessRights);
  236. [ERROR_CODE] GetExplicitEntriesFromAcl(PACL pacl,PULONG pcCountOfExplicitEntries,PEXPLICIT_ACCESS* pListOfExplicitEntries);
  237. DWORD GetLengthSid(PSID pSid);
  238. PTRUSTEE GetMultipleTrustee(PTRUSTEE pTrustee);
  239. MULTIPLE_TRUSTEE_OPERATION GetMultipleTrusteeOperation(PTRUSTEE pTrustee);
  240. [ERROR_CODE] GetNamedSecurityInfo(LPTSTR pObjectName,SE_OBJECT_TYPE ObjectType,SECURITY_INFORMATION SecurityInfo,PSID* ppsidOwner,PSID* ppsidGroup,PACL* ppDacl,PACL* ppSacl,PSECURITY_DESCRIPTOR_RELATIVE* ppSecurityDescriptor);
  241. BOOL GetSecurityDescriptorControl(PSECURITY_DESCRIPTOR pSecurityDescriptor,PSECURITY_DESCRIPTOR_CONTROL pControl,LPDWORD lpdwRevision);
  242. [ERROR_CODE] GetSecurityInfo(HANDLE handle,SE_OBJECT_TYPE ObjectType,SECURITY_INFORMATION SecurityInfo,PSID* ppsidOwner,PSID* ppsidGroup,PACL* ppDacl,PACL* ppSacl,PSECURITY_DESCRIPTOR* ppSecurityDescriptor);
  243. PSID_IDENTIFIER_AUTHORITY GetSidIdentifierAuthority(PSID pSid);
  244. DWORD GetSidLengthRequired(UCHAR nSubAuthorityCount);
  245. PDWORD GetSidSubAuthority(PSID pSid,DWORD nSubAuthority);
  246. PUCHAR GetSidSubAuthorityCount(PSID pSid);
  247. BOOL GetTokenInformation(HANDLE TokenHandle,TOKEN_INFORMATION_CLASS TokenInformationClass,LPVOID TokenInformation,DWORD TokenInformationLength,PDWORD ReturnLength);
  248. TRUSTEE_FORM GetTrusteeForm(PTRUSTEE pTrustee);
  249. LPTSTR GetTrusteeName(PTRUSTEE pTrustee);
  250. TRUSTEE_TYPE GetTrusteeType(PTRUSTEE pTrustee);
  251. BOOL GetWindowsAccountDomainSid(PSID pSid,PSID ppDomainSid,DWORD* cbSid);
  252. BOOL InitializeSid(PSID Sid,PSID_IDENTIFIER_AUTHORITY pIdentifierAuthority,BYTE nSubAuthorityCount);
  253. BOOL IsTokenRestricted(HANDLE TokenHandle);
  254. BOOL IsValidSid(PSID pSid);
  255. BOOL IsWellKnownSid(PSID pSid,WELL_KNOWN_SID_TYPE WellKnownSidType);
  256. BOOL LookupAccountName(LPCTSTR lpSystemName,LPCTSTR lpAccountName,PSID Sid,LPDWORD cbSid,LPTSTR ReferencedDomainName,LPDWORD cchReferencedDomainName,PSID_NAME_USE peUse);
  257. BOOL LookupAccountSid(LPCTSTR lpSystemName,PSID lpSid,LPTSTR lpName,LPDWORD cchName,LPTSTR lpReferencedDomainName,LPDWORD cchReferencedDomainName,PSID_NAME_USE peUse);
  258. BOOL LookupPrivilegeDisplayName(LPCTSTR lpSystemName,LPCTSTR lpName,LPTSTR lpDisplayName,LPDWORD cchDisplayName,LPDWORD lpLanguageId);
  259. BOOL LookupPrivilegeName(LPCTSTR lpSystemName,PLUID lpLuid,LPTSTR lpName,LPDWORD cchName);
  260. BOOL LookupPrivilegeValue(LPCTSTR lpSystemName,LPCTSTR lpName,PLUID lpLuid);
  261. BOOL OpenProcessToken([ProcessHandle] ProcessHandle,[TOKEN_ACCESS_MASK_DWORD] DesiredAccess,PHANDLE TokenHandle);
  262. BOOL OpenThreadToken([ThreadHandle] ThreadHandle,[TOKEN_ACCESS_MASK_DWORD] DesiredAccess,BOOL OpenAsSelf,PHANDLE TokenHandle);
  263. VOID QuerySecurityAccessMask(SECURITY_INFORMATION SecurityInformation,LPDWORD DesiredAccess);
  264. [ERROR_CODE] SetEntriesInAcl(ULONG cCountOfExplicitEntries,PEXPLICIT_ACCESS pListOfExplicitEntries,PACL OldAcl,PACL* NewAcl);
  265. [ERROR_CODE] SetNamedSecurityInfo(LPTSTR pObjectName,SE_OBJECT_TYPE ObjectType,SECURITY_INFORMATION SecurityInfo,PSID psidOwner,PSID psidGroup,PACL pDacl,PACL pSacl);
  266. VOID SetSecurityAccessMask(SECURITY_INFORMATION SecurityInformation,LPDWORD DesiredAccess);
  267. BOOL SetSecurityDescriptorControl(PSECURITY_DESCRIPTOR pSecurityDescriptor,SECURITY_DESCRIPTOR_CONTROL ControlBitsOfInterest,SECURITY_DESCRIPTOR_CONTROL ControlBitsToSet);
  268. [ERROR_CODE] SetSecurityInfo(HANDLE handle,SE_OBJECT_TYPE ObjectType,SECURITY_INFORMATION SecurityInfo,PSID psidOwner,PSID psidGroup,PACL pDacl,PACL pSacl);
  269. BOOL SetThreadToken(PHANDLE Thread,HANDLE Token);
  270. BOOL SetTokenInformation(HANDLE TokenHandle,TOKEN_INFORMATION_CLASS TokenInformationClass,LPVOID TokenInformation,DWORD TokenInformationLength);
  271. [ERROR_CODE] TreeResetNamedSecurityInfo(LPTSTR pObjectName,SE_OBJECT_TYPE ObjectType,SECURITY_INFORMATION SecurityInfo,PSID pOwner,PSID pGroup,PACL pDacl,PACL pSacl,BOOL KeepExplicit,FN_PROGRESS fnProgress,PROG_INVOKE_SETTING ProgressInvokeSetting,PVOID Args);
  272. [ERROR_CODE] TreeSetNamedSecurityInfo(LPTSTR pObjectName,SE_OBJECT_TYPE ObjectType,SECURITY_INFORMATION SecurityInfo,PSID pOwner,PSID pGroup,PACL pDacl,PACL pSacl,[TreeSecAction] dwAction,FN_PROGRESS fnProgress,PROG_INVOKE_SETTING ProgressInvokeSetting,PVOID Args);
  273. BOOL AreAllAccessesGranted(DWORD GrantedAccess,DWORD DesiredAccess);
  274. BOOL AreAnyAccessesGranted(DWORD GrantedAccess,DWORD DesiredAccess);
  275. [ERROR_CODE] BuildSecurityDescriptor(PTRUSTEE pOwner,PTRUSTEE pGroup,ULONG cCountOfAccessEntries,PEXPLICIT_ACCESS pListOfAccessEntries,ULONG cCountOfAuditEntries,PEXPLICIT_ACCESS pListOfAuditEntries,PSECURITY_DESCRIPTOR pOldSD,PULONG pSizeNewSD,PSECURITY_DESCRIPTOR* pNewSD);
  276. BOOL ConvertToAutoInheritPrivateObjectSecurity(PSECURITY_DESCRIPTOR ParentDescriptor,PSECURITY_DESCRIPTOR CurrentSecurityDescriptor,PSECURITY_DESCRIPTOR* NewSecurityDescriptor,GUID* ObjectType,BOOLEAN IsDirectoryObject,PGENERIC_MAPPING GenericMapping);
  277. BOOL CreatePrivateObjectSecurity(PSECURITY_DESCRIPTOR ParentDescriptor,PSECURITY_DESCRIPTOR CreatorDescriptor,PSECURITY_DESCRIPTOR* NewDescriptor,BOOL IsDirectoryObject,HANDLE Token,PGENERIC_MAPPING GenericMapping);
  278. BOOL CreatePrivateObjectSecurityEx(PSECURITY_DESCRIPTOR ParentDescriptor,PSECURITY_DESCRIPTOR CreatorDescriptor,PSECURITY_DESCRIPTOR* NewDescriptor,GUID* ObjectType,BOOL IsContainerObject,[SEF_Flags] AutoInheritFlags,HANDLE Token,PGENERIC_MAPPING GenericMapping);
  279. BOOL CreatePrivateObjectSecurityWithMultipleInheritance(PSECURITY_DESCRIPTOR ParentDescriptor,PSECURITY_DESCRIPTOR CreatorDescriptor,PSECURITY_DESCRIPTOR* NewDescriptor,GUID** ObjectTypes,ULONG GuidCount,BOOL IsContainerObject,[SEF_Flags] AutoInheritFlags,HANDLE Token,PGENERIC_MAPPING GenericMapping);
  280. BOOL DestroyPrivateObjectSecurity(PSECURITY_DESCRIPTOR* ObjectDescriptor);
  281. BOOL GetPrivateObjectSecurity(PSECURITY_DESCRIPTOR ObjectDescriptor,SECURITY_INFORMATION SecurityInformation,PSECURITY_DESCRIPTOR ResultantDescriptor,DWORD DescriptorLength,PDWORD ReturnLength);
  282. BOOL ImpersonateAnonymousToken([ThreadHandle] ThreadHandle);
  283. BOOL ImpersonateLoggedOnUser(HANDLE hToken);
  284. BOOL ImpersonateNamedPipeClient(HANDLE hNamedPipe);
  285. BOOL ImpersonateSelf(SECURITY_IMPERSONATION_LEVEL ImpersonationLevel);
  286. [ERROR_CODE] LookupSecurityDescriptorParts(PTRUSTEE* pOwner,PTRUSTEE* pGroup,PULONG cCountOfAccessEntries,PEXPLICIT_ACCESS* pListOfAccessEntries,PULONG cCountOfAuditEntries,PEXPLICIT_ACCESS* pListOfAuditEntries,PSECURITY_DESCRIPTOR pSD);
  287. VOID MapGenericMask(PDWORD AccessMask,PGENERIC_MAPPING GenericMapping);
  288. BOOL ObjectCloseAuditAlarm(LPCTSTR SubsystemName,LPVOID HandleId,BOOL GenerateOnClose);
  289. BOOL ObjectDeleteAuditAlarm(LPCTSTR SubsystemName,LPVOID HandleId,BOOL GenerateOnClose);
  290. BOOL ObjectOpenAuditAlarm(LPCTSTR SubsystemName,LPVOID HandleId,LPTSTR ObjectTypeName,LPTSTR ObjectName,PSECURITY_DESCRIPTOR pSecurityDescriptor,HANDLE ClientToken,DWORD DesiredAccess,DWORD GrantedAccess,PPRIVILEGE_SET Privileges,BOOL ObjectCreation,BOOL AccessGranted,LPBOOL GenerateOnClose);
  291. BOOL ObjectPrivilegeAuditAlarm(LPCTSTR SubsystemName,LPVOID HandleId,HANDLE ClientToken,DWORD DesiredAccess,PPRIVILEGE_SET Privileges,BOOL AccessGranted);
  292. BOOL PrivilegeCheck(HANDLE ClientToken,PPRIVILEGE_SET RequiredPrivileges,LPBOOL pfResult);
  293. BOOL PrivilegedServiceAuditAlarm(LPCTSTR SubsystemName,LPCTSTR ServiceName,HANDLE ClientToken,PPRIVILEGE_SET Privileges,BOOL AccessGranted);
  294. BOOL RevertToSelf();
  295. BOOL SetPrivateObjectSecurity(SECURITY_INFORMATION SecurityInformation,PSECURITY_DESCRIPTOR ModificationDescriptor,PSECURITY_DESCRIPTOR* ObjectsSecurityDescriptor,PGENERIC_MAPPING GenericMapping,HANDLE Token);
  296. BOOL SetPrivateObjectSecurityEx(SECURITY_INFORMATION SecurityInformation,PSECURITY_DESCRIPTOR ModificationDescriptor,PSECURITY_DESCRIPTOR* ObjectsSecurityDescriptor,[SEF_Flags] AutoInheritFlags,PGENERIC_MAPPING GenericMapping,HANDLE Token);
  297. [ERROR_CODE] GetSecurityDescriptorRMControl(PSECURITY_DESCRIPTOR SecurityDescriptor,PUCHAR RMControl);
  298. [ERROR_CODE] SetSecurityDescriptorRMControl(PSECURITY_DESCRIPTOR SecurityDescriptor,PUCHAR RMControl);
  299. BOOL AccessCheckAndAuditAlarm(LPCTSTR SubsystemName,LPVOID HandleId,LPTSTR ObjectTypeName,LPTSTR ObjectName,PSECURITY_DESCRIPTOR SecurityDescriptor,DWORD DesiredAccess,PGENERIC_MAPPING GenericMapping,BOOL ObjectCreation,LPDWORD GrantedAccess,LPBOOL AccessStatus,LPBOOL pfGenerateOnClose);
  300. BOOL AccessCheckByTypeAndAuditAlarm(LPCTSTR SubsystemName,LPVOID HandleId,LPCTSTR ObjectTypeName,LPCTSTR ObjectName,PSECURITY_DESCRIPTOR pSecurityDescriptor,PSID PrincipalSelfSid,DWORD DesiredAccess,AUDIT_EVENT_TYPE AuditType,DWORD Flags,POBJECT_TYPE_LIST ObjectTypeList,DWORD ObjectTypeListLength,PGENERIC_MAPPING GenericMapping,BOOL ObjectCreation,LPDWORD GrantedAccess,LPBOOL AccessStatus,LPBOOL pfGenerateOnClose);
  301. BOOL AccessCheckByTypeResultListAndAuditAlarm(LPCTSTR SubsystemName,LPVOID HandleId,LPCTSTR ObjectTypeName,LPCTSTR ObjectName,PSECURITY_DESCRIPTOR pSecurityDescriptor,PSID PrincipalSelfSid,DWORD DesiredAccess,AUDIT_EVENT_TYPE AuditType,DWORD Flags,POBJECT_TYPE_LIST ObjectTypeList,DWORD ObjectTypeListLength,PGENERIC_MAPPING GenericMapping,BOOL ObjectCreation,LPDWORD GrantedAccess,LPDWORD AccessStatusList,LPBOOL pfGenerateOnClose);
  302. BOOL AccessCheckByTypeResultListAndAuditAlarmByHandle(LPCTSTR SubsystemName,LPVOID HandleId,HANDLE ClientToken,LPCTSTR ObjectTypeName,LPCTSTR ObjectName,PSECURITY_DESCRIPTOR pSecurityDescriptor,PSID PrincipalSelfSid,DWORD DesiredAccess,AUDIT_EVENT_TYPE AuditType,DWORD Flags,POBJECT_TYPE_LIST ObjectTypeList,DWORD ObjectTypeListLength,PGENERIC_MAPPING GenericMapping,BOOL ObjectCreation,LPDWORD GrantedAccess,LPDWORD AccessStatusList,LPBOOL pfGenerateOnClose);
  303. BOOL AddAccessAllowedAce(PACL pAcl,DWORD dwAceRevision,[ACCESS_MASK_DWORD] AccessMask,PSID pSid);
  304. BOOL AddAccessAllowedAceEx(PACL pAcl,DWORD dwAceRevision,[AceFlags] AceFlags,[ACCESS_MASK_DWORD] AccessMask,PSID pSid);
  305. BOOL AddAccessAllowedObjectAce(PACL pAcl,DWORD dwAceRevision,[AceFlags] AceFlags,[ACCESS_MASK_DWORD] AccessMask,GUID* ObjectTypeGuid,GUID* InheritedObjectTypeGuid,PSID pSid);
  306. BOOL AddAccessDeniedAce(PACL pAcl,DWORD dwAceRevision,[ACCESS_MASK_DWORD] AccessMask,PSID pSid);
  307. BOOL AddAccessDeniedAceEx(PACL pAcl,DWORD dwAceRevision,[AceFlags] AceFlags,[ACCESS_MASK_DWORD] AccessMask,PSID pSid);
  308. BOOL AddAccessDeniedObjectAce(PACL pAcl,DWORD dwAceRevision,[AceFlags] AceFlags,[ACCESS_MASK_DWORD] AccessMask,GUID* ObjectTypeGuid,GUID* InheritedObjectTypeGuid,PSID pSid);
  309. BOOL AddAce(PACL pAcl,DWORD dwAceRevision,DWORD dwStartingAceIndex,LPVOID pAceList,DWORD nAceListLength);
  310. BOOL AddAuditAccessAce(PACL pAcl,DWORD dwAceRevision,[ACCESS_MASK_DWORD] dwAccessMask,PSID pSid,BOOL bAuditSuccess,BOOL bAuditFailure);
  311. BOOL AddAuditAccessAceEx(PACL pAcl,DWORD dwAceRevision,[AceFlags] AceFlags,[ACCESS_MASK_DWORD] dwAccessMask,PSID pSid,BOOL bAuditSuccess,BOOL bAuditFailure);
  312. BOOL AddAuditAccessObjectAce(PACL pAcl,DWORD dwAceRevision,[AceFlags] AceFlags,[ACCESS_MASK_DWORD] AccessMask,GUID* ObjectTypeGuid,GUID* InheritedObjectTypeGuid,PSID pSid,BOOL bAuditSuccess,BOOL bAuditFailure);
  313. BOOL AddMandatoryAce(PACL pAcl,DWORD dwAceRevision,[AceFlags] AceFlags,[MandatoryPolicyFlags] MandatoryPolicy,PSID pLabelSid);
  314. BOOL DeleteAce(PACL pAcl,DWORD dwAceIndex);
  315. BOOL FindFirstFreeAce(PACL pAcl,PACE* pAce);
  316. [ERROR_CODE] FreeInheritedFromArray(PINHERITED_FROM pInheritArray,USHORT AceCnt,PFN_OBJECT_MGR_FUNCTS pfnArray);
  317. BOOL GetAce(PACL pAcl,DWORD dwAceIndex,PACE* pAce);
  318. BOOL GetAclInformation(PACL pAcl,LPVOID pAclInformation,DWORD nAclInformationLength,ACL_INFORMATION_CLASS dwAclInformationClass);
  319. BOOL GetFileSecurity(LPCTSTR lpFileName,SECURITY_INFORMATION RequestedInformation,PSECURITY_DESCRIPTOR pSecurityDescriptor,DWORD nLength,LPDWORD lpnLengthNeeded);
  320. [ERROR_CODE] GetInheritanceSource(LPTSTR pObjectName,SE_OBJECT_TYPE ObjectType,SECURITY_INFORMATION SecurityInfo,BOOL Container,GUID** pObjectClassGuids,DWORD GuidCount,PACL pAcl,PFN_OBJECT_MGR_FUNCTS pfnArray,PGENERIC_MAPPING pGenericMapping,PINHERITED_FROM pInheritArray);
  321. BOOL GetKernelObjectSecurity(HANDLE Handle,SECURITY_INFORMATION RequestedInformation,PISECURITY_DESCRIPTOR_RELATIVE pSecurityDescriptor,DWORD nLength,LPDWORD lpnLengthNeeded);
  322. BOOL GetSecurityDescriptorDacl(PSECURITY_DESCRIPTOR pSecurityDescriptor,LPBOOL lpbDaclPresent,PACL* pDacl,LPBOOL lpbDaclDefaulted);
  323. BOOL GetSecurityDescriptorGroup(PSECURITY_DESCRIPTOR pSecurityDescriptor,PSID* pGroup,LPBOOL lpbGroupDefaulted);
  324. DWORD GetSecurityDescriptorLength(PSECURITY_DESCRIPTOR pSecurityDescriptor);
  325. BOOL GetSecurityDescriptorOwner(PSECURITY_DESCRIPTOR pSecurityDescriptor,PSID* pOwner,LPBOOL lpbOwnerDefaulted);
  326. BOOL GetSecurityDescriptorSacl(PSECURITY_DESCRIPTOR pSecurityDescriptor,LPBOOL lpbSaclPresent,PACL* pSacl,LPBOOL lpbSaclDefaulted);
  327. BOOL InitializeAcl(PACL pAcl,DWORD nAclLength,DWORD dwAclRevision);
  328. BOOL InitializeSecurityDescriptor(PSECURITY_DESCRIPTOR pSecurityDescriptor,DWORD dwRevision);
  329. BOOL IsValidAcl(PACL pAcl);
  330. BOOL IsValidSecurityDescriptor(PSECURITY_DESCRIPTOR pSecurityDescriptor);
  331. BOOL MakeAbsoluteSD(PSECURITY_DESCRIPTOR_RELATIVE pSelfRelativeSD,PSECURITY_DESCRIPTOR pAbsoluteSD,LPDWORD lpdwAbsoluteSDSize,PACL pDacl,LPDWORD lpdwDaclSize,PACL pSacl,LPDWORD lpdwSaclSize,PSID pOwner,LPDWORD lpdwOwnerSize,PSID pPrimaryGroup,LPDWORD lpdwPrimaryGroupSize);
  332. BOOL MakeSelfRelativeSD(PSECURITY_DESCRIPTOR pAbsoluteSD,PSECURITY_DESCRIPTOR pSelfRelativeSD,LPDWORD lpdwBufferLength);
  333. BOOL QueryServiceObjectSecurity(SC_HANDLE hService,SECURITY_INFORMATION dwSecurityInformation,PSECURITY_DESCRIPTOR lpSecurityDescriptor,DWORD cbBufSize,LPDWORD pcbBytesNeeded);
  334. [REG_ERROR] RegGetKeySecurity(HKEY hKey,SECURITY_INFORMATION SecurityInformation,PSECURITY_DESCRIPTOR pSecurityDescriptor,LPDWORD lpcbSecurityDescriptor);
  335. [REG_ERROR] RegSetKeySecurity(HKEY hKey,SECURITY_INFORMATION SecurityInformation,PSECURITY_DESCRIPTOR pSecurityDescriptor);
  336. BOOL SetAclInformation(PACL pAcl,LPVOID pAclInformation,DWORD nAclInformationLength,ACL_INFORMATION_CLASS dwAclInformationClass);
  337. BOOL SetFileSecurity(LPCTSTR lpFileName,SECURITY_INFORMATION SecurityInformation,PSECURITY_DESCRIPTOR pSecurityDescriptor);
  338. BOOL SetKernelObjectSecurity(HANDLE Handle,SECURITY_INFORMATION SecurityInformation,PSECURITY_DESCRIPTOR SecurityDescriptor);
  339. BOOL SetSecurityDescriptorDacl(PSECURITY_DESCRIPTOR pSecurityDescriptor,BOOL bDaclPresent,PACL pDacl,BOOL bDaclDefaulted);
  340. BOOL SetSecurityDescriptorGroup(PSECURITY_DESCRIPTOR pSecurityDescriptor,PSID pGroup,BOOL bGroupDefaulted);
  341. BOOL SetSecurityDescriptorOwner(PSECURITY_DESCRIPTOR pSecurityDescriptor,PSID pOwner,BOOL bOwnerDefaulted);
  342. BOOL SetSecurityDescriptorSacl(PSECURITY_DESCRIPTOR pSecurityDescriptor,BOOL bSaclPresent,PACL pSacl,BOOL bSaclDefaulted);
  343. BOOL SetServiceObjectSecurity(SC_HANDLE hService,SECURITY_INFORMATION dwSecurityInformation,PSECURITY_DESCRIPTOR lpSecurityDescriptor);
  344. BOOLEAN AuditComputeEffectivePolicyBySid(const PSID pSid,const GUID* pSubCategoryGuids,ULONG PolicyCount,PAUDIT_POLICY_INFORMATION* ppAuditPolicy);
  345. BOOLEAN AuditComputeEffectivePolicyByToken(HANDLE hTokenHandle,const GUID* pSubCategoryGuids,ULONG PolicyCount,PAUDIT_POLICY_INFORMATION* ppAuditPolicy);
  346. BOOLEAN AuditEnumerateCategories(GUID** ppAuditCategoriesArray,PULONG pCountReturned);
  347. BOOLEAN AuditEnumeratePerUserPolicy(PPOLICY_AUDIT_SID_ARRAY* ppAuditSidArray);
  348. BOOLEAN AuditEnumerateSubCategories(const GUID* pAuditCategoryGuid,BOOLEAN bRetrieveAllSubCategories,GUID** ppAuditSubCategoriesArray,PULONG pCountReturned);
  349. VOID AuditFree(PVOID Buffer);
  350. BOOLEAN AuditLookupCategoryGuidFromCategoryId(POLICY_AUDIT_EVENT_TYPE AuditCategoryId,GUID* pAuditCategoryGuid);
  351. BOOLEAN AuditLookupCategoryIdFromCategoryGuid(const GUID* pAuditCategoryGuid,PPOLICY_AUDIT_EVENT_TYPE pAuditCategoryId);
  352. BOOLEAN AuditLookupCategoryName(const GUID* pAuditCategoryGuid,PTSTR* ppszCategoryName);
  353. BOOLEAN AuditLookupSubCategoryName(const GUID* pAuditSubCategoryGuid,PTSTR* ppszSubCategoryName);
  354. BOOLEAN AuditQueryPerUserPolicy(const PSID pSid,const GUID* pSubCategoryGuids,ULONG PolicyCount,PAUDIT_POLICY_INFORMATION* ppAuditPolicy);
  355. BOOLEAN AuditQuerySystemPolicy(const GUID* pSubCategoryGuids,ULONG PolicyCount,PAUDIT_POLICY_INFORMATION* ppAuditPolicy);
  356. BOOLEAN AuditSetPerUserPolicy(const PSID pSid,PCAUDIT_POLICY_INFORMATION pAuditPolicy,ULONG PolicyCount);
  357. BOOLEAN AuditSetSystemPolicy(PCAUDIT_POLICY_INFORMATION pAuditPolicy,ULONG PolicyCount);
  358. BOOLEAN AuditQueryGlobalSacl(PCTSTR ObjectTypeName,PACL* Acl);
  359. BOOLEAN AuditSetGlobalSacl(PCTSTR ObjectTypeName,PACL Acl);
  360. BOOLEAN AuditQuerySecurity(SECURITY_INFORMATION SecurityInformation,PSECURITY_DESCRIPTOR* ppSecurityDescriptor);
  361. BOOLEAN AuditSetSecurity(SECURITY_INFORMATION SecurityInformation,PSECURITY_DESCRIPTOR pSecurityDescriptor);
  362. BOOL AddConditionalAce(PACL pAcl,DWORD dwAceRevision,[AceFlags] AceFlags,[ACE_TYPE|UCHAR] AceType,[ACCESS_MASK_DWORD] AccessMask,PSID pSid,PWCHAR ConditionStr,DWORD* ReturnLength);
  363. BOOL GetAppContainerNamedObjectPath(HANDLE Token,PSID AppContainerSid,ULONG ObjectPathLength,LPWSTR ObjectPath,PULONG ReturnLength);
  364. BOOL LogonUser(LPTSTR lpszUsername,LPTSTR lpszDomain,LPTSTR lpszPassword,[LogonType] dwLogonType,[LogonProvider] dwLogonProvider,PHANDLE phToken);
  365. BOOL LogonUserEx(LPTSTR lpszUsername,LPTSTR lpszDomain,LPTSTR lpszPassword,[LogonType] dwLogonType,[LogonProvider] dwLogonProvider,PHANDLE phToken,PSID* ppLogonSid,PVOID* ppProfileBuffer,LPDWORD pdwProfileLength,PQUOTA_LIMITS pQuotaLimits);
  366. BOOL LogonUserExExW(LPWSTR lpszUsername,LPWSTR lpszDomain,LPWSTR lpszPassword,[LogonType] dwLogonType,PTOKEN_GROUPS pTokenGroups,[LogonProvider] dwLogonProvider,PHANDLE phToken,PSID* ppLogonSid,PVOID* ppProfileBuffer,LPDWORD pdwProfileLength,PQUOTA_LIMITS pQuotaLimits);
  367. BOOL CredDelete(LPCTSTR TargetName,DWORD Type,DWORD Flags);
  368. BOOL CredEnumerate(LPCTSTR Filter,[CredEnumerateFlags] Flags,DWORD* Count,PCREDENTIAL** Credentials);
  369. BOOL CredFindBestCredential(LPCTSTR TargetName,DWORD Type,DWORD Flags,PCREDENTIAL* Credential);
  370. VOID CredFree(PVOID Buffer);
  371. BOOL CredGetSessionTypes(DWORD MaximumPersistCount,LPDWORD MaximumPersist);
  372. BOOL CredGetTargetInfo(LPCTSTR TargetName,[CredGetTargetInfoFlags] Flags,PCREDENTIAL_TARGET_INFORMATION* TargetInfo);
  373. BOOL CredIsProtected(LPTSTR pszProtectedCredentials,CRED_PROTECTION_TYPE* pProtectionType);
  374. BOOL CredProtect(BOOL fAsSelf,LPTSTR pszCredentials,DWORD cchCredentials,LPTSTR pszProtectedCredentials,DWORD* pcchMaxChars,CRED_PROTECTION_TYPE* ProtectionType);
  375. BOOL CredMarshalCredential(CRED_MARSHAL_TYPE CredType,PVOID Credential,LPTSTR* MarshaledCredential);
  376. BOOL CredRead(LPCTSTR TargetName,[CredType] Type,DWORD Flags,PCREDENTIAL* Credential);
  377. BOOL CredReadDomainCredentials(PCREDENTIAL_TARGET_INFORMATION TargetInfo,DWORD Flags,DWORD* Count,PCREDENTIAL** Credentials);
  378. BOOL CredRename(LPCTSTR OldTargetName,LPCTSTR NewTargetName,DWORD Type,DWORD Flags);
  379. BOOL CredUnmarshalCredential(LPCTSTR MarshaledCredential,PCRED_MARSHAL_TYPE CredType,PVOID* Credential);
  380. BOOL CredUnprotect(BOOL fAsSelf,LPTSTR pszProtectedCredentials,DWORD cchCredentials,LPTSTR pszCredentials,DWORD* pcchMaxChars);
  381. BOOL CredWrite(PCREDENTIAL Credential,DWORD Flags);
  382. BOOL CredWriteDomainCredentials(PCREDENTIAL_TARGET_INFORMATION TargetInfo,PCREDENTIAL Credential,DWORD Flags);
  383. BOOL CredIsMarshaledCredential(LPTSTR MarshaledCredential);
  384. NTSTATUS LsaEnumerateAccountsWithUserRight(LSA_HANDLE PolicyHandle,PLSA_UNICODE_STRING UserRights,PVOID* EnumerationBuffer,PULONG CountReturned);
  385. NTSTATUS LsaEnumerateTrustedDomainsEx(LSA_HANDLE PolicyHandle,PLSA_ENUMERATION_HANDLE EnumerationContext,PVOID* Buffer,ULONG PreferredMaximumLength,PULONG CountReturned);
  386. NTSTATUS LsaLookupNames(LSA_HANDLE PolicyHandle,ULONG Count,PLSA_UNICODE_STRING Names,PLSA_REFERENCED_DOMAIN_LIST* ReferencedDomains,PLSA_TRANSLATED_SID* Sids);
  387. NTSTATUS LsaLookupNames2(LSA_HANDLE PolicyHandle,[LSA_LOOKUP_FLAGS] Flags,ULONG Count,PLSA_UNICODE_STRING Names,PLSA_REFERENCED_DOMAIN_LIST* ReferencedDomains,PLSA_TRANSLATED_SID2* Sids);
  388. NTSTATUS LsaLookupPrivilegeValue(LSA_HANDLE PolicyHandle,PUNICODE_STRING Name,PLUID Value);
  389. NTSTATUS LsaLookupSids(LSA_HANDLE PolicyHandle,ULONG Count,PSID* Sids,PLSA_REFERENCED_DOMAIN_LIST* ReferencedDomains,PLSA_TRANSLATED_NAME* Names);
  390. NTSTATUS LsaLookupSids2(LSA_HANDLE PolicyHandle,ULONG LookupOptions,ULONG Count,PSID* Sids,PLSA_REFERENCED_DOMAIN_LIST* ReferencedDomains,PLSA_TRANSLATED_NAME* Names);
  391. NTSTATUS LsaAddAccountRights(LSA_HANDLE PolicyHandle,PSID AccountSid,PLSA_UNICODE_STRING UserRights,ULONG CountOfRights);
  392. NTSTATUS LsaEnumerateAccountRights(LSA_HANDLE PolicyHandle,PSID AccountSid,PLSA_UNICODE_STRING* UserRights,PULONG CountOfRights);
  393. NTSTATUS LsaRemoveAccountRights(LSA_HANDLE PolicyHandle,PSID AccountSid,BOOLEAN AllRights,PLSA_UNICODE_STRING UserRights,ULONG CountOfRights);
  394. NTSTATUS LsaCreateTrustedDomainEx(LSA_HANDLE PolicyHandle,PTRUSTED_DOMAIN_INFORMATION_EX TrustedDomainInformation,PTRUSTED_DOMAIN_AUTH_INFORMATION AuthenticationInformation,ACCESS_MASK DesiredAccess,PLSA_HANDLE TrustedDomainHandle);
  395. NTSTATUS LsaDeleteTrustedDomain(LSA_HANDLE PolicyHandle,PSID TrustedDomainSid);
  396. NTSTATUS LsaEnumerateTrustedDomains(LSA_HANDLE PolicyHandle,PLSA_ENUMERATION_HANDLE EnumerationContext,PVOID* Buffer,ULONG PreferedMaximumLength,PULONG CountReturned);
  397. NTSTATUS LsaOpenTrustedDomainByName(LSA_HANDLE PolicyHandle,PLSA_UNICODE_STRING TrustedDomainName,ACCESS_MASK DesiredAccess,PLSA_HANDLE TrustedDomainHandle);
  398. NTSTATUS LsaQueryTrustedDomainInfo(LSA_HANDLE PolicyHandle,PSID TrustedDomainSid,TRUSTED_INFORMATION_CLASS InformationClass,PVOID* Buffer);
  399. NTSTATUS LsaQueryTrustedDomainInfoByName(LSA_HANDLE PolicyHandle,PLSA_UNICODE_STRING TrustedDomainName,TRUSTED_INFORMATION_CLASS InformationClass,PVOID* Buffer);
  400. NTSTATUS LsaSetTrustedDomainInfoByName(LSA_HANDLE PolicyHandle,PLSA_UNICODE_STRING TrustedDomainName,TRUSTED_INFORMATION_CLASS InformationClass,PVOID Buffer);
  401. NTSTATUS LsaSetTrustedDomainInformation(LSA_HANDLE PolicyHandle,PSID TrustedDomainSid,TRUSTED_INFORMATION_CLASS InformationClass,PVOID Buffer);
  402. NTSTATUS LsaRetrievePrivateData(LSA_HANDLE PolicyHandle,PLSA_UNICODE_STRING KeyName,PLSA_UNICODE_STRING* PrivateData);
  403. NTSTATUS LsaStorePrivateData(LSA_HANDLE PolicyHandle,PLSA_UNICODE_STRING KeyName,PLSA_UNICODE_STRING PrivateData);
  404. NTSTATUS LsaClose(LSA_HANDLE ObjectHandle);
  405. NTSTATUS LsaFreeMemory(PVOID Buffer);
  406. [ERROR_CODE_ULONG] LsaNtStatusToWinError(NTSTATUS Status);
  407. BOOL SaferCloseLevel(SAFER_LEVEL_HANDLE hLevelHandle);
  408. BOOL SaferIdentifyLevel(DWORD dwNumProperties,PSAFER_CODE_PROPERTIES pCodeProperties,SAFER_LEVEL_HANDLE* pLevelHandle,LPVOID lpReserved);
  409. BOOL SaferComputeTokenFromLevel(SAFER_LEVEL_HANDLE LevelHandle,HANDLE InAccessToken,PHANDLE OutAccessToken,DWORD dwFlags,LPVOID lpReserved);
  410. BOOL SaferCreateLevel([SaferScopeId] dwScopeId,DWORD dwLevelId,DWORD OpenFlags,SAFER_LEVEL_HANDLE* pLevelHandle,LPVOID lpReserved);
  411. BOOL SaferGetLevelInformation(SAFER_LEVEL_HANDLE LevelHandle,SAFER_OBJECT_INFO_CLASS dwInfoType,LPVOID lpQueryBuffer,DWORD dwInBufferSize,LPDWORD lpdwOutBufferSize);
  412. BOOL SaferGetPolicyInformation([SaferScopeId] dwScopeId,SAFER_POLICY_INFO_CLASS SaferPolicyInfoClass,DWORD InfoBufferSize,PVOID InfoBuffer,PDWORD InfoBufferRetSize,LPVOID lpReserved);
  413. BOOL SaferiIsExecutableFileType(LPCWSTR szFullPath,BOOLEAN bFromShellExecute);
  414. BOOL SaferRecordEventLogEntry(SAFER_LEVEL_HANDLE hLevel,LPCWSTR szTargetPath,LPVOID lpReserved);
  415. VOID CloseThreadWaitChainSession(HWCT WctHandle);
  416. BOOL GetThreadWaitChain(HWCT WctHandle,DWORD_PTR Context,DWORD Flags,DWORD ThreadId,LPDWORD NodeCount,PWAITCHAIN_NODE_INFO NodeInfoArray,LPBOOL IsCycle);
  417. HWCT OpenThreadWaitChainSession(DWORD Flags,PWAITCHAINCALLBACK callback);
  418. VOID RegisterWaitChainCOMCallback(PCOGETCALLSTATE CallStateCallback,PCOGETACTIVATIONSTATE ActivationStateCallback);
  419. NTSTATUS LsaOpenPolicy(PLSA_UNICODE_STRING SystemName,PLSA_OBJECT_ATTRIBUTES ObjectAttributes,ACCESS_MASK DesiredAccess,PLSA_HANDLE PolicyHandle);
  420. NTSTATUS LsaQueryInformationPolicy(LSA_HANDLE PolicyHandle,POLICY_INFORMATION_CLASS InformationClass,PVOID* Buffer);
  421. NTSTATUS LsaSetInformationPolicy(LSA_HANDLE PolicyHandle,POLICY_INFORMATION_CLASS InformationClass,PVOID Buffer);
  422. NTSTATUS LsaGetAppliedCAPIDs(PLSA_UNICODE_STRING SystemName,PSID** CAPIDs,PULONG CAPIDCount);
  423. NTSTATUS LsaQueryCAPs(PSID* CAPIDs,ULONG CAPIDCount,PCENTRAL_ACCESS_POLICY* CAPs,PULONG CAPCount);
  424. NTSTATUS LsaSetCAPs(PLSA_UNICODE_STRING CAPDNs,ULONG CAPDNCount,ULONG Flags);
  425. NTSTATUS LsaQueryDomainInformationPolicy(LSA_HANDLE PolicyHandle,POLICY_DOMAIN_INFORMATION_CLASS InformationClass,PVOID* Buffer);
  426. NTSTATUS LsaQueryForestTrustInformation(LSA_HANDLE PolicyHandle,PLSA_UNICODE_STRING TrustedDomainName,PLSA_FOREST_TRUST_INFORMATION* ForestTrustInfo);
  427. NTSTATUS LsaSetDomainInformationPolicy(LSA_HANDLE PolicyHandle,POLICY_DOMAIN_INFORMATION_CLASS InformationClass,PVOID Buffer);
  428. NTSTATUS LsaSetForestTrustInformation(LSA_HANDLE PolicyHandle,PLSA_UNICODE_STRING TrustedDomainName,PLSA_FOREST_TRUST_INFORMATION ForestTrustInfo,BOOLEAN CheckOnly,PLSA_FOREST_TRUST_COLLISION_INFORMATION* CollisionInfo);
  429. NTSTATUS LsaOpenSecret(LSA_HANDLE PolicyHandle,PLSA_UNICODE_STRING SecretName,ACCESS_MASK DesiredAccess,PLSA_HANDLE SecretHandle);
  430. NTSTATUS LsaSetSecret(LSA_HANDLE SecretHandle,PLSA_UNICODE_STRING CurrentValue,PLSA_UNICODE_STRING OldValue);
  431. NTSTATUS LsaQuerySecret(LSA_HANDLE SecretHandle,PLSA_UNICODE_STRING* CurrentValue,PLARGE_INTEGER CurrentValueSetTime,PLSA_UNICODE_STRING* OldValue,PLARGE_INTEGER OldValueSetTime);
  432. BOOLEAN SystemFunction036(PVOID RandomBuffer,ULONG RandomBufferLength);
  433. NTSTATUS SystemFunction040(PVOID Memory,ULONG MemorySize,[RTL_ENCRYPT_OPTION_FLAGS] OptionFlags);
  434. NTSTATUS SystemFunction041(PVOID Memory,ULONG MemorySize,[RTL_ENCRYPT_OPTION_FLAGS] OptionFlags);
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement