r25068: Older samba3 DCs will return DCERPC_FAULT_OP_RNG_ERROR for every opcode on the
[Samba.git] / source / librpc / gen_ndr / cli_lsa.c
blobbc786b61b46fad500e8e31cbbec9fa060a612085
1 /*
2 * Unix SMB/CIFS implementation.
3 * client auto-generated by pidl. DO NOT MODIFY!
4 */
6 #include "includes.h"
7 #include "librpc/gen_ndr/cli_lsa.h"
9 NTSTATUS rpccli_lsa_Close(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle)
11 struct lsa_Close r;
12 NTSTATUS status;
14 /* In parameters */
15 r.in.handle = handle;
17 if (DEBUGLEVEL >= 10)
18 NDR_PRINT_IN_DEBUG(lsa_Close, &r);
20 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_CLOSE, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_Close, (ndr_push_flags_fn_t)ndr_push_lsa_Close);
22 if (!NT_STATUS_IS_OK(status)) {
23 return status;
26 if (DEBUGLEVEL >= 10)
27 NDR_PRINT_OUT_DEBUG(lsa_Close, &r);
29 if (NT_STATUS_IS_ERR(status)) {
30 return status;
33 /* Return variables */
34 *handle = *r.out.handle;
36 /* Return result */
37 return r.out.result;
40 NTSTATUS rpccli_lsa_Delete(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle)
42 struct lsa_Delete r;
43 NTSTATUS status;
45 /* In parameters */
46 r.in.handle = handle;
48 if (DEBUGLEVEL >= 10)
49 NDR_PRINT_IN_DEBUG(lsa_Delete, &r);
51 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_DELETE, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_Delete, (ndr_push_flags_fn_t)ndr_push_lsa_Delete);
53 if (!NT_STATUS_IS_OK(status)) {
54 return status;
57 if (DEBUGLEVEL >= 10)
58 NDR_PRINT_OUT_DEBUG(lsa_Delete, &r);
60 if (NT_STATUS_IS_ERR(status)) {
61 return status;
64 /* Return variables */
66 /* Return result */
67 return r.out.result;
70 NTSTATUS rpccli_lsa_EnumPrivs(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, uint32_t *resume_handle, uint32_t max_count, struct lsa_PrivArray *privs)
72 struct lsa_EnumPrivs r;
73 NTSTATUS status;
75 /* In parameters */
76 r.in.handle = handle;
77 r.in.resume_handle = resume_handle;
78 r.in.max_count = max_count;
80 if (DEBUGLEVEL >= 10)
81 NDR_PRINT_IN_DEBUG(lsa_EnumPrivs, &r);
83 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_ENUMPRIVS, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_EnumPrivs, (ndr_push_flags_fn_t)ndr_push_lsa_EnumPrivs);
85 if (!NT_STATUS_IS_OK(status)) {
86 return status;
89 if (DEBUGLEVEL >= 10)
90 NDR_PRINT_OUT_DEBUG(lsa_EnumPrivs, &r);
92 if (NT_STATUS_IS_ERR(status)) {
93 return status;
96 /* Return variables */
97 *resume_handle = *r.out.resume_handle;
98 *privs = *r.out.privs;
100 /* Return result */
101 return r.out.result;
104 NTSTATUS rpccli_lsa_QuerySecurity(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, uint32_t sec_info, struct sec_desc_buf *sdbuf)
106 struct lsa_QuerySecurity r;
107 NTSTATUS status;
109 /* In parameters */
110 r.in.handle = handle;
111 r.in.sec_info = sec_info;
113 if (DEBUGLEVEL >= 10)
114 NDR_PRINT_IN_DEBUG(lsa_QuerySecurity, &r);
116 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_QUERYSECURITY, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_QuerySecurity, (ndr_push_flags_fn_t)ndr_push_lsa_QuerySecurity);
118 if (!NT_STATUS_IS_OK(status)) {
119 return status;
122 if (DEBUGLEVEL >= 10)
123 NDR_PRINT_OUT_DEBUG(lsa_QuerySecurity, &r);
125 if (NT_STATUS_IS_ERR(status)) {
126 return status;
129 /* Return variables */
130 if ( sdbuf ) {
131 *sdbuf = *r.out.sdbuf;
134 /* Return result */
135 return r.out.result;
138 NTSTATUS rpccli_lsa_SetSecObj(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
140 struct lsa_SetSecObj r;
141 NTSTATUS status;
143 /* In parameters */
145 if (DEBUGLEVEL >= 10)
146 NDR_PRINT_IN_DEBUG(lsa_SetSecObj, &r);
148 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_SETSECOBJ, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_SetSecObj, (ndr_push_flags_fn_t)ndr_push_lsa_SetSecObj);
150 if (!NT_STATUS_IS_OK(status)) {
151 return status;
154 if (DEBUGLEVEL >= 10)
155 NDR_PRINT_OUT_DEBUG(lsa_SetSecObj, &r);
157 if (NT_STATUS_IS_ERR(status)) {
158 return status;
161 /* Return variables */
163 /* Return result */
164 return r.out.result;
167 NTSTATUS rpccli_lsa_ChangePassword(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
169 struct lsa_ChangePassword r;
170 NTSTATUS status;
172 /* In parameters */
174 if (DEBUGLEVEL >= 10)
175 NDR_PRINT_IN_DEBUG(lsa_ChangePassword, &r);
177 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_CHANGEPASSWORD, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_ChangePassword, (ndr_push_flags_fn_t)ndr_push_lsa_ChangePassword);
179 if (!NT_STATUS_IS_OK(status)) {
180 return status;
183 if (DEBUGLEVEL >= 10)
184 NDR_PRINT_OUT_DEBUG(lsa_ChangePassword, &r);
186 if (NT_STATUS_IS_ERR(status)) {
187 return status;
190 /* Return variables */
192 /* Return result */
193 return r.out.result;
196 NTSTATUS rpccli_lsa_OpenPolicy(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, uint16_t *system_name, struct lsa_ObjectAttribute *attr, uint32_t access_mask, struct policy_handle *handle)
198 struct lsa_OpenPolicy r;
199 NTSTATUS status;
201 /* In parameters */
202 r.in.system_name = system_name;
203 r.in.attr = attr;
204 r.in.access_mask = access_mask;
206 if (DEBUGLEVEL >= 10)
207 NDR_PRINT_IN_DEBUG(lsa_OpenPolicy, &r);
209 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_OPENPOLICY, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_OpenPolicy, (ndr_push_flags_fn_t)ndr_push_lsa_OpenPolicy);
211 if (!NT_STATUS_IS_OK(status)) {
212 return status;
215 if (DEBUGLEVEL >= 10)
216 NDR_PRINT_OUT_DEBUG(lsa_OpenPolicy, &r);
218 if (NT_STATUS_IS_ERR(status)) {
219 return status;
222 /* Return variables */
223 *handle = *r.out.handle;
225 /* Return result */
226 return r.out.result;
229 NTSTATUS rpccli_lsa_QueryInfoPolicy(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, uint16_t level, union lsa_PolicyInformation *info)
231 struct lsa_QueryInfoPolicy r;
232 NTSTATUS status;
234 /* In parameters */
235 r.in.handle = handle;
236 r.in.level = level;
238 if (DEBUGLEVEL >= 10)
239 NDR_PRINT_IN_DEBUG(lsa_QueryInfoPolicy, &r);
241 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_QUERYINFOPOLICY, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_QueryInfoPolicy, (ndr_push_flags_fn_t)ndr_push_lsa_QueryInfoPolicy);
243 if (!NT_STATUS_IS_OK(status)) {
244 return status;
247 if (DEBUGLEVEL >= 10)
248 NDR_PRINT_OUT_DEBUG(lsa_QueryInfoPolicy, &r);
250 if (NT_STATUS_IS_ERR(status)) {
251 return status;
254 /* Return variables */
255 if ( info ) {
256 *info = *r.out.info;
259 /* Return result */
260 return r.out.result;
263 NTSTATUS rpccli_lsa_SetInfoPolicy(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
265 struct lsa_SetInfoPolicy r;
266 NTSTATUS status;
268 /* In parameters */
270 if (DEBUGLEVEL >= 10)
271 NDR_PRINT_IN_DEBUG(lsa_SetInfoPolicy, &r);
273 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_SETINFOPOLICY, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_SetInfoPolicy, (ndr_push_flags_fn_t)ndr_push_lsa_SetInfoPolicy);
275 if (!NT_STATUS_IS_OK(status)) {
276 return status;
279 if (DEBUGLEVEL >= 10)
280 NDR_PRINT_OUT_DEBUG(lsa_SetInfoPolicy, &r);
282 if (NT_STATUS_IS_ERR(status)) {
283 return status;
286 /* Return variables */
288 /* Return result */
289 return r.out.result;
292 NTSTATUS rpccli_lsa_ClearAuditLog(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
294 struct lsa_ClearAuditLog r;
295 NTSTATUS status;
297 /* In parameters */
299 if (DEBUGLEVEL >= 10)
300 NDR_PRINT_IN_DEBUG(lsa_ClearAuditLog, &r);
302 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_CLEARAUDITLOG, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_ClearAuditLog, (ndr_push_flags_fn_t)ndr_push_lsa_ClearAuditLog);
304 if (!NT_STATUS_IS_OK(status)) {
305 return status;
308 if (DEBUGLEVEL >= 10)
309 NDR_PRINT_OUT_DEBUG(lsa_ClearAuditLog, &r);
311 if (NT_STATUS_IS_ERR(status)) {
312 return status;
315 /* Return variables */
317 /* Return result */
318 return r.out.result;
321 NTSTATUS rpccli_lsa_CreateAccount(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct dom_sid2 *sid, uint32_t access_mask, struct policy_handle *acct_handle)
323 struct lsa_CreateAccount r;
324 NTSTATUS status;
326 /* In parameters */
327 r.in.handle = handle;
328 r.in.sid = sid;
329 r.in.access_mask = access_mask;
331 if (DEBUGLEVEL >= 10)
332 NDR_PRINT_IN_DEBUG(lsa_CreateAccount, &r);
334 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_CREATEACCOUNT, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_CreateAccount, (ndr_push_flags_fn_t)ndr_push_lsa_CreateAccount);
336 if (!NT_STATUS_IS_OK(status)) {
337 return status;
340 if (DEBUGLEVEL >= 10)
341 NDR_PRINT_OUT_DEBUG(lsa_CreateAccount, &r);
343 if (NT_STATUS_IS_ERR(status)) {
344 return status;
347 /* Return variables */
348 *acct_handle = *r.out.acct_handle;
350 /* Return result */
351 return r.out.result;
354 NTSTATUS rpccli_lsa_EnumAccounts(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, uint32_t *resume_handle, uint32_t num_entries, struct lsa_SidArray *sids)
356 struct lsa_EnumAccounts r;
357 NTSTATUS status;
359 /* In parameters */
360 r.in.handle = handle;
361 r.in.resume_handle = resume_handle;
362 r.in.num_entries = num_entries;
364 if (DEBUGLEVEL >= 10)
365 NDR_PRINT_IN_DEBUG(lsa_EnumAccounts, &r);
367 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_ENUMACCOUNTS, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_EnumAccounts, (ndr_push_flags_fn_t)ndr_push_lsa_EnumAccounts);
369 if (!NT_STATUS_IS_OK(status)) {
370 return status;
373 if (DEBUGLEVEL >= 10)
374 NDR_PRINT_OUT_DEBUG(lsa_EnumAccounts, &r);
376 if (NT_STATUS_IS_ERR(status)) {
377 return status;
380 /* Return variables */
381 *resume_handle = *r.out.resume_handle;
382 *sids = *r.out.sids;
384 /* Return result */
385 return r.out.result;
388 NTSTATUS rpccli_lsa_CreateTrustedDomain(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct lsa_DomainInfo *info, uint32_t access_mask, struct policy_handle *trustdom_handle)
390 struct lsa_CreateTrustedDomain r;
391 NTSTATUS status;
393 /* In parameters */
394 r.in.handle = handle;
395 r.in.info = info;
396 r.in.access_mask = access_mask;
398 if (DEBUGLEVEL >= 10)
399 NDR_PRINT_IN_DEBUG(lsa_CreateTrustedDomain, &r);
401 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_CREATETRUSTEDDOMAIN, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_CreateTrustedDomain, (ndr_push_flags_fn_t)ndr_push_lsa_CreateTrustedDomain);
403 if (!NT_STATUS_IS_OK(status)) {
404 return status;
407 if (DEBUGLEVEL >= 10)
408 NDR_PRINT_OUT_DEBUG(lsa_CreateTrustedDomain, &r);
410 if (NT_STATUS_IS_ERR(status)) {
411 return status;
414 /* Return variables */
415 *trustdom_handle = *r.out.trustdom_handle;
417 /* Return result */
418 return r.out.result;
421 NTSTATUS rpccli_lsa_EnumTrustDom(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, uint32_t *resume_handle, uint32_t max_size, struct lsa_DomainList *domains)
423 struct lsa_EnumTrustDom r;
424 NTSTATUS status;
426 /* In parameters */
427 r.in.handle = handle;
428 r.in.resume_handle = resume_handle;
429 r.in.max_size = max_size;
431 if (DEBUGLEVEL >= 10)
432 NDR_PRINT_IN_DEBUG(lsa_EnumTrustDom, &r);
434 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_ENUMTRUSTDOM, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_EnumTrustDom, (ndr_push_flags_fn_t)ndr_push_lsa_EnumTrustDom);
436 if (!NT_STATUS_IS_OK(status)) {
437 return status;
440 if (DEBUGLEVEL >= 10)
441 NDR_PRINT_OUT_DEBUG(lsa_EnumTrustDom, &r);
443 if (NT_STATUS_IS_ERR(status)) {
444 return status;
447 /* Return variables */
448 *resume_handle = *r.out.resume_handle;
449 *domains = *r.out.domains;
451 /* Return result */
452 return r.out.result;
455 NTSTATUS rpccli_lsa_LookupNames(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, uint32_t num_names, struct lsa_String *names, struct lsa_RefDomainList *domains, struct lsa_TransSidArray *sids, uint16_t level, uint32_t *count)
457 struct lsa_LookupNames r;
458 NTSTATUS status;
460 /* In parameters */
461 r.in.handle = handle;
462 r.in.num_names = num_names;
463 r.in.names = names;
464 r.in.sids = sids;
465 r.in.level = level;
466 r.in.count = count;
468 if (DEBUGLEVEL >= 10)
469 NDR_PRINT_IN_DEBUG(lsa_LookupNames, &r);
471 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_LOOKUPNAMES, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_LookupNames, (ndr_push_flags_fn_t)ndr_push_lsa_LookupNames);
473 if (!NT_STATUS_IS_OK(status)) {
474 return status;
477 if (DEBUGLEVEL >= 10)
478 NDR_PRINT_OUT_DEBUG(lsa_LookupNames, &r);
480 if (NT_STATUS_IS_ERR(status)) {
481 return status;
484 /* Return variables */
485 if ( domains ) {
486 *domains = *r.out.domains;
488 *sids = *r.out.sids;
489 *count = *r.out.count;
491 /* Return result */
492 return r.out.result;
495 NTSTATUS rpccli_lsa_LookupSids(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct lsa_SidArray *sids, struct lsa_RefDomainList *domains, struct lsa_TransNameArray *names, uint16_t level, uint32_t *count)
497 struct lsa_LookupSids r;
498 NTSTATUS status;
500 /* In parameters */
501 r.in.handle = handle;
502 r.in.sids = sids;
503 r.in.names = names;
504 r.in.level = level;
505 r.in.count = count;
507 if (DEBUGLEVEL >= 10)
508 NDR_PRINT_IN_DEBUG(lsa_LookupSids, &r);
510 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_LOOKUPSIDS, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_LookupSids, (ndr_push_flags_fn_t)ndr_push_lsa_LookupSids);
512 if (!NT_STATUS_IS_OK(status)) {
513 return status;
516 if (DEBUGLEVEL >= 10)
517 NDR_PRINT_OUT_DEBUG(lsa_LookupSids, &r);
519 if (NT_STATUS_IS_ERR(status)) {
520 return status;
523 /* Return variables */
524 if ( domains ) {
525 *domains = *r.out.domains;
527 *names = *r.out.names;
528 *count = *r.out.count;
530 /* Return result */
531 return r.out.result;
534 NTSTATUS rpccli_lsa_CreateSecret(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct lsa_String name, uint32_t access_mask, struct policy_handle *sec_handle)
536 struct lsa_CreateSecret r;
537 NTSTATUS status;
539 /* In parameters */
540 r.in.handle = handle;
541 r.in.name = name;
542 r.in.access_mask = access_mask;
544 if (DEBUGLEVEL >= 10)
545 NDR_PRINT_IN_DEBUG(lsa_CreateSecret, &r);
547 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_CREATESECRET, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_CreateSecret, (ndr_push_flags_fn_t)ndr_push_lsa_CreateSecret);
549 if (!NT_STATUS_IS_OK(status)) {
550 return status;
553 if (DEBUGLEVEL >= 10)
554 NDR_PRINT_OUT_DEBUG(lsa_CreateSecret, &r);
556 if (NT_STATUS_IS_ERR(status)) {
557 return status;
560 /* Return variables */
561 *sec_handle = *r.out.sec_handle;
563 /* Return result */
564 return r.out.result;
567 NTSTATUS rpccli_lsa_OpenAccount(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct dom_sid2 *sid, uint32_t access_mask, struct policy_handle *acct_handle)
569 struct lsa_OpenAccount r;
570 NTSTATUS status;
572 /* In parameters */
573 r.in.handle = handle;
574 r.in.sid = sid;
575 r.in.access_mask = access_mask;
577 if (DEBUGLEVEL >= 10)
578 NDR_PRINT_IN_DEBUG(lsa_OpenAccount, &r);
580 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_OPENACCOUNT, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_OpenAccount, (ndr_push_flags_fn_t)ndr_push_lsa_OpenAccount);
582 if (!NT_STATUS_IS_OK(status)) {
583 return status;
586 if (DEBUGLEVEL >= 10)
587 NDR_PRINT_OUT_DEBUG(lsa_OpenAccount, &r);
589 if (NT_STATUS_IS_ERR(status)) {
590 return status;
593 /* Return variables */
594 *acct_handle = *r.out.acct_handle;
596 /* Return result */
597 return r.out.result;
600 NTSTATUS rpccli_lsa_EnumPrivsAccount(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct lsa_PrivilegeSet *privs)
602 struct lsa_EnumPrivsAccount r;
603 NTSTATUS status;
605 /* In parameters */
606 r.in.handle = handle;
608 if (DEBUGLEVEL >= 10)
609 NDR_PRINT_IN_DEBUG(lsa_EnumPrivsAccount, &r);
611 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_ENUMPRIVSACCOUNT, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_EnumPrivsAccount, (ndr_push_flags_fn_t)ndr_push_lsa_EnumPrivsAccount);
613 if (!NT_STATUS_IS_OK(status)) {
614 return status;
617 if (DEBUGLEVEL >= 10)
618 NDR_PRINT_OUT_DEBUG(lsa_EnumPrivsAccount, &r);
620 if (NT_STATUS_IS_ERR(status)) {
621 return status;
624 /* Return variables */
625 if ( privs ) {
626 *privs = *r.out.privs;
629 /* Return result */
630 return r.out.result;
633 NTSTATUS rpccli_lsa_AddPrivilegesToAccount(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct lsa_PrivilegeSet *privs)
635 struct lsa_AddPrivilegesToAccount r;
636 NTSTATUS status;
638 /* In parameters */
639 r.in.handle = handle;
640 r.in.privs = privs;
642 if (DEBUGLEVEL >= 10)
643 NDR_PRINT_IN_DEBUG(lsa_AddPrivilegesToAccount, &r);
645 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_ADDPRIVILEGESTOACCOUNT, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_AddPrivilegesToAccount, (ndr_push_flags_fn_t)ndr_push_lsa_AddPrivilegesToAccount);
647 if (!NT_STATUS_IS_OK(status)) {
648 return status;
651 if (DEBUGLEVEL >= 10)
652 NDR_PRINT_OUT_DEBUG(lsa_AddPrivilegesToAccount, &r);
654 if (NT_STATUS_IS_ERR(status)) {
655 return status;
658 /* Return variables */
660 /* Return result */
661 return r.out.result;
664 NTSTATUS rpccli_lsa_RemovePrivilegesFromAccount(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, uint8_t remove_all, struct lsa_PrivilegeSet *privs)
666 struct lsa_RemovePrivilegesFromAccount r;
667 NTSTATUS status;
669 /* In parameters */
670 r.in.handle = handle;
671 r.in.remove_all = remove_all;
672 r.in.privs = privs;
674 if (DEBUGLEVEL >= 10)
675 NDR_PRINT_IN_DEBUG(lsa_RemovePrivilegesFromAccount, &r);
677 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_REMOVEPRIVILEGESFROMACCOUNT, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_RemovePrivilegesFromAccount, (ndr_push_flags_fn_t)ndr_push_lsa_RemovePrivilegesFromAccount);
679 if (!NT_STATUS_IS_OK(status)) {
680 return status;
683 if (DEBUGLEVEL >= 10)
684 NDR_PRINT_OUT_DEBUG(lsa_RemovePrivilegesFromAccount, &r);
686 if (NT_STATUS_IS_ERR(status)) {
687 return status;
690 /* Return variables */
692 /* Return result */
693 return r.out.result;
696 NTSTATUS rpccli_lsa_GetQuotasForAccount(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
698 struct lsa_GetQuotasForAccount r;
699 NTSTATUS status;
701 /* In parameters */
703 if (DEBUGLEVEL >= 10)
704 NDR_PRINT_IN_DEBUG(lsa_GetQuotasForAccount, &r);
706 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_GETQUOTASFORACCOUNT, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_GetQuotasForAccount, (ndr_push_flags_fn_t)ndr_push_lsa_GetQuotasForAccount);
708 if (!NT_STATUS_IS_OK(status)) {
709 return status;
712 if (DEBUGLEVEL >= 10)
713 NDR_PRINT_OUT_DEBUG(lsa_GetQuotasForAccount, &r);
715 if (NT_STATUS_IS_ERR(status)) {
716 return status;
719 /* Return variables */
721 /* Return result */
722 return r.out.result;
725 NTSTATUS rpccli_lsa_SetQuotasForAccount(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
727 struct lsa_SetQuotasForAccount r;
728 NTSTATUS status;
730 /* In parameters */
732 if (DEBUGLEVEL >= 10)
733 NDR_PRINT_IN_DEBUG(lsa_SetQuotasForAccount, &r);
735 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_SETQUOTASFORACCOUNT, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_SetQuotasForAccount, (ndr_push_flags_fn_t)ndr_push_lsa_SetQuotasForAccount);
737 if (!NT_STATUS_IS_OK(status)) {
738 return status;
741 if (DEBUGLEVEL >= 10)
742 NDR_PRINT_OUT_DEBUG(lsa_SetQuotasForAccount, &r);
744 if (NT_STATUS_IS_ERR(status)) {
745 return status;
748 /* Return variables */
750 /* Return result */
751 return r.out.result;
754 NTSTATUS rpccli_lsa_GetSystemAccessAccount(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
756 struct lsa_GetSystemAccessAccount r;
757 NTSTATUS status;
759 /* In parameters */
761 if (DEBUGLEVEL >= 10)
762 NDR_PRINT_IN_DEBUG(lsa_GetSystemAccessAccount, &r);
764 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_GETSYSTEMACCESSACCOUNT, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_GetSystemAccessAccount, (ndr_push_flags_fn_t)ndr_push_lsa_GetSystemAccessAccount);
766 if (!NT_STATUS_IS_OK(status)) {
767 return status;
770 if (DEBUGLEVEL >= 10)
771 NDR_PRINT_OUT_DEBUG(lsa_GetSystemAccessAccount, &r);
773 if (NT_STATUS_IS_ERR(status)) {
774 return status;
777 /* Return variables */
779 /* Return result */
780 return r.out.result;
783 NTSTATUS rpccli_lsa_SetSystemAccessAccount(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
785 struct lsa_SetSystemAccessAccount r;
786 NTSTATUS status;
788 /* In parameters */
790 if (DEBUGLEVEL >= 10)
791 NDR_PRINT_IN_DEBUG(lsa_SetSystemAccessAccount, &r);
793 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_SETSYSTEMACCESSACCOUNT, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_SetSystemAccessAccount, (ndr_push_flags_fn_t)ndr_push_lsa_SetSystemAccessAccount);
795 if (!NT_STATUS_IS_OK(status)) {
796 return status;
799 if (DEBUGLEVEL >= 10)
800 NDR_PRINT_OUT_DEBUG(lsa_SetSystemAccessAccount, &r);
802 if (NT_STATUS_IS_ERR(status)) {
803 return status;
806 /* Return variables */
808 /* Return result */
809 return r.out.result;
812 NTSTATUS rpccli_lsa_OpenTrustedDomain(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct dom_sid2 *sid, uint32_t access_mask, struct policy_handle *trustdom_handle)
814 struct lsa_OpenTrustedDomain r;
815 NTSTATUS status;
817 /* In parameters */
818 r.in.handle = handle;
819 r.in.sid = sid;
820 r.in.access_mask = access_mask;
822 if (DEBUGLEVEL >= 10)
823 NDR_PRINT_IN_DEBUG(lsa_OpenTrustedDomain, &r);
825 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_OPENTRUSTEDDOMAIN, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_OpenTrustedDomain, (ndr_push_flags_fn_t)ndr_push_lsa_OpenTrustedDomain);
827 if (!NT_STATUS_IS_OK(status)) {
828 return status;
831 if (DEBUGLEVEL >= 10)
832 NDR_PRINT_OUT_DEBUG(lsa_OpenTrustedDomain, &r);
834 if (NT_STATUS_IS_ERR(status)) {
835 return status;
838 /* Return variables */
839 *trustdom_handle = *r.out.trustdom_handle;
841 /* Return result */
842 return r.out.result;
845 NTSTATUS rpccli_lsa_QueryTrustedDomainInfo(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *trustdom_handle, enum lsa_TrustDomInfoEnum level, union lsa_TrustedDomainInfo *info)
847 struct lsa_QueryTrustedDomainInfo r;
848 NTSTATUS status;
850 /* In parameters */
851 r.in.trustdom_handle = trustdom_handle;
852 r.in.level = level;
854 if (DEBUGLEVEL >= 10)
855 NDR_PRINT_IN_DEBUG(lsa_QueryTrustedDomainInfo, &r);
857 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_QUERYTRUSTEDDOMAININFO, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_QueryTrustedDomainInfo, (ndr_push_flags_fn_t)ndr_push_lsa_QueryTrustedDomainInfo);
859 if (!NT_STATUS_IS_OK(status)) {
860 return status;
863 if (DEBUGLEVEL >= 10)
864 NDR_PRINT_OUT_DEBUG(lsa_QueryTrustedDomainInfo, &r);
866 if (NT_STATUS_IS_ERR(status)) {
867 return status;
870 /* Return variables */
871 if ( info ) {
872 *info = *r.out.info;
875 /* Return result */
876 return r.out.result;
879 NTSTATUS rpccli_lsa_SetInformationTrustedDomain(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
881 struct lsa_SetInformationTrustedDomain r;
882 NTSTATUS status;
884 /* In parameters */
886 if (DEBUGLEVEL >= 10)
887 NDR_PRINT_IN_DEBUG(lsa_SetInformationTrustedDomain, &r);
889 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_SETINFORMATIONTRUSTEDDOMAIN, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_SetInformationTrustedDomain, (ndr_push_flags_fn_t)ndr_push_lsa_SetInformationTrustedDomain);
891 if (!NT_STATUS_IS_OK(status)) {
892 return status;
895 if (DEBUGLEVEL >= 10)
896 NDR_PRINT_OUT_DEBUG(lsa_SetInformationTrustedDomain, &r);
898 if (NT_STATUS_IS_ERR(status)) {
899 return status;
902 /* Return variables */
904 /* Return result */
905 return r.out.result;
908 NTSTATUS rpccli_lsa_OpenSecret(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct lsa_String name, uint32_t access_mask, struct policy_handle *sec_handle)
910 struct lsa_OpenSecret r;
911 NTSTATUS status;
913 /* In parameters */
914 r.in.handle = handle;
915 r.in.name = name;
916 r.in.access_mask = access_mask;
918 if (DEBUGLEVEL >= 10)
919 NDR_PRINT_IN_DEBUG(lsa_OpenSecret, &r);
921 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_OPENSECRET, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_OpenSecret, (ndr_push_flags_fn_t)ndr_push_lsa_OpenSecret);
923 if (!NT_STATUS_IS_OK(status)) {
924 return status;
927 if (DEBUGLEVEL >= 10)
928 NDR_PRINT_OUT_DEBUG(lsa_OpenSecret, &r);
930 if (NT_STATUS_IS_ERR(status)) {
931 return status;
934 /* Return variables */
935 *sec_handle = *r.out.sec_handle;
937 /* Return result */
938 return r.out.result;
941 NTSTATUS rpccli_lsa_SetSecret(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *sec_handle, struct lsa_DATA_BUF *new_val, struct lsa_DATA_BUF *old_val)
943 struct lsa_SetSecret r;
944 NTSTATUS status;
946 /* In parameters */
947 r.in.sec_handle = sec_handle;
948 r.in.new_val = new_val;
949 r.in.old_val = old_val;
951 if (DEBUGLEVEL >= 10)
952 NDR_PRINT_IN_DEBUG(lsa_SetSecret, &r);
954 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_SETSECRET, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_SetSecret, (ndr_push_flags_fn_t)ndr_push_lsa_SetSecret);
956 if (!NT_STATUS_IS_OK(status)) {
957 return status;
960 if (DEBUGLEVEL >= 10)
961 NDR_PRINT_OUT_DEBUG(lsa_SetSecret, &r);
963 if (NT_STATUS_IS_ERR(status)) {
964 return status;
967 /* Return variables */
969 /* Return result */
970 return r.out.result;
973 NTSTATUS rpccli_lsa_QuerySecret(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *sec_handle, struct lsa_DATA_BUF_PTR *new_val, NTTIME *new_mtime, struct lsa_DATA_BUF_PTR *old_val, NTTIME *old_mtime)
975 struct lsa_QuerySecret r;
976 NTSTATUS status;
978 /* In parameters */
979 r.in.sec_handle = sec_handle;
980 r.in.new_val = new_val;
981 r.in.new_mtime = new_mtime;
982 r.in.old_val = old_val;
983 r.in.old_mtime = old_mtime;
985 if (DEBUGLEVEL >= 10)
986 NDR_PRINT_IN_DEBUG(lsa_QuerySecret, &r);
988 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_QUERYSECRET, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_QuerySecret, (ndr_push_flags_fn_t)ndr_push_lsa_QuerySecret);
990 if (!NT_STATUS_IS_OK(status)) {
991 return status;
994 if (DEBUGLEVEL >= 10)
995 NDR_PRINT_OUT_DEBUG(lsa_QuerySecret, &r);
997 if (NT_STATUS_IS_ERR(status)) {
998 return status;
1001 /* Return variables */
1002 if ( new_val ) {
1003 *new_val = *r.out.new_val;
1005 if ( new_mtime ) {
1006 *new_mtime = *r.out.new_mtime;
1008 if ( old_val ) {
1009 *old_val = *r.out.old_val;
1011 if ( old_mtime ) {
1012 *old_mtime = *r.out.old_mtime;
1015 /* Return result */
1016 return r.out.result;
1019 NTSTATUS rpccli_lsa_LookupPrivValue(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct lsa_String *name, struct lsa_LUID *luid)
1021 struct lsa_LookupPrivValue r;
1022 NTSTATUS status;
1024 /* In parameters */
1025 r.in.handle = handle;
1026 r.in.name = name;
1028 if (DEBUGLEVEL >= 10)
1029 NDR_PRINT_IN_DEBUG(lsa_LookupPrivValue, &r);
1031 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_LOOKUPPRIVVALUE, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_LookupPrivValue, (ndr_push_flags_fn_t)ndr_push_lsa_LookupPrivValue);
1033 if (!NT_STATUS_IS_OK(status)) {
1034 return status;
1037 if (DEBUGLEVEL >= 10)
1038 NDR_PRINT_OUT_DEBUG(lsa_LookupPrivValue, &r);
1040 if (NT_STATUS_IS_ERR(status)) {
1041 return status;
1044 /* Return variables */
1045 *luid = *r.out.luid;
1047 /* Return result */
1048 return r.out.result;
1051 NTSTATUS rpccli_lsa_LookupPrivName(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct lsa_LUID *luid, struct lsa_StringLarge *name)
1053 struct lsa_LookupPrivName r;
1054 NTSTATUS status;
1056 /* In parameters */
1057 r.in.handle = handle;
1058 r.in.luid = luid;
1060 if (DEBUGLEVEL >= 10)
1061 NDR_PRINT_IN_DEBUG(lsa_LookupPrivName, &r);
1063 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_LOOKUPPRIVNAME, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_LookupPrivName, (ndr_push_flags_fn_t)ndr_push_lsa_LookupPrivName);
1065 if (!NT_STATUS_IS_OK(status)) {
1066 return status;
1069 if (DEBUGLEVEL >= 10)
1070 NDR_PRINT_OUT_DEBUG(lsa_LookupPrivName, &r);
1072 if (NT_STATUS_IS_ERR(status)) {
1073 return status;
1076 /* Return variables */
1077 if ( name ) {
1078 *name = *r.out.name;
1081 /* Return result */
1082 return r.out.result;
1085 NTSTATUS rpccli_lsa_LookupPrivDisplayName(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct lsa_String *name, struct lsa_StringLarge *disp_name, uint16_t *language_id, uint16_t unknown)
1087 struct lsa_LookupPrivDisplayName r;
1088 NTSTATUS status;
1090 /* In parameters */
1091 r.in.handle = handle;
1092 r.in.name = name;
1093 r.in.language_id = language_id;
1094 r.in.unknown = unknown;
1096 if (DEBUGLEVEL >= 10)
1097 NDR_PRINT_IN_DEBUG(lsa_LookupPrivDisplayName, &r);
1099 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_LOOKUPPRIVDISPLAYNAME, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_LookupPrivDisplayName, (ndr_push_flags_fn_t)ndr_push_lsa_LookupPrivDisplayName);
1101 if (!NT_STATUS_IS_OK(status)) {
1102 return status;
1105 if (DEBUGLEVEL >= 10)
1106 NDR_PRINT_OUT_DEBUG(lsa_LookupPrivDisplayName, &r);
1108 if (NT_STATUS_IS_ERR(status)) {
1109 return status;
1112 /* Return variables */
1113 if ( disp_name ) {
1114 *disp_name = *r.out.disp_name;
1116 *language_id = *r.out.language_id;
1118 /* Return result */
1119 return r.out.result;
1122 NTSTATUS rpccli_lsa_DeleteObject(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
1124 struct lsa_DeleteObject r;
1125 NTSTATUS status;
1127 /* In parameters */
1129 if (DEBUGLEVEL >= 10)
1130 NDR_PRINT_IN_DEBUG(lsa_DeleteObject, &r);
1132 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_DELETEOBJECT, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_DeleteObject, (ndr_push_flags_fn_t)ndr_push_lsa_DeleteObject);
1134 if (!NT_STATUS_IS_OK(status)) {
1135 return status;
1138 if (DEBUGLEVEL >= 10)
1139 NDR_PRINT_OUT_DEBUG(lsa_DeleteObject, &r);
1141 if (NT_STATUS_IS_ERR(status)) {
1142 return status;
1145 /* Return variables */
1147 /* Return result */
1148 return r.out.result;
1151 NTSTATUS rpccli_lsa_EnumAccountsWithUserRight(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct lsa_String *name, struct lsa_SidArray *sids)
1153 struct lsa_EnumAccountsWithUserRight r;
1154 NTSTATUS status;
1156 /* In parameters */
1157 r.in.handle = handle;
1158 r.in.name = name;
1160 if (DEBUGLEVEL >= 10)
1161 NDR_PRINT_IN_DEBUG(lsa_EnumAccountsWithUserRight, &r);
1163 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_ENUMACCOUNTSWITHUSERRIGHT, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_EnumAccountsWithUserRight, (ndr_push_flags_fn_t)ndr_push_lsa_EnumAccountsWithUserRight);
1165 if (!NT_STATUS_IS_OK(status)) {
1166 return status;
1169 if (DEBUGLEVEL >= 10)
1170 NDR_PRINT_OUT_DEBUG(lsa_EnumAccountsWithUserRight, &r);
1172 if (NT_STATUS_IS_ERR(status)) {
1173 return status;
1176 /* Return variables */
1177 *sids = *r.out.sids;
1179 /* Return result */
1180 return r.out.result;
1183 NTSTATUS rpccli_lsa_EnumAccountRights(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct dom_sid2 *sid, struct lsa_RightSet *rights)
1185 struct lsa_EnumAccountRights r;
1186 NTSTATUS status;
1188 /* In parameters */
1189 r.in.handle = handle;
1190 r.in.sid = sid;
1192 if (DEBUGLEVEL >= 10)
1193 NDR_PRINT_IN_DEBUG(lsa_EnumAccountRights, &r);
1195 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_ENUMACCOUNTRIGHTS, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_EnumAccountRights, (ndr_push_flags_fn_t)ndr_push_lsa_EnumAccountRights);
1197 if (!NT_STATUS_IS_OK(status)) {
1198 return status;
1201 if (DEBUGLEVEL >= 10)
1202 NDR_PRINT_OUT_DEBUG(lsa_EnumAccountRights, &r);
1204 if (NT_STATUS_IS_ERR(status)) {
1205 return status;
1208 /* Return variables */
1209 *rights = *r.out.rights;
1211 /* Return result */
1212 return r.out.result;
1215 NTSTATUS rpccli_lsa_AddAccountRights(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct dom_sid2 *sid, struct lsa_RightSet *rights)
1217 struct lsa_AddAccountRights r;
1218 NTSTATUS status;
1220 /* In parameters */
1221 r.in.handle = handle;
1222 r.in.sid = sid;
1223 r.in.rights = rights;
1225 if (DEBUGLEVEL >= 10)
1226 NDR_PRINT_IN_DEBUG(lsa_AddAccountRights, &r);
1228 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_ADDACCOUNTRIGHTS, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_AddAccountRights, (ndr_push_flags_fn_t)ndr_push_lsa_AddAccountRights);
1230 if (!NT_STATUS_IS_OK(status)) {
1231 return status;
1234 if (DEBUGLEVEL >= 10)
1235 NDR_PRINT_OUT_DEBUG(lsa_AddAccountRights, &r);
1237 if (NT_STATUS_IS_ERR(status)) {
1238 return status;
1241 /* Return variables */
1243 /* Return result */
1244 return r.out.result;
1247 NTSTATUS rpccli_lsa_RemoveAccountRights(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct dom_sid2 *sid, uint32_t unknown, struct lsa_RightSet *rights)
1249 struct lsa_RemoveAccountRights r;
1250 NTSTATUS status;
1252 /* In parameters */
1253 r.in.handle = handle;
1254 r.in.sid = sid;
1255 r.in.unknown = unknown;
1256 r.in.rights = rights;
1258 if (DEBUGLEVEL >= 10)
1259 NDR_PRINT_IN_DEBUG(lsa_RemoveAccountRights, &r);
1261 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_REMOVEACCOUNTRIGHTS, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_RemoveAccountRights, (ndr_push_flags_fn_t)ndr_push_lsa_RemoveAccountRights);
1263 if (!NT_STATUS_IS_OK(status)) {
1264 return status;
1267 if (DEBUGLEVEL >= 10)
1268 NDR_PRINT_OUT_DEBUG(lsa_RemoveAccountRights, &r);
1270 if (NT_STATUS_IS_ERR(status)) {
1271 return status;
1274 /* Return variables */
1276 /* Return result */
1277 return r.out.result;
1280 NTSTATUS rpccli_lsa_QueryTrustedDomainInfoBySid(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct dom_sid2 *dom_sid, enum lsa_TrustDomInfoEnum level, union lsa_TrustedDomainInfo *info)
1282 struct lsa_QueryTrustedDomainInfoBySid r;
1283 NTSTATUS status;
1285 /* In parameters */
1286 r.in.handle = handle;
1287 r.in.dom_sid = dom_sid;
1288 r.in.level = level;
1290 if (DEBUGLEVEL >= 10)
1291 NDR_PRINT_IN_DEBUG(lsa_QueryTrustedDomainInfoBySid, &r);
1293 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_QUERYTRUSTEDDOMAININFOBYSID, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_QueryTrustedDomainInfoBySid, (ndr_push_flags_fn_t)ndr_push_lsa_QueryTrustedDomainInfoBySid);
1295 if (!NT_STATUS_IS_OK(status)) {
1296 return status;
1299 if (DEBUGLEVEL >= 10)
1300 NDR_PRINT_OUT_DEBUG(lsa_QueryTrustedDomainInfoBySid, &r);
1302 if (NT_STATUS_IS_ERR(status)) {
1303 return status;
1306 /* Return variables */
1307 if ( info ) {
1308 *info = *r.out.info;
1311 /* Return result */
1312 return r.out.result;
1315 NTSTATUS rpccli_lsa_SetTrustedDomainInfo(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
1317 struct lsa_SetTrustedDomainInfo r;
1318 NTSTATUS status;
1320 /* In parameters */
1322 if (DEBUGLEVEL >= 10)
1323 NDR_PRINT_IN_DEBUG(lsa_SetTrustedDomainInfo, &r);
1325 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_SETTRUSTEDDOMAININFO, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_SetTrustedDomainInfo, (ndr_push_flags_fn_t)ndr_push_lsa_SetTrustedDomainInfo);
1327 if (!NT_STATUS_IS_OK(status)) {
1328 return status;
1331 if (DEBUGLEVEL >= 10)
1332 NDR_PRINT_OUT_DEBUG(lsa_SetTrustedDomainInfo, &r);
1334 if (NT_STATUS_IS_ERR(status)) {
1335 return status;
1338 /* Return variables */
1340 /* Return result */
1341 return r.out.result;
1344 NTSTATUS rpccli_lsa_DeleteTrustedDomain(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct dom_sid2 *dom_sid)
1346 struct lsa_DeleteTrustedDomain r;
1347 NTSTATUS status;
1349 /* In parameters */
1350 r.in.handle = handle;
1351 r.in.dom_sid = dom_sid;
1353 if (DEBUGLEVEL >= 10)
1354 NDR_PRINT_IN_DEBUG(lsa_DeleteTrustedDomain, &r);
1356 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_DELETETRUSTEDDOMAIN, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_DeleteTrustedDomain, (ndr_push_flags_fn_t)ndr_push_lsa_DeleteTrustedDomain);
1358 if (!NT_STATUS_IS_OK(status)) {
1359 return status;
1362 if (DEBUGLEVEL >= 10)
1363 NDR_PRINT_OUT_DEBUG(lsa_DeleteTrustedDomain, &r);
1365 if (NT_STATUS_IS_ERR(status)) {
1366 return status;
1369 /* Return variables */
1371 /* Return result */
1372 return r.out.result;
1375 NTSTATUS rpccli_lsa_StorePrivateData(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
1377 struct lsa_StorePrivateData r;
1378 NTSTATUS status;
1380 /* In parameters */
1382 if (DEBUGLEVEL >= 10)
1383 NDR_PRINT_IN_DEBUG(lsa_StorePrivateData, &r);
1385 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_STOREPRIVATEDATA, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_StorePrivateData, (ndr_push_flags_fn_t)ndr_push_lsa_StorePrivateData);
1387 if (!NT_STATUS_IS_OK(status)) {
1388 return status;
1391 if (DEBUGLEVEL >= 10)
1392 NDR_PRINT_OUT_DEBUG(lsa_StorePrivateData, &r);
1394 if (NT_STATUS_IS_ERR(status)) {
1395 return status;
1398 /* Return variables */
1400 /* Return result */
1401 return r.out.result;
1404 NTSTATUS rpccli_lsa_RetrievePrivateData(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
1406 struct lsa_RetrievePrivateData r;
1407 NTSTATUS status;
1409 /* In parameters */
1411 if (DEBUGLEVEL >= 10)
1412 NDR_PRINT_IN_DEBUG(lsa_RetrievePrivateData, &r);
1414 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_RETRIEVEPRIVATEDATA, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_RetrievePrivateData, (ndr_push_flags_fn_t)ndr_push_lsa_RetrievePrivateData);
1416 if (!NT_STATUS_IS_OK(status)) {
1417 return status;
1420 if (DEBUGLEVEL >= 10)
1421 NDR_PRINT_OUT_DEBUG(lsa_RetrievePrivateData, &r);
1423 if (NT_STATUS_IS_ERR(status)) {
1424 return status;
1427 /* Return variables */
1429 /* Return result */
1430 return r.out.result;
1433 NTSTATUS rpccli_lsa_OpenPolicy2(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, const char *system_name, struct lsa_ObjectAttribute *attr, uint32_t access_mask, struct policy_handle *handle)
1435 struct lsa_OpenPolicy2 r;
1436 NTSTATUS status;
1438 /* In parameters */
1439 r.in.system_name = system_name;
1440 r.in.attr = attr;
1441 r.in.access_mask = access_mask;
1443 if (DEBUGLEVEL >= 10)
1444 NDR_PRINT_IN_DEBUG(lsa_OpenPolicy2, &r);
1446 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_OPENPOLICY2, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_OpenPolicy2, (ndr_push_flags_fn_t)ndr_push_lsa_OpenPolicy2);
1448 if (!NT_STATUS_IS_OK(status)) {
1449 return status;
1452 if (DEBUGLEVEL >= 10)
1453 NDR_PRINT_OUT_DEBUG(lsa_OpenPolicy2, &r);
1455 if (NT_STATUS_IS_ERR(status)) {
1456 return status;
1459 /* Return variables */
1460 *handle = *r.out.handle;
1462 /* Return result */
1463 return r.out.result;
1466 NTSTATUS rpccli_lsa_GetUserName(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, const char *system_name, struct lsa_String *account_name, struct lsa_StringPointer *authority_name)
1468 struct lsa_GetUserName r;
1469 NTSTATUS status;
1471 /* In parameters */
1472 r.in.system_name = system_name;
1473 r.in.account_name = account_name;
1474 r.in.authority_name = authority_name;
1476 if (DEBUGLEVEL >= 10)
1477 NDR_PRINT_IN_DEBUG(lsa_GetUserName, &r);
1479 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_GETUSERNAME, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_GetUserName, (ndr_push_flags_fn_t)ndr_push_lsa_GetUserName);
1481 if (!NT_STATUS_IS_OK(status)) {
1482 return status;
1485 if (DEBUGLEVEL >= 10)
1486 NDR_PRINT_OUT_DEBUG(lsa_GetUserName, &r);
1488 if (NT_STATUS_IS_ERR(status)) {
1489 return status;
1492 /* Return variables */
1493 if ( account_name ) {
1494 *account_name = *r.out.account_name;
1496 if ( authority_name ) {
1497 *authority_name = *r.out.authority_name;
1500 /* Return result */
1501 return r.out.result;
1504 NTSTATUS rpccli_lsa_QueryInfoPolicy2(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, uint16_t level, union lsa_PolicyInformation *info)
1506 struct lsa_QueryInfoPolicy2 r;
1507 NTSTATUS status;
1509 /* In parameters */
1510 r.in.handle = handle;
1511 r.in.level = level;
1513 if (DEBUGLEVEL >= 10)
1514 NDR_PRINT_IN_DEBUG(lsa_QueryInfoPolicy2, &r);
1516 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_QUERYINFOPOLICY2, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_QueryInfoPolicy2, (ndr_push_flags_fn_t)ndr_push_lsa_QueryInfoPolicy2);
1518 if (!NT_STATUS_IS_OK(status)) {
1519 return status;
1522 if (DEBUGLEVEL >= 10)
1523 NDR_PRINT_OUT_DEBUG(lsa_QueryInfoPolicy2, &r);
1525 if (NT_STATUS_IS_ERR(status)) {
1526 return status;
1529 /* Return variables */
1530 if ( info ) {
1531 *info = *r.out.info;
1534 /* Return result */
1535 return r.out.result;
1538 NTSTATUS rpccli_lsa_SetInfoPolicy2(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
1540 struct lsa_SetInfoPolicy2 r;
1541 NTSTATUS status;
1543 /* In parameters */
1545 if (DEBUGLEVEL >= 10)
1546 NDR_PRINT_IN_DEBUG(lsa_SetInfoPolicy2, &r);
1548 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_SETINFOPOLICY2, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_SetInfoPolicy2, (ndr_push_flags_fn_t)ndr_push_lsa_SetInfoPolicy2);
1550 if (!NT_STATUS_IS_OK(status)) {
1551 return status;
1554 if (DEBUGLEVEL >= 10)
1555 NDR_PRINT_OUT_DEBUG(lsa_SetInfoPolicy2, &r);
1557 if (NT_STATUS_IS_ERR(status)) {
1558 return status;
1561 /* Return variables */
1563 /* Return result */
1564 return r.out.result;
1567 NTSTATUS rpccli_lsa_QueryTrustedDomainInfoByName(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct lsa_String trusted_domain, enum lsa_TrustDomInfoEnum level, union lsa_TrustedDomainInfo *info)
1569 struct lsa_QueryTrustedDomainInfoByName r;
1570 NTSTATUS status;
1572 /* In parameters */
1573 r.in.handle = handle;
1574 r.in.trusted_domain = trusted_domain;
1575 r.in.level = level;
1577 if (DEBUGLEVEL >= 10)
1578 NDR_PRINT_IN_DEBUG(lsa_QueryTrustedDomainInfoByName, &r);
1580 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_QUERYTRUSTEDDOMAININFOBYNAME, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_QueryTrustedDomainInfoByName, (ndr_push_flags_fn_t)ndr_push_lsa_QueryTrustedDomainInfoByName);
1582 if (!NT_STATUS_IS_OK(status)) {
1583 return status;
1586 if (DEBUGLEVEL >= 10)
1587 NDR_PRINT_OUT_DEBUG(lsa_QueryTrustedDomainInfoByName, &r);
1589 if (NT_STATUS_IS_ERR(status)) {
1590 return status;
1593 /* Return variables */
1594 if ( info ) {
1595 *info = *r.out.info;
1598 /* Return result */
1599 return r.out.result;
1602 NTSTATUS rpccli_lsa_SetTrustedDomainInfoByName(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct lsa_String trusted_domain, enum lsa_TrustDomInfoEnum level, union lsa_TrustedDomainInfo *info)
1604 struct lsa_SetTrustedDomainInfoByName r;
1605 NTSTATUS status;
1607 /* In parameters */
1608 r.in.handle = handle;
1609 r.in.trusted_domain = trusted_domain;
1610 r.in.level = level;
1611 r.in.info = info;
1613 if (DEBUGLEVEL >= 10)
1614 NDR_PRINT_IN_DEBUG(lsa_SetTrustedDomainInfoByName, &r);
1616 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_SETTRUSTEDDOMAININFOBYNAME, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_SetTrustedDomainInfoByName, (ndr_push_flags_fn_t)ndr_push_lsa_SetTrustedDomainInfoByName);
1618 if (!NT_STATUS_IS_OK(status)) {
1619 return status;
1622 if (DEBUGLEVEL >= 10)
1623 NDR_PRINT_OUT_DEBUG(lsa_SetTrustedDomainInfoByName, &r);
1625 if (NT_STATUS_IS_ERR(status)) {
1626 return status;
1629 /* Return variables */
1631 /* Return result */
1632 return r.out.result;
1635 NTSTATUS rpccli_lsa_EnumTrustedDomainsEx(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, uint32_t *resume_handle, struct lsa_DomainListEx *domains, uint32_t max_size)
1637 struct lsa_EnumTrustedDomainsEx r;
1638 NTSTATUS status;
1640 /* In parameters */
1641 r.in.handle = handle;
1642 r.in.resume_handle = resume_handle;
1643 r.in.max_size = max_size;
1645 if (DEBUGLEVEL >= 10)
1646 NDR_PRINT_IN_DEBUG(lsa_EnumTrustedDomainsEx, &r);
1648 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_ENUMTRUSTEDDOMAINSEX, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_EnumTrustedDomainsEx, (ndr_push_flags_fn_t)ndr_push_lsa_EnumTrustedDomainsEx);
1650 if (!NT_STATUS_IS_OK(status)) {
1651 return status;
1654 if (DEBUGLEVEL >= 10)
1655 NDR_PRINT_OUT_DEBUG(lsa_EnumTrustedDomainsEx, &r);
1657 if (NT_STATUS_IS_ERR(status)) {
1658 return status;
1661 /* Return variables */
1662 *resume_handle = *r.out.resume_handle;
1663 *domains = *r.out.domains;
1665 /* Return result */
1666 return r.out.result;
1669 NTSTATUS rpccli_lsa_CreateTrustedDomainEx(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
1671 struct lsa_CreateTrustedDomainEx r;
1672 NTSTATUS status;
1674 /* In parameters */
1676 if (DEBUGLEVEL >= 10)
1677 NDR_PRINT_IN_DEBUG(lsa_CreateTrustedDomainEx, &r);
1679 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_CREATETRUSTEDDOMAINEX, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_CreateTrustedDomainEx, (ndr_push_flags_fn_t)ndr_push_lsa_CreateTrustedDomainEx);
1681 if (!NT_STATUS_IS_OK(status)) {
1682 return status;
1685 if (DEBUGLEVEL >= 10)
1686 NDR_PRINT_OUT_DEBUG(lsa_CreateTrustedDomainEx, &r);
1688 if (NT_STATUS_IS_ERR(status)) {
1689 return status;
1692 /* Return variables */
1694 /* Return result */
1695 return r.out.result;
1698 NTSTATUS rpccli_lsa_CloseTrustedDomainEx(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle)
1700 struct lsa_CloseTrustedDomainEx r;
1701 NTSTATUS status;
1703 /* In parameters */
1704 r.in.handle = handle;
1706 if (DEBUGLEVEL >= 10)
1707 NDR_PRINT_IN_DEBUG(lsa_CloseTrustedDomainEx, &r);
1709 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_CLOSETRUSTEDDOMAINEX, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_CloseTrustedDomainEx, (ndr_push_flags_fn_t)ndr_push_lsa_CloseTrustedDomainEx);
1711 if (!NT_STATUS_IS_OK(status)) {
1712 return status;
1715 if (DEBUGLEVEL >= 10)
1716 NDR_PRINT_OUT_DEBUG(lsa_CloseTrustedDomainEx, &r);
1718 if (NT_STATUS_IS_ERR(status)) {
1719 return status;
1722 /* Return variables */
1723 *handle = *r.out.handle;
1725 /* Return result */
1726 return r.out.result;
1729 NTSTATUS rpccli_lsa_QueryDomainInformationPolicy(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, uint16_t level, union lsa_DomainInformationPolicy *info)
1731 struct lsa_QueryDomainInformationPolicy r;
1732 NTSTATUS status;
1734 /* In parameters */
1735 r.in.handle = handle;
1736 r.in.level = level;
1738 if (DEBUGLEVEL >= 10)
1739 NDR_PRINT_IN_DEBUG(lsa_QueryDomainInformationPolicy, &r);
1741 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_QUERYDOMAININFORMATIONPOLICY, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_QueryDomainInformationPolicy, (ndr_push_flags_fn_t)ndr_push_lsa_QueryDomainInformationPolicy);
1743 if (!NT_STATUS_IS_OK(status)) {
1744 return status;
1747 if (DEBUGLEVEL >= 10)
1748 NDR_PRINT_OUT_DEBUG(lsa_QueryDomainInformationPolicy, &r);
1750 if (NT_STATUS_IS_ERR(status)) {
1751 return status;
1754 /* Return variables */
1755 if ( info ) {
1756 *info = *r.out.info;
1759 /* Return result */
1760 return r.out.result;
1763 NTSTATUS rpccli_lsa_SetDomainInformationPolicy(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, uint16_t level, union lsa_DomainInformationPolicy *info)
1765 struct lsa_SetDomainInformationPolicy r;
1766 NTSTATUS status;
1768 /* In parameters */
1769 r.in.handle = handle;
1770 r.in.level = level;
1771 r.in.info = info;
1773 if (DEBUGLEVEL >= 10)
1774 NDR_PRINT_IN_DEBUG(lsa_SetDomainInformationPolicy, &r);
1776 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_SETDOMAININFORMATIONPOLICY, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_SetDomainInformationPolicy, (ndr_push_flags_fn_t)ndr_push_lsa_SetDomainInformationPolicy);
1778 if (!NT_STATUS_IS_OK(status)) {
1779 return status;
1782 if (DEBUGLEVEL >= 10)
1783 NDR_PRINT_OUT_DEBUG(lsa_SetDomainInformationPolicy, &r);
1785 if (NT_STATUS_IS_ERR(status)) {
1786 return status;
1789 /* Return variables */
1791 /* Return result */
1792 return r.out.result;
1795 NTSTATUS rpccli_lsa_OpenTrustedDomainByName(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct lsa_String name, uint32_t access_mask, struct policy_handle *trustdom_handle)
1797 struct lsa_OpenTrustedDomainByName r;
1798 NTSTATUS status;
1800 /* In parameters */
1801 r.in.handle = handle;
1802 r.in.name = name;
1803 r.in.access_mask = access_mask;
1805 if (DEBUGLEVEL >= 10)
1806 NDR_PRINT_IN_DEBUG(lsa_OpenTrustedDomainByName, &r);
1808 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_OPENTRUSTEDDOMAINBYNAME, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_OpenTrustedDomainByName, (ndr_push_flags_fn_t)ndr_push_lsa_OpenTrustedDomainByName);
1810 if (!NT_STATUS_IS_OK(status)) {
1811 return status;
1814 if (DEBUGLEVEL >= 10)
1815 NDR_PRINT_OUT_DEBUG(lsa_OpenTrustedDomainByName, &r);
1817 if (NT_STATUS_IS_ERR(status)) {
1818 return status;
1821 /* Return variables */
1822 *trustdom_handle = *r.out.trustdom_handle;
1824 /* Return result */
1825 return r.out.result;
1828 NTSTATUS rpccli_lsa_TestCall(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
1830 struct lsa_TestCall r;
1831 NTSTATUS status;
1833 /* In parameters */
1835 if (DEBUGLEVEL >= 10)
1836 NDR_PRINT_IN_DEBUG(lsa_TestCall, &r);
1838 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_TESTCALL, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_TestCall, (ndr_push_flags_fn_t)ndr_push_lsa_TestCall);
1840 if (!NT_STATUS_IS_OK(status)) {
1841 return status;
1844 if (DEBUGLEVEL >= 10)
1845 NDR_PRINT_OUT_DEBUG(lsa_TestCall, &r);
1847 if (NT_STATUS_IS_ERR(status)) {
1848 return status;
1851 /* Return variables */
1853 /* Return result */
1854 return r.out.result;
1857 NTSTATUS rpccli_lsa_LookupSids2(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct lsa_SidArray *sids, struct lsa_RefDomainList *domains, struct lsa_TransNameArray2 *names, uint16_t level, uint32_t *count, uint32_t unknown1, uint32_t unknown2)
1859 struct lsa_LookupSids2 r;
1860 NTSTATUS status;
1862 /* In parameters */
1863 r.in.handle = handle;
1864 r.in.sids = sids;
1865 r.in.names = names;
1866 r.in.level = level;
1867 r.in.count = count;
1868 r.in.unknown1 = unknown1;
1869 r.in.unknown2 = unknown2;
1871 if (DEBUGLEVEL >= 10)
1872 NDR_PRINT_IN_DEBUG(lsa_LookupSids2, &r);
1874 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_LOOKUPSIDS2, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_LookupSids2, (ndr_push_flags_fn_t)ndr_push_lsa_LookupSids2);
1876 if (!NT_STATUS_IS_OK(status)) {
1877 return status;
1880 if (DEBUGLEVEL >= 10)
1881 NDR_PRINT_OUT_DEBUG(lsa_LookupSids2, &r);
1883 if (NT_STATUS_IS_ERR(status)) {
1884 return status;
1887 /* Return variables */
1888 if ( domains ) {
1889 *domains = *r.out.domains;
1891 *names = *r.out.names;
1892 *count = *r.out.count;
1894 /* Return result */
1895 return r.out.result;
1898 NTSTATUS rpccli_lsa_LookupNames2(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, uint32_t num_names, struct lsa_String *names, struct lsa_RefDomainList *domains, struct lsa_TransSidArray2 *sids, uint16_t level, uint32_t *count, uint32_t unknown1, uint32_t unknown2)
1900 struct lsa_LookupNames2 r;
1901 NTSTATUS status;
1903 /* In parameters */
1904 r.in.handle = handle;
1905 r.in.num_names = num_names;
1906 r.in.names = names;
1907 r.in.sids = sids;
1908 r.in.level = level;
1909 r.in.count = count;
1910 r.in.unknown1 = unknown1;
1911 r.in.unknown2 = unknown2;
1913 if (DEBUGLEVEL >= 10)
1914 NDR_PRINT_IN_DEBUG(lsa_LookupNames2, &r);
1916 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_LOOKUPNAMES2, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_LookupNames2, (ndr_push_flags_fn_t)ndr_push_lsa_LookupNames2);
1918 if (!NT_STATUS_IS_OK(status)) {
1919 return status;
1922 if (DEBUGLEVEL >= 10)
1923 NDR_PRINT_OUT_DEBUG(lsa_LookupNames2, &r);
1925 if (NT_STATUS_IS_ERR(status)) {
1926 return status;
1929 /* Return variables */
1930 if ( domains ) {
1931 *domains = *r.out.domains;
1933 *sids = *r.out.sids;
1934 *count = *r.out.count;
1936 /* Return result */
1937 return r.out.result;
1940 NTSTATUS rpccli_lsa_CreateTrustedDomainEx2(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
1942 struct lsa_CreateTrustedDomainEx2 r;
1943 NTSTATUS status;
1945 /* In parameters */
1947 if (DEBUGLEVEL >= 10)
1948 NDR_PRINT_IN_DEBUG(lsa_CreateTrustedDomainEx2, &r);
1950 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_CREATETRUSTEDDOMAINEX2, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_CreateTrustedDomainEx2, (ndr_push_flags_fn_t)ndr_push_lsa_CreateTrustedDomainEx2);
1952 if (!NT_STATUS_IS_OK(status)) {
1953 return status;
1956 if (DEBUGLEVEL >= 10)
1957 NDR_PRINT_OUT_DEBUG(lsa_CreateTrustedDomainEx2, &r);
1959 if (NT_STATUS_IS_ERR(status)) {
1960 return status;
1963 /* Return variables */
1965 /* Return result */
1966 return r.out.result;
1969 NTSTATUS rpccli_lsa_CREDRWRITE(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
1971 struct lsa_CREDRWRITE r;
1972 NTSTATUS status;
1974 /* In parameters */
1976 if (DEBUGLEVEL >= 10)
1977 NDR_PRINT_IN_DEBUG(lsa_CREDRWRITE, &r);
1979 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_CREDRWRITE, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_CREDRWRITE, (ndr_push_flags_fn_t)ndr_push_lsa_CREDRWRITE);
1981 if (!NT_STATUS_IS_OK(status)) {
1982 return status;
1985 if (DEBUGLEVEL >= 10)
1986 NDR_PRINT_OUT_DEBUG(lsa_CREDRWRITE, &r);
1988 if (NT_STATUS_IS_ERR(status)) {
1989 return status;
1992 /* Return variables */
1994 /* Return result */
1995 return r.out.result;
1998 NTSTATUS rpccli_lsa_CREDRREAD(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
2000 struct lsa_CREDRREAD r;
2001 NTSTATUS status;
2003 /* In parameters */
2005 if (DEBUGLEVEL >= 10)
2006 NDR_PRINT_IN_DEBUG(lsa_CREDRREAD, &r);
2008 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_CREDRREAD, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_CREDRREAD, (ndr_push_flags_fn_t)ndr_push_lsa_CREDRREAD);
2010 if (!NT_STATUS_IS_OK(status)) {
2011 return status;
2014 if (DEBUGLEVEL >= 10)
2015 NDR_PRINT_OUT_DEBUG(lsa_CREDRREAD, &r);
2017 if (NT_STATUS_IS_ERR(status)) {
2018 return status;
2021 /* Return variables */
2023 /* Return result */
2024 return r.out.result;
2027 NTSTATUS rpccli_lsa_CREDRENUMERATE(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
2029 struct lsa_CREDRENUMERATE r;
2030 NTSTATUS status;
2032 /* In parameters */
2034 if (DEBUGLEVEL >= 10)
2035 NDR_PRINT_IN_DEBUG(lsa_CREDRENUMERATE, &r);
2037 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_CREDRENUMERATE, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_CREDRENUMERATE, (ndr_push_flags_fn_t)ndr_push_lsa_CREDRENUMERATE);
2039 if (!NT_STATUS_IS_OK(status)) {
2040 return status;
2043 if (DEBUGLEVEL >= 10)
2044 NDR_PRINT_OUT_DEBUG(lsa_CREDRENUMERATE, &r);
2046 if (NT_STATUS_IS_ERR(status)) {
2047 return status;
2050 /* Return variables */
2052 /* Return result */
2053 return r.out.result;
2056 NTSTATUS rpccli_lsa_CREDRWRITEDOMAINCREDENTIALS(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
2058 struct lsa_CREDRWRITEDOMAINCREDENTIALS r;
2059 NTSTATUS status;
2061 /* In parameters */
2063 if (DEBUGLEVEL >= 10)
2064 NDR_PRINT_IN_DEBUG(lsa_CREDRWRITEDOMAINCREDENTIALS, &r);
2066 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_CREDRWRITEDOMAINCREDENTIALS, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_CREDRWRITEDOMAINCREDENTIALS, (ndr_push_flags_fn_t)ndr_push_lsa_CREDRWRITEDOMAINCREDENTIALS);
2068 if (!NT_STATUS_IS_OK(status)) {
2069 return status;
2072 if (DEBUGLEVEL >= 10)
2073 NDR_PRINT_OUT_DEBUG(lsa_CREDRWRITEDOMAINCREDENTIALS, &r);
2075 if (NT_STATUS_IS_ERR(status)) {
2076 return status;
2079 /* Return variables */
2081 /* Return result */
2082 return r.out.result;
2085 NTSTATUS rpccli_lsa_CREDRREADDOMAINCREDENTIALS(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
2087 struct lsa_CREDRREADDOMAINCREDENTIALS r;
2088 NTSTATUS status;
2090 /* In parameters */
2092 if (DEBUGLEVEL >= 10)
2093 NDR_PRINT_IN_DEBUG(lsa_CREDRREADDOMAINCREDENTIALS, &r);
2095 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_CREDRREADDOMAINCREDENTIALS, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_CREDRREADDOMAINCREDENTIALS, (ndr_push_flags_fn_t)ndr_push_lsa_CREDRREADDOMAINCREDENTIALS);
2097 if (!NT_STATUS_IS_OK(status)) {
2098 return status;
2101 if (DEBUGLEVEL >= 10)
2102 NDR_PRINT_OUT_DEBUG(lsa_CREDRREADDOMAINCREDENTIALS, &r);
2104 if (NT_STATUS_IS_ERR(status)) {
2105 return status;
2108 /* Return variables */
2110 /* Return result */
2111 return r.out.result;
2114 NTSTATUS rpccli_lsa_CREDRDELETE(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
2116 struct lsa_CREDRDELETE r;
2117 NTSTATUS status;
2119 /* In parameters */
2121 if (DEBUGLEVEL >= 10)
2122 NDR_PRINT_IN_DEBUG(lsa_CREDRDELETE, &r);
2124 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_CREDRDELETE, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_CREDRDELETE, (ndr_push_flags_fn_t)ndr_push_lsa_CREDRDELETE);
2126 if (!NT_STATUS_IS_OK(status)) {
2127 return status;
2130 if (DEBUGLEVEL >= 10)
2131 NDR_PRINT_OUT_DEBUG(lsa_CREDRDELETE, &r);
2133 if (NT_STATUS_IS_ERR(status)) {
2134 return status;
2137 /* Return variables */
2139 /* Return result */
2140 return r.out.result;
2143 NTSTATUS rpccli_lsa_CREDRGETTARGETINFO(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
2145 struct lsa_CREDRGETTARGETINFO r;
2146 NTSTATUS status;
2148 /* In parameters */
2150 if (DEBUGLEVEL >= 10)
2151 NDR_PRINT_IN_DEBUG(lsa_CREDRGETTARGETINFO, &r);
2153 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_CREDRGETTARGETINFO, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_CREDRGETTARGETINFO, (ndr_push_flags_fn_t)ndr_push_lsa_CREDRGETTARGETINFO);
2155 if (!NT_STATUS_IS_OK(status)) {
2156 return status;
2159 if (DEBUGLEVEL >= 10)
2160 NDR_PRINT_OUT_DEBUG(lsa_CREDRGETTARGETINFO, &r);
2162 if (NT_STATUS_IS_ERR(status)) {
2163 return status;
2166 /* Return variables */
2168 /* Return result */
2169 return r.out.result;
2172 NTSTATUS rpccli_lsa_CREDRPROFILELOADED(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
2174 struct lsa_CREDRPROFILELOADED r;
2175 NTSTATUS status;
2177 /* In parameters */
2179 if (DEBUGLEVEL >= 10)
2180 NDR_PRINT_IN_DEBUG(lsa_CREDRPROFILELOADED, &r);
2182 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_CREDRPROFILELOADED, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_CREDRPROFILELOADED, (ndr_push_flags_fn_t)ndr_push_lsa_CREDRPROFILELOADED);
2184 if (!NT_STATUS_IS_OK(status)) {
2185 return status;
2188 if (DEBUGLEVEL >= 10)
2189 NDR_PRINT_OUT_DEBUG(lsa_CREDRPROFILELOADED, &r);
2191 if (NT_STATUS_IS_ERR(status)) {
2192 return status;
2195 /* Return variables */
2197 /* Return result */
2198 return r.out.result;
2201 NTSTATUS rpccli_lsa_LookupNames3(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, uint32_t num_names, struct lsa_String *names, struct lsa_RefDomainList *domains, struct lsa_TransSidArray3 *sids, uint16_t level, uint32_t *count, uint32_t unknown1, uint32_t unknown2)
2203 struct lsa_LookupNames3 r;
2204 NTSTATUS status;
2206 /* In parameters */
2207 r.in.handle = handle;
2208 r.in.num_names = num_names;
2209 r.in.names = names;
2210 r.in.sids = sids;
2211 r.in.level = level;
2212 r.in.count = count;
2213 r.in.unknown1 = unknown1;
2214 r.in.unknown2 = unknown2;
2216 if (DEBUGLEVEL >= 10)
2217 NDR_PRINT_IN_DEBUG(lsa_LookupNames3, &r);
2219 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_LOOKUPNAMES3, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_LookupNames3, (ndr_push_flags_fn_t)ndr_push_lsa_LookupNames3);
2221 if (!NT_STATUS_IS_OK(status)) {
2222 return status;
2225 if (DEBUGLEVEL >= 10)
2226 NDR_PRINT_OUT_DEBUG(lsa_LookupNames3, &r);
2228 if (NT_STATUS_IS_ERR(status)) {
2229 return status;
2232 /* Return variables */
2233 if ( domains ) {
2234 *domains = *r.out.domains;
2236 *sids = *r.out.sids;
2237 *count = *r.out.count;
2239 /* Return result */
2240 return r.out.result;
2243 NTSTATUS rpccli_lsa_CREDRGETSESSIONTYPES(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
2245 struct lsa_CREDRGETSESSIONTYPES r;
2246 NTSTATUS status;
2248 /* In parameters */
2250 if (DEBUGLEVEL >= 10)
2251 NDR_PRINT_IN_DEBUG(lsa_CREDRGETSESSIONTYPES, &r);
2253 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_CREDRGETSESSIONTYPES, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_CREDRGETSESSIONTYPES, (ndr_push_flags_fn_t)ndr_push_lsa_CREDRGETSESSIONTYPES);
2255 if (!NT_STATUS_IS_OK(status)) {
2256 return status;
2259 if (DEBUGLEVEL >= 10)
2260 NDR_PRINT_OUT_DEBUG(lsa_CREDRGETSESSIONTYPES, &r);
2262 if (NT_STATUS_IS_ERR(status)) {
2263 return status;
2266 /* Return variables */
2268 /* Return result */
2269 return r.out.result;
2272 NTSTATUS rpccli_lsa_LSARREGISTERAUDITEVENT(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
2274 struct lsa_LSARREGISTERAUDITEVENT r;
2275 NTSTATUS status;
2277 /* In parameters */
2279 if (DEBUGLEVEL >= 10)
2280 NDR_PRINT_IN_DEBUG(lsa_LSARREGISTERAUDITEVENT, &r);
2282 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_LSARREGISTERAUDITEVENT, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_LSARREGISTERAUDITEVENT, (ndr_push_flags_fn_t)ndr_push_lsa_LSARREGISTERAUDITEVENT);
2284 if (!NT_STATUS_IS_OK(status)) {
2285 return status;
2288 if (DEBUGLEVEL >= 10)
2289 NDR_PRINT_OUT_DEBUG(lsa_LSARREGISTERAUDITEVENT, &r);
2291 if (NT_STATUS_IS_ERR(status)) {
2292 return status;
2295 /* Return variables */
2297 /* Return result */
2298 return r.out.result;
2301 NTSTATUS rpccli_lsa_LSARGENAUDITEVENT(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
2303 struct lsa_LSARGENAUDITEVENT r;
2304 NTSTATUS status;
2306 /* In parameters */
2308 if (DEBUGLEVEL >= 10)
2309 NDR_PRINT_IN_DEBUG(lsa_LSARGENAUDITEVENT, &r);
2311 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_LSARGENAUDITEVENT, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_LSARGENAUDITEVENT, (ndr_push_flags_fn_t)ndr_push_lsa_LSARGENAUDITEVENT);
2313 if (!NT_STATUS_IS_OK(status)) {
2314 return status;
2317 if (DEBUGLEVEL >= 10)
2318 NDR_PRINT_OUT_DEBUG(lsa_LSARGENAUDITEVENT, &r);
2320 if (NT_STATUS_IS_ERR(status)) {
2321 return status;
2324 /* Return variables */
2326 /* Return result */
2327 return r.out.result;
2330 NTSTATUS rpccli_lsa_LSARUNREGISTERAUDITEVENT(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
2332 struct lsa_LSARUNREGISTERAUDITEVENT r;
2333 NTSTATUS status;
2335 /* In parameters */
2337 if (DEBUGLEVEL >= 10)
2338 NDR_PRINT_IN_DEBUG(lsa_LSARUNREGISTERAUDITEVENT, &r);
2340 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_LSARUNREGISTERAUDITEVENT, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_LSARUNREGISTERAUDITEVENT, (ndr_push_flags_fn_t)ndr_push_lsa_LSARUNREGISTERAUDITEVENT);
2342 if (!NT_STATUS_IS_OK(status)) {
2343 return status;
2346 if (DEBUGLEVEL >= 10)
2347 NDR_PRINT_OUT_DEBUG(lsa_LSARUNREGISTERAUDITEVENT, &r);
2349 if (NT_STATUS_IS_ERR(status)) {
2350 return status;
2353 /* Return variables */
2355 /* Return result */
2356 return r.out.result;
2359 NTSTATUS rpccli_lsa_LSARQUERYFORESTTRUSTINFORMATION(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
2361 struct lsa_LSARQUERYFORESTTRUSTINFORMATION r;
2362 NTSTATUS status;
2364 /* In parameters */
2366 if (DEBUGLEVEL >= 10)
2367 NDR_PRINT_IN_DEBUG(lsa_LSARQUERYFORESTTRUSTINFORMATION, &r);
2369 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_LSARQUERYFORESTTRUSTINFORMATION, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_LSARQUERYFORESTTRUSTINFORMATION, (ndr_push_flags_fn_t)ndr_push_lsa_LSARQUERYFORESTTRUSTINFORMATION);
2371 if (!NT_STATUS_IS_OK(status)) {
2372 return status;
2375 if (DEBUGLEVEL >= 10)
2376 NDR_PRINT_OUT_DEBUG(lsa_LSARQUERYFORESTTRUSTINFORMATION, &r);
2378 if (NT_STATUS_IS_ERR(status)) {
2379 return status;
2382 /* Return variables */
2384 /* Return result */
2385 return r.out.result;
2388 NTSTATUS rpccli_lsa_LSARSETFORESTTRUSTINFORMATION(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
2390 struct lsa_LSARSETFORESTTRUSTINFORMATION r;
2391 NTSTATUS status;
2393 /* In parameters */
2395 if (DEBUGLEVEL >= 10)
2396 NDR_PRINT_IN_DEBUG(lsa_LSARSETFORESTTRUSTINFORMATION, &r);
2398 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_LSARSETFORESTTRUSTINFORMATION, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_LSARSETFORESTTRUSTINFORMATION, (ndr_push_flags_fn_t)ndr_push_lsa_LSARSETFORESTTRUSTINFORMATION);
2400 if (!NT_STATUS_IS_OK(status)) {
2401 return status;
2404 if (DEBUGLEVEL >= 10)
2405 NDR_PRINT_OUT_DEBUG(lsa_LSARSETFORESTTRUSTINFORMATION, &r);
2407 if (NT_STATUS_IS_ERR(status)) {
2408 return status;
2411 /* Return variables */
2413 /* Return result */
2414 return r.out.result;
2417 NTSTATUS rpccli_lsa_CREDRRENAME(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
2419 struct lsa_CREDRRENAME r;
2420 NTSTATUS status;
2422 /* In parameters */
2424 if (DEBUGLEVEL >= 10)
2425 NDR_PRINT_IN_DEBUG(lsa_CREDRRENAME, &r);
2427 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_CREDRRENAME, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_CREDRRENAME, (ndr_push_flags_fn_t)ndr_push_lsa_CREDRRENAME);
2429 if (!NT_STATUS_IS_OK(status)) {
2430 return status;
2433 if (DEBUGLEVEL >= 10)
2434 NDR_PRINT_OUT_DEBUG(lsa_CREDRRENAME, &r);
2436 if (NT_STATUS_IS_ERR(status)) {
2437 return status;
2440 /* Return variables */
2442 /* Return result */
2443 return r.out.result;
2446 NTSTATUS rpccli_lsa_LookupSids3(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct lsa_SidArray *sids, struct lsa_RefDomainList *domains, struct lsa_TransNameArray2 *names, uint16_t level, uint32_t *count, uint32_t unknown1, uint32_t unknown2)
2448 struct lsa_LookupSids3 r;
2449 NTSTATUS status;
2451 /* In parameters */
2452 r.in.sids = sids;
2453 r.in.names = names;
2454 r.in.level = level;
2455 r.in.count = count;
2456 r.in.unknown1 = unknown1;
2457 r.in.unknown2 = unknown2;
2459 if (DEBUGLEVEL >= 10)
2460 NDR_PRINT_IN_DEBUG(lsa_LookupSids3, &r);
2462 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_LOOKUPSIDS3, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_LookupSids3, (ndr_push_flags_fn_t)ndr_push_lsa_LookupSids3);
2464 if (!NT_STATUS_IS_OK(status)) {
2465 return status;
2468 if (DEBUGLEVEL >= 10)
2469 NDR_PRINT_OUT_DEBUG(lsa_LookupSids3, &r);
2471 if (NT_STATUS_IS_ERR(status)) {
2472 return status;
2475 /* Return variables */
2476 if ( domains ) {
2477 *domains = *r.out.domains;
2479 *names = *r.out.names;
2480 *count = *r.out.count;
2482 /* Return result */
2483 return r.out.result;
2486 NTSTATUS rpccli_lsa_LookupNames4(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, uint32_t num_names, struct lsa_String *names, struct lsa_RefDomainList *domains, struct lsa_TransSidArray3 *sids, uint16_t level, uint32_t *count, uint32_t unknown1, uint32_t unknown2)
2488 struct lsa_LookupNames4 r;
2489 NTSTATUS status;
2491 /* In parameters */
2492 r.in.num_names = num_names;
2493 r.in.names = names;
2494 r.in.sids = sids;
2495 r.in.level = level;
2496 r.in.count = count;
2497 r.in.unknown1 = unknown1;
2498 r.in.unknown2 = unknown2;
2500 if (DEBUGLEVEL >= 10)
2501 NDR_PRINT_IN_DEBUG(lsa_LookupNames4, &r);
2503 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_LOOKUPNAMES4, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_LookupNames4, (ndr_push_flags_fn_t)ndr_push_lsa_LookupNames4);
2505 if (!NT_STATUS_IS_OK(status)) {
2506 return status;
2509 if (DEBUGLEVEL >= 10)
2510 NDR_PRINT_OUT_DEBUG(lsa_LookupNames4, &r);
2512 if (NT_STATUS_IS_ERR(status)) {
2513 return status;
2516 /* Return variables */
2517 if ( domains ) {
2518 *domains = *r.out.domains;
2520 *sids = *r.out.sids;
2521 *count = *r.out.count;
2523 /* Return result */
2524 return r.out.result;
2527 NTSTATUS rpccli_lsa_LSAROPENPOLICYSCE(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
2529 struct lsa_LSAROPENPOLICYSCE r;
2530 NTSTATUS status;
2532 /* In parameters */
2534 if (DEBUGLEVEL >= 10)
2535 NDR_PRINT_IN_DEBUG(lsa_LSAROPENPOLICYSCE, &r);
2537 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_LSAROPENPOLICYSCE, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_LSAROPENPOLICYSCE, (ndr_push_flags_fn_t)ndr_push_lsa_LSAROPENPOLICYSCE);
2539 if (!NT_STATUS_IS_OK(status)) {
2540 return status;
2543 if (DEBUGLEVEL >= 10)
2544 NDR_PRINT_OUT_DEBUG(lsa_LSAROPENPOLICYSCE, &r);
2546 if (NT_STATUS_IS_ERR(status)) {
2547 return status;
2550 /* Return variables */
2552 /* Return result */
2553 return r.out.result;
2556 NTSTATUS rpccli_lsa_LSARADTREGISTERSECURITYEVENTSOURCE(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
2558 struct lsa_LSARADTREGISTERSECURITYEVENTSOURCE r;
2559 NTSTATUS status;
2561 /* In parameters */
2563 if (DEBUGLEVEL >= 10)
2564 NDR_PRINT_IN_DEBUG(lsa_LSARADTREGISTERSECURITYEVENTSOURCE, &r);
2566 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_LSARADTREGISTERSECURITYEVENTSOURCE, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_LSARADTREGISTERSECURITYEVENTSOURCE, (ndr_push_flags_fn_t)ndr_push_lsa_LSARADTREGISTERSECURITYEVENTSOURCE);
2568 if (!NT_STATUS_IS_OK(status)) {
2569 return status;
2572 if (DEBUGLEVEL >= 10)
2573 NDR_PRINT_OUT_DEBUG(lsa_LSARADTREGISTERSECURITYEVENTSOURCE, &r);
2575 if (NT_STATUS_IS_ERR(status)) {
2576 return status;
2579 /* Return variables */
2581 /* Return result */
2582 return r.out.result;
2585 NTSTATUS rpccli_lsa_LSARADTUNREGISTERSECURITYEVENTSOURCE(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
2587 struct lsa_LSARADTUNREGISTERSECURITYEVENTSOURCE r;
2588 NTSTATUS status;
2590 /* In parameters */
2592 if (DEBUGLEVEL >= 10)
2593 NDR_PRINT_IN_DEBUG(lsa_LSARADTUNREGISTERSECURITYEVENTSOURCE, &r);
2595 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_LSARADTUNREGISTERSECURITYEVENTSOURCE, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_LSARADTUNREGISTERSECURITYEVENTSOURCE, (ndr_push_flags_fn_t)ndr_push_lsa_LSARADTUNREGISTERSECURITYEVENTSOURCE);
2597 if (!NT_STATUS_IS_OK(status)) {
2598 return status;
2601 if (DEBUGLEVEL >= 10)
2602 NDR_PRINT_OUT_DEBUG(lsa_LSARADTUNREGISTERSECURITYEVENTSOURCE, &r);
2604 if (NT_STATUS_IS_ERR(status)) {
2605 return status;
2608 /* Return variables */
2610 /* Return result */
2611 return r.out.result;
2614 NTSTATUS rpccli_lsa_LSARADTREPORTSECURITYEVENT(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
2616 struct lsa_LSARADTREPORTSECURITYEVENT r;
2617 NTSTATUS status;
2619 /* In parameters */
2621 if (DEBUGLEVEL >= 10)
2622 NDR_PRINT_IN_DEBUG(lsa_LSARADTREPORTSECURITYEVENT, &r);
2624 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_LSARADTREPORTSECURITYEVENT, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_LSARADTREPORTSECURITYEVENT, (ndr_push_flags_fn_t)ndr_push_lsa_LSARADTREPORTSECURITYEVENT);
2626 if (!NT_STATUS_IS_OK(status)) {
2627 return status;
2630 if (DEBUGLEVEL >= 10)
2631 NDR_PRINT_OUT_DEBUG(lsa_LSARADTREPORTSECURITYEVENT, &r);
2633 if (NT_STATUS_IS_ERR(status)) {
2634 return status;
2637 /* Return variables */
2639 /* Return result */
2640 return r.out.result;