ldap_server: Log authorization for simple binds
[Samba.git] / librpc / idl / lsa.idl
blob68569db9177cbbbac063e002364e86900b29dd8e
1 #include "idl_types.h"
3 /*
4 lsa interface definition
5 */
7 import "misc.idl", "security.idl";
9 [ uuid("12345778-1234-abcd-ef00-0123456789ab"),
10 version(0.0),
11 endpoint("ncacn_np:[\\pipe\\lsarpc]","ncacn_np:[\\pipe\\lsass]", "ncacn_ip_tcp:", "ncalrpc:"),
12 pointer_default(unique),
13 helpstring("Local Security Authority")
14 ] interface lsarpc
16 typedef bitmap security_secinfo security_secinfo;
17 typedef bitmap kerb_EncTypes kerb_EncTypes;
19 typedef [public] struct {
20 [value(2*strlen_m(string))] uint16 length;
21 [value(2*strlen_m(string))] uint16 size;
22 [charset(UTF16),size_is(size/2),length_is(length/2)] uint16 *string;
23 } lsa_String;
25 typedef [public] struct {
26 [value(2*strlen_m(string))] uint16 length;
27 [value(2*strlen_m_term(string))] uint16 size;
28 [charset(UTF16),size_is(size/2),length_is(length/2)] uint16 *string;
29 } lsa_StringLarge;
31 typedef [public] struct {
32 uint32 count;
33 [size_is(count)] lsa_String *names;
34 } lsa_Strings;
36 typedef [public] struct {
37 [value(strlen_m(string))] uint16 length;
38 [value(strlen_m(string))] uint16 size;
39 [charset(DOS),size_is(size),length_is(length)] uint8 *string;
40 } lsa_AsciiString;
42 typedef [public] struct {
43 [value(strlen_m(string))] uint16 length;
44 [value(strlen_m_term(string))] uint16 size;
45 [charset(DOS),size_is(size),length_is(length)] uint8 *string;
46 } lsa_AsciiStringLarge;
48 typedef [public] struct {
49 uint16 length;
50 uint16 size;
51 [size_is(size/2),length_is(length/2)] uint16 *array;
52 } lsa_BinaryString;
54 /******************/
55 /* Function: 0x00 */
56 NTSTATUS lsa_Close (
57 [in,out] policy_handle *handle
61 /******************/
62 /* Function: 0x01 */
63 [public] NTSTATUS lsa_Delete (
64 [in] policy_handle *handle
68 /******************/
69 /* Function: 0x02 */
70 typedef struct {
71 uint32 low;
72 uint32 high;
73 } lsa_LUID;
75 typedef struct {
76 lsa_StringLarge name;
77 lsa_LUID luid;
78 } lsa_PrivEntry;
80 typedef struct {
81 uint32 count;
82 [size_is(count)] lsa_PrivEntry *privs;
83 } lsa_PrivArray;
85 [public] NTSTATUS lsa_EnumPrivs (
86 [in] policy_handle *handle,
87 [in,out,ref] uint32 *resume_handle,
88 [out,ref] lsa_PrivArray *privs,
89 [in] uint32 max_count
92 /******************/
93 /* Function: 0x03 */
94 NTSTATUS lsa_QuerySecurity (
95 [in] policy_handle *handle,
96 [in] security_secinfo sec_info,
97 [out,ref] sec_desc_buf **sdbuf
100 /******************/
101 /* Function: 0x04 */
102 NTSTATUS lsa_SetSecObj(
103 [in] policy_handle *handle,
104 [in] security_secinfo sec_info,
105 [in,ref] sec_desc_buf *sdbuf
108 /******************/
109 /* Function: 0x05 */
110 [todo] NTSTATUS lsa_ChangePassword ();
113 /******************/
114 /* Function: 0x06 */
115 typedef struct {
116 uint3264 len; /* ignored */
117 uint16 impersonation_level;
118 uint8 context_mode;
119 uint8 effective_only;
120 } lsa_QosInfo;
122 typedef struct {
123 uint3264 len; /* ignored */
124 uint8 *root_dir;
125 [string,charset(UTF16)] uint16 *object_name;
126 uint32 attributes;
127 security_descriptor *sec_desc;
128 lsa_QosInfo *sec_qos;
129 } lsa_ObjectAttribute;
131 typedef [public,bitmap32bit] bitmap {
132 LSA_POLICY_VIEW_LOCAL_INFORMATION = 0x00000001,
133 LSA_POLICY_VIEW_AUDIT_INFORMATION = 0x00000002,
134 LSA_POLICY_GET_PRIVATE_INFORMATION = 0x00000004,
135 LSA_POLICY_TRUST_ADMIN = 0x00000008,
136 LSA_POLICY_CREATE_ACCOUNT = 0x00000010,
137 LSA_POLICY_CREATE_SECRET = 0x00000020,
138 LSA_POLICY_CREATE_PRIVILEGE = 0x00000040,
139 LSA_POLICY_SET_DEFAULT_QUOTA_LIMITS = 0x00000080,
140 LSA_POLICY_SET_AUDIT_REQUIREMENTS = 0x00000100,
141 LSA_POLICY_AUDIT_LOG_ADMIN = 0x00000200,
142 LSA_POLICY_SERVER_ADMIN = 0x00000400,
143 LSA_POLICY_LOOKUP_NAMES = 0x00000800,
144 LSA_POLICY_NOTIFICATION = 0x00001000
145 } lsa_PolicyAccessMask;
147 const int LSA_POLICY_ALL_ACCESS =
148 (STANDARD_RIGHTS_REQUIRED_ACCESS |
149 LSA_POLICY_VIEW_LOCAL_INFORMATION |
150 LSA_POLICY_VIEW_AUDIT_INFORMATION |
151 LSA_POLICY_GET_PRIVATE_INFORMATION |
152 LSA_POLICY_TRUST_ADMIN |
153 LSA_POLICY_CREATE_ACCOUNT |
154 LSA_POLICY_CREATE_SECRET |
155 LSA_POLICY_CREATE_PRIVILEGE |
156 LSA_POLICY_SET_DEFAULT_QUOTA_LIMITS |
157 LSA_POLICY_SET_AUDIT_REQUIREMENTS |
158 LSA_POLICY_AUDIT_LOG_ADMIN |
159 LSA_POLICY_SERVER_ADMIN |
160 LSA_POLICY_LOOKUP_NAMES |
161 LSA_POLICY_NOTIFICATION);
163 const int LSA_POLICY_READ =
164 (STANDARD_RIGHTS_READ_ACCESS |
165 LSA_POLICY_VIEW_LOCAL_INFORMATION |
166 LSA_POLICY_VIEW_AUDIT_INFORMATION |
167 LSA_POLICY_GET_PRIVATE_INFORMATION);
169 const int LSA_POLICY_WRITE =
170 (STANDARD_RIGHTS_READ_ACCESS |
171 LSA_POLICY_TRUST_ADMIN |
172 LSA_POLICY_CREATE_ACCOUNT |
173 LSA_POLICY_CREATE_SECRET |
174 LSA_POLICY_CREATE_PRIVILEGE |
175 LSA_POLICY_SET_DEFAULT_QUOTA_LIMITS |
176 LSA_POLICY_SET_AUDIT_REQUIREMENTS |
177 LSA_POLICY_AUDIT_LOG_ADMIN |
178 LSA_POLICY_SERVER_ADMIN);
180 const int LSA_POLICY_EXECUTE =
181 (STANDARD_RIGHTS_EXECUTE_ACCESS |
182 LSA_POLICY_VIEW_LOCAL_INFORMATION |
183 LSA_POLICY_LOOKUP_NAMES);
185 typedef [public,bitmap32bit] bitmap {
186 LSA_ACCOUNT_VIEW = 0x00000001,
187 LSA_ACCOUNT_ADJUST_PRIVILEGES = 0x00000002,
188 LSA_ACCOUNT_ADJUST_QUOTAS = 0x00000004,
189 LSA_ACCOUNT_ADJUST_SYSTEM_ACCESS = 0x00000008
190 } lsa_AccountAccessMask;
192 const int LSA_ACCOUNT_ALL_ACCESS =
193 (STANDARD_RIGHTS_REQUIRED_ACCESS |
194 LSA_ACCOUNT_VIEW |
195 LSA_ACCOUNT_ADJUST_PRIVILEGES |
196 LSA_ACCOUNT_ADJUST_QUOTAS |
197 LSA_ACCOUNT_ADJUST_SYSTEM_ACCESS);
199 const int LSA_ACCOUNT_READ =
200 (STANDARD_RIGHTS_READ_ACCESS |
201 LSA_ACCOUNT_VIEW);
203 const int LSA_ACCOUNT_WRITE =
204 (STANDARD_RIGHTS_READ_ACCESS |
205 LSA_ACCOUNT_ADJUST_PRIVILEGES |
206 LSA_ACCOUNT_ADJUST_QUOTAS |
207 LSA_ACCOUNT_ADJUST_SYSTEM_ACCESS);
209 const int LSA_ACCOUNT_EXECUTE =
210 (STANDARD_RIGHTS_EXECUTE_ACCESS);
212 typedef [public,bitmap32bit] bitmap {
213 LSA_SECRET_SET_VALUE = 0x00000001,
214 LSA_SECRET_QUERY_VALUE = 0x00000002
215 } lsa_SecretAccessMask;
217 const int LSA_SECRET_ALL_ACCESS =
218 (LSA_SECRET_QUERY_VALUE |
219 LSA_SECRET_SET_VALUE |
220 SEC_STD_DELETE |
221 STANDARD_RIGHTS_READ_ACCESS |
222 SEC_STD_WRITE_DAC |
223 SEC_STD_WRITE_OWNER); /* 0x000F0003 */
225 const int LSA_SECRET_READ =
226 (LSA_SECRET_QUERY_VALUE |
227 STANDARD_RIGHTS_READ_ACCESS); /* 0x00020002 */
229 const int LSA_SECRET_WRITE =
230 (LSA_SECRET_SET_VALUE |
231 STANDARD_RIGHTS_READ_ACCESS); /* 0x00020001 */
233 const int LSA_SECRET_EXECUTE =
234 (STANDARD_RIGHTS_READ_ACCESS); /* 0x00020000 */
236 typedef [public,bitmap32bit] bitmap {
237 LSA_TRUSTED_QUERY_DOMAIN_NAME = 0x00000001,
238 LSA_TRUSTED_QUERY_CONTROLLERS = 0x00000002,
239 LSA_TRUSTED_SET_CONTROLLERS = 0x00000004,
240 LSA_TRUSTED_QUERY_POSIX = 0x00000008,
241 LSA_TRUSTED_SET_POSIX = 0x00000010,
242 LSA_TRUSTED_SET_AUTH = 0x00000020,
243 LSA_TRUSTED_QUERY_AUTH = 0x00000040
244 } lsa_TrustedAccessMask;
246 const int LSA_TRUSTED_DOMAIN_ALL_ACCESS =
247 (LSA_TRUSTED_QUERY_DOMAIN_NAME |
248 LSA_TRUSTED_QUERY_CONTROLLERS |
249 LSA_TRUSTED_SET_CONTROLLERS |
250 LSA_TRUSTED_QUERY_POSIX |
251 LSA_TRUSTED_SET_POSIX |
252 LSA_TRUSTED_SET_AUTH |
253 LSA_TRUSTED_QUERY_AUTH |
254 SEC_STD_DELETE |
255 STANDARD_RIGHTS_READ_ACCESS |
256 SEC_STD_WRITE_DAC |
257 SEC_STD_WRITE_OWNER); /* 0x000F007F */
259 const int LSA_TRUSTED_DOMAIN_READ =
260 (LSA_TRUSTED_QUERY_DOMAIN_NAME |
261 STANDARD_RIGHTS_READ_ACCESS); /* 0x00020001 */
263 const int LSA_TRUSTED_DOMAIN_WRITE =
264 (LSA_TRUSTED_SET_CONTROLLERS |
265 LSA_TRUSTED_SET_POSIX |
266 LSA_TRUSTED_SET_AUTH |
267 STANDARD_RIGHTS_READ_ACCESS); /* 0x00020034 */
269 const int LSA_TRUSTED_DOMAIN_EXECUTE =
270 (LSA_TRUSTED_QUERY_DOMAIN_NAME |
271 LSA_TRUSTED_QUERY_POSIX |
272 STANDARD_RIGHTS_READ_ACCESS); /* 0x0002000C */
275 /* notice the screwup with the system_name - thats why MS created
276 OpenPolicy2 */
277 [public] NTSTATUS lsa_OpenPolicy (
278 [in,unique] uint16 *system_name,
279 [in] lsa_ObjectAttribute *attr,
280 [in] lsa_PolicyAccessMask access_mask,
281 [out] policy_handle *handle
286 /******************/
287 /* Function: 0x07 */
289 typedef struct {
290 uint32 percent_full;
291 uint32 maximum_log_size;
292 hyper retention_time;
293 uint8 shutdown_in_progress;
294 hyper time_to_shutdown;
295 uint32 next_audit_record;
296 } lsa_AuditLogInfo;
298 typedef [v1_enum] enum {
299 LSA_AUDIT_POLICY_NONE=0,
300 LSA_AUDIT_POLICY_SUCCESS=1,
301 LSA_AUDIT_POLICY_FAILURE=2,
302 LSA_AUDIT_POLICY_ALL=(LSA_AUDIT_POLICY_SUCCESS|LSA_AUDIT_POLICY_FAILURE),
303 LSA_AUDIT_POLICY_CLEAR=4
304 } lsa_PolicyAuditPolicy;
306 typedef enum {
307 LSA_AUDIT_CATEGORY_SYSTEM = 0,
308 LSA_AUDIT_CATEGORY_LOGON = 1,
309 LSA_AUDIT_CATEGORY_FILE_AND_OBJECT_ACCESS = 2,
310 LSA_AUDIT_CATEGORY_USE_OF_USER_RIGHTS = 3,
311 LSA_AUDIT_CATEGORY_PROCCESS_TRACKING = 4,
312 LSA_AUDIT_CATEGORY_SECURITY_POLICY_CHANGES = 5,
313 LSA_AUDIT_CATEGORY_ACCOUNT_MANAGEMENT = 6,
314 LSA_AUDIT_CATEGORY_DIRECTORY_SERVICE_ACCESS = 7, /* only in win2k/2k3 */
315 LSA_AUDIT_CATEGORY_ACCOUNT_LOGON = 8 /* only in win2k/2k3 */
316 } lsa_PolicyAuditEventType;
318 typedef struct {
319 uint32 auditing_mode;
320 [size_is(count)] lsa_PolicyAuditPolicy *settings;
321 uint32 count;
322 } lsa_AuditEventsInfo;
324 typedef struct {
325 lsa_StringLarge name;
326 dom_sid2 *sid;
327 } lsa_DomainInfo;
329 typedef struct {
330 lsa_String name;
331 } lsa_PDAccountInfo;
333 typedef [v1_enum] enum {
334 LSA_ROLE_BACKUP=2,
335 LSA_ROLE_PRIMARY=3
336 } lsa_Role;
338 typedef struct {
339 lsa_Role role;
340 } lsa_ServerRole;
342 typedef struct {
343 lsa_String source;
344 lsa_String account;
345 } lsa_ReplicaSourceInfo;
347 typedef struct {
348 uint32 paged_pool;
349 uint32 non_paged_pool;
350 uint32 min_wss;
351 uint32 max_wss;
352 uint32 pagefile;
353 hyper unknown;
354 } lsa_DefaultQuotaInfo;
356 typedef struct {
357 hyper modified_id;
358 NTTIME_hyper db_create_time;
359 } lsa_ModificationInfo;
361 typedef struct {
362 uint8 shutdown_on_full;
363 } lsa_AuditFullSetInfo;
365 typedef struct {
366 uint8 shutdown_on_full;
367 uint8 log_is_full;
368 } lsa_AuditFullQueryInfo;
370 typedef struct {
371 /* it's important that we use the lsa_StringLarge here,
372 * because otherwise windows clients result with such dns hostnames
373 * e.g. w2k3-client.samba4.samba.orgsamba4.samba.org
374 * where it should be
375 * w2k3-client.samba4.samba.org
377 lsa_StringLarge name;
378 lsa_StringLarge dns_domain;
379 lsa_StringLarge dns_forest;
380 GUID domain_guid;
381 dom_sid2 *sid;
382 } lsa_DnsDomainInfo;
384 typedef enum {
385 LSA_POLICY_INFO_AUDIT_LOG=1,
386 LSA_POLICY_INFO_AUDIT_EVENTS=2,
387 LSA_POLICY_INFO_DOMAIN=3,
388 LSA_POLICY_INFO_PD=4,
389 LSA_POLICY_INFO_ACCOUNT_DOMAIN=5,
390 LSA_POLICY_INFO_ROLE=6,
391 LSA_POLICY_INFO_REPLICA=7,
392 LSA_POLICY_INFO_QUOTA=8,
393 LSA_POLICY_INFO_MOD=9,
394 LSA_POLICY_INFO_AUDIT_FULL_SET=10,
395 LSA_POLICY_INFO_AUDIT_FULL_QUERY=11,
396 LSA_POLICY_INFO_DNS=12,
397 LSA_POLICY_INFO_DNS_INT=13,
398 LSA_POLICY_INFO_L_ACCOUNT_DOMAIN=14
399 } lsa_PolicyInfo;
401 typedef [switch_type(uint16)] union {
402 [case(LSA_POLICY_INFO_AUDIT_LOG)] lsa_AuditLogInfo audit_log;
403 [case(LSA_POLICY_INFO_AUDIT_EVENTS)] lsa_AuditEventsInfo audit_events;
404 [case(LSA_POLICY_INFO_DOMAIN)] lsa_DomainInfo domain;
405 [case(LSA_POLICY_INFO_PD)] lsa_PDAccountInfo pd;
406 [case(LSA_POLICY_INFO_ACCOUNT_DOMAIN)] lsa_DomainInfo account_domain;
407 [case(LSA_POLICY_INFO_ROLE)] lsa_ServerRole role;
408 [case(LSA_POLICY_INFO_REPLICA)] lsa_ReplicaSourceInfo replica;
409 [case(LSA_POLICY_INFO_QUOTA)] lsa_DefaultQuotaInfo quota;
410 [case(LSA_POLICY_INFO_MOD)] lsa_ModificationInfo mod;
411 [case(LSA_POLICY_INFO_AUDIT_FULL_SET)] lsa_AuditFullSetInfo auditfullset;
412 [case(LSA_POLICY_INFO_AUDIT_FULL_QUERY)] lsa_AuditFullQueryInfo auditfullquery;
413 [case(LSA_POLICY_INFO_DNS)] lsa_DnsDomainInfo dns;
414 [case(LSA_POLICY_INFO_DNS_INT)] lsa_DnsDomainInfo dns;
415 [case(LSA_POLICY_INFO_L_ACCOUNT_DOMAIN)] lsa_DomainInfo l_account_domain;
416 } lsa_PolicyInformation;
418 NTSTATUS lsa_QueryInfoPolicy(
419 [in] policy_handle *handle,
420 [in] lsa_PolicyInfo level,
421 [out,ref,switch_is(level)] lsa_PolicyInformation **info
424 /******************/
425 /* Function: 0x08 */
426 NTSTATUS lsa_SetInfoPolicy (
427 [in] policy_handle *handle,
428 [in] lsa_PolicyInfo level,
429 [in,switch_is(level)] lsa_PolicyInformation *info
432 /******************/
433 /* Function: 0x09 */
434 [todo] NTSTATUS lsa_ClearAuditLog ();
436 /******************/
437 /* Function: 0x0a */
438 [public] NTSTATUS lsa_CreateAccount (
439 [in] policy_handle *handle,
440 [in,ref] dom_sid2 *sid,
441 [in] lsa_AccountAccessMask access_mask,
442 [out] policy_handle *acct_handle
445 /******************/
446 /* NOTE: This only returns accounts that have at least
447 one privilege set
449 /* Function: 0x0b */
450 typedef struct {
451 dom_sid2 *sid;
452 } lsa_SidPtr;
454 typedef [public] struct {
455 [range(0,20480)] uint32 num_sids;
456 [size_is(num_sids)] lsa_SidPtr *sids;
457 } lsa_SidArray;
459 [public] NTSTATUS lsa_EnumAccounts(
460 [in] policy_handle *handle,
461 [in,out,ref] uint32 *resume_handle,
462 [out,ref] lsa_SidArray *sids,
463 [in,range(0,8192)] uint32 num_entries
466 /*************************************************/
467 /* Function: 0x0c */
469 [public] NTSTATUS lsa_CreateTrustedDomain(
470 [in] policy_handle *policy_handle,
471 [in] lsa_DomainInfo *info,
472 [in] lsa_TrustedAccessMask access_mask,
473 [out] policy_handle *trustdom_handle
477 /******************/
478 /* Function: 0x0d */
480 /* w2k3 treats max_size as max_domains*60 */
481 const int LSA_ENUM_TRUST_DOMAIN_MULTIPLIER = 60;
483 typedef struct {
484 uint32 count;
485 [size_is(count)] lsa_DomainInfo *domains;
486 } lsa_DomainList;
488 NTSTATUS lsa_EnumTrustDom(
489 [in] policy_handle *handle,
490 [in,out,ref] uint32 *resume_handle,
491 [out,ref] lsa_DomainList *domains,
492 [in] uint32 max_size
496 /******************/
497 /* Function: 0x0e */
498 typedef [public] enum {
499 SID_NAME_USE_NONE = 0,/* NOTUSED */
500 SID_NAME_USER = 1, /* user */
501 SID_NAME_DOM_GRP = 2, /* domain group */
502 SID_NAME_DOMAIN = 3, /* domain: don't know what this is */
503 SID_NAME_ALIAS = 4, /* local group */
504 SID_NAME_WKN_GRP = 5, /* well-known group */
505 SID_NAME_DELETED = 6, /* deleted account: needed for c2 rating */
506 SID_NAME_INVALID = 7, /* invalid account */
507 SID_NAME_UNKNOWN = 8, /* oops. */
508 SID_NAME_COMPUTER = 9, /* machine */
509 SID_NAME_LABEL = 10 /* Mandatory Label */
510 } lsa_SidType;
512 typedef struct {
513 lsa_SidType sid_type;
514 uint32 rid;
515 uint32 sid_index;
516 } lsa_TranslatedSid;
518 typedef struct {
519 [range(0,1000)] uint32 count;
520 [size_is(count)] lsa_TranslatedSid *sids;
521 } lsa_TransSidArray;
523 const int LSA_REF_DOMAIN_LIST_MULTIPLIER = 32;
524 typedef [public] struct {
525 [range(0,1000)] uint32 count;
526 [size_is(count)] lsa_DomainInfo *domains;
527 uint32 max_size;
528 } lsa_RefDomainList;
530 /* Level 1: Ask everywhere
531 * Level 2: Ask domain and trusted domains, no builtin and wkn
532 * Level 3: Only ask domain
533 * Level 4: W2k3ad: Only ask AD trusts
534 * Level 5: Only ask transitive forest trusts
535 * Level 6: Like 4
538 typedef [public] enum {
539 LSA_LOOKUP_NAMES_ALL = 1,
540 LSA_LOOKUP_NAMES_DOMAINS_ONLY = 2,
541 LSA_LOOKUP_NAMES_PRIMARY_DOMAIN_ONLY = 3,
542 LSA_LOOKUP_NAMES_UPLEVEL_TRUSTS_ONLY = 4,
543 LSA_LOOKUP_NAMES_FOREST_TRUSTS_ONLY = 5,
544 LSA_LOOKUP_NAMES_UPLEVEL_TRUSTS_ONLY2 = 6,
545 LSA_LOOKUP_NAMES_RODC_REFERRAL_TO_FULL_DC = 7
546 } lsa_LookupNamesLevel;
548 [public] NTSTATUS lsa_LookupNames (
549 [in] policy_handle *handle,
550 [in,range(0,1000)] uint32 num_names,
551 [in,size_is(num_names)] lsa_String names[],
552 [out,ref] lsa_RefDomainList **domains,
553 [in,out,ref] lsa_TransSidArray *sids,
554 [in] lsa_LookupNamesLevel level,
555 [in,out,ref] uint32 *count
559 /******************/
560 /* Function: 0x0f */
562 typedef struct {
563 lsa_SidType sid_type;
564 lsa_String name;
565 uint32 sid_index;
566 } lsa_TranslatedName;
568 typedef [public] struct {
569 [range(0,20480)] uint32 count;
570 [size_is(count)] lsa_TranslatedName *names;
571 } lsa_TransNameArray;
573 [public] NTSTATUS lsa_LookupSids(
574 [in] policy_handle *handle,
575 [in,ref] lsa_SidArray *sids,
576 [out,ref] lsa_RefDomainList **domains,
577 [in,out,ref] lsa_TransNameArray *names,
578 [in] lsa_LookupNamesLevel level,
579 [in,out,ref] uint32 *count
583 /* Function: 0x10 */
584 [public] NTSTATUS lsa_CreateSecret(
585 [in] policy_handle *handle,
586 [in] lsa_String name,
587 [in] lsa_SecretAccessMask access_mask,
588 [out] policy_handle *sec_handle
592 /*****************************************/
593 /* Function: 0x11 */
594 NTSTATUS lsa_OpenAccount(
595 [in] policy_handle *handle,
596 [in,ref] dom_sid2 *sid,
597 [in] lsa_AccountAccessMask access_mask,
598 [out] policy_handle *acct_handle
602 /****************************************/
603 /* Function: 0x12 */
605 typedef struct {
606 lsa_LUID luid;
607 uint32 attribute;
608 } lsa_LUIDAttribute;
610 typedef struct {
611 [range(0,1000)] uint32 count;
612 uint32 unknown;
613 [size_is(count)] lsa_LUIDAttribute set[*];
614 } lsa_PrivilegeSet;
616 NTSTATUS lsa_EnumPrivsAccount(
617 [in] policy_handle *handle,
618 [out,ref] lsa_PrivilegeSet **privs
622 /****************************************/
623 /* Function: 0x13 */
624 NTSTATUS lsa_AddPrivilegesToAccount(
625 [in] policy_handle *handle,
626 [in,ref] lsa_PrivilegeSet *privs
630 /****************************************/
631 /* Function: 0x14 */
632 NTSTATUS lsa_RemovePrivilegesFromAccount(
633 [in] policy_handle *handle,
634 [in] uint8 remove_all,
635 [in,unique] lsa_PrivilegeSet *privs
638 /* Function: 0x15 */
639 [todo] NTSTATUS lsa_GetQuotasForAccount();
641 /* Function: 0x16 */
642 [todo] NTSTATUS lsa_SetQuotasForAccount();
644 /* Function: 0x17 */
645 NTSTATUS lsa_GetSystemAccessAccount(
646 [in] policy_handle *handle,
647 [out,ref] lsa_AccountAccessMask *access_mask
650 /* Function: 0x18 */
651 NTSTATUS lsa_SetSystemAccessAccount(
652 [in] policy_handle *handle,
653 [in] lsa_AccountAccessMask access_mask
656 /* Function: 0x19 */
657 NTSTATUS lsa_OpenTrustedDomain(
658 [in] policy_handle *handle,
659 [in] dom_sid2 *sid,
660 [in] lsa_TrustedAccessMask access_mask,
661 [out] policy_handle *trustdom_handle
664 typedef [flag(NDR_PAHEX)] struct {
665 uint3264 length;
666 uint3264 size;
667 [size_is(size),length_is(length)] uint8 *data;
668 } lsa_DATA_BUF;
670 typedef [flag(NDR_PAHEX)] struct {
671 [range(0,65536)] uint32 size;
672 [size_is(size)] uint8 *data;
673 } lsa_DATA_BUF2;
675 typedef enum {
676 LSA_TRUSTED_DOMAIN_INFO_NAME = 1,
677 LSA_TRUSTED_DOMAIN_INFO_CONTROLLERS = 2,
678 LSA_TRUSTED_DOMAIN_INFO_POSIX_OFFSET = 3,
679 LSA_TRUSTED_DOMAIN_INFO_PASSWORD = 4,
680 LSA_TRUSTED_DOMAIN_INFO_BASIC = 5,
681 LSA_TRUSTED_DOMAIN_INFO_INFO_EX = 6,
682 LSA_TRUSTED_DOMAIN_INFO_AUTH_INFO = 7,
683 LSA_TRUSTED_DOMAIN_INFO_FULL_INFO = 8,
684 LSA_TRUSTED_DOMAIN_INFO_AUTH_INFO_INTERNAL = 9,
685 LSA_TRUSTED_DOMAIN_INFO_FULL_INFO_INTERNAL = 10,
686 LSA_TRUSTED_DOMAIN_INFO_INFO_EX2_INTERNAL = 11,
687 LSA_TRUSTED_DOMAIN_INFO_FULL_INFO_2_INTERNAL = 12,
688 LSA_TRUSTED_DOMAIN_SUPPORTED_ENCRYPTION_TYPES = 13
689 } lsa_TrustDomInfoEnum;
691 typedef [public,bitmap32bit] bitmap {
692 LSA_TRUST_DIRECTION_INBOUND = 0x00000001,
693 LSA_TRUST_DIRECTION_OUTBOUND = 0x00000002
694 } lsa_TrustDirection;
696 typedef [public,v1_enum] enum {
697 LSA_TRUST_TYPE_DOWNLEVEL = 0x00000001,
698 LSA_TRUST_TYPE_UPLEVEL = 0x00000002,
699 LSA_TRUST_TYPE_MIT = 0x00000003,
700 LSA_TRUST_TYPE_DCE = 0x00000004
701 } lsa_TrustType;
703 typedef [public,bitmap32bit] bitmap {
704 LSA_TRUST_ATTRIBUTE_NON_TRANSITIVE = 0x00000001,
705 LSA_TRUST_ATTRIBUTE_UPLEVEL_ONLY = 0x00000002,
706 LSA_TRUST_ATTRIBUTE_QUARANTINED_DOMAIN = 0x00000004,
707 LSA_TRUST_ATTRIBUTE_FOREST_TRANSITIVE = 0x00000008,
708 LSA_TRUST_ATTRIBUTE_CROSS_ORGANIZATION = 0x00000010,
709 LSA_TRUST_ATTRIBUTE_WITHIN_FOREST = 0x00000020,
710 LSA_TRUST_ATTRIBUTE_TREAT_AS_EXTERNAL = 0x00000040,
711 LSA_TRUST_ATTRIBUTE_USES_RC4_ENCRYPTION = 0x00000080
712 } lsa_TrustAttributes;
714 typedef struct {
715 lsa_StringLarge netbios_name;
716 } lsa_TrustDomainInfoName;
719 typedef struct {
720 uint32 entries;
721 [size_is(entries)] lsa_StringLarge *netbios_names;
722 } lsa_TrustDomainInfoControllers;
724 typedef struct {
725 uint32 posix_offset;
726 } lsa_TrustDomainInfoPosixOffset;
728 typedef struct {
729 lsa_DATA_BUF *password;
730 lsa_DATA_BUF *old_password;
731 } lsa_TrustDomainInfoPassword;
733 typedef struct {
734 lsa_String netbios_name;
735 dom_sid2 *sid;
736 } lsa_TrustDomainInfoBasic;
738 typedef [public] struct {
739 lsa_StringLarge domain_name;
740 lsa_StringLarge netbios_name;
741 dom_sid2 *sid;
742 lsa_TrustDirection trust_direction;
743 lsa_TrustType trust_type;
744 lsa_TrustAttributes trust_attributes;
745 } lsa_TrustDomainInfoInfoEx;
747 typedef [public,v1_enum] enum {
748 TRUST_AUTH_TYPE_NONE = 0,
749 TRUST_AUTH_TYPE_NT4OWF = 1,
750 TRUST_AUTH_TYPE_CLEAR = 2,
751 TRUST_AUTH_TYPE_VERSION = 3
752 } lsa_TrustAuthType;
754 typedef struct {
755 NTTIME_hyper last_update_time;
756 lsa_TrustAuthType AuthType;
757 lsa_DATA_BUF2 data;
758 } lsa_TrustDomainInfoBuffer;
760 typedef [public] struct {
761 uint32 incoming_count;
762 lsa_TrustDomainInfoBuffer *incoming_current_auth_info;
763 lsa_TrustDomainInfoBuffer *incoming_previous_auth_info;
764 uint32 outgoing_count;
765 lsa_TrustDomainInfoBuffer *outgoing_current_auth_info;
766 lsa_TrustDomainInfoBuffer *outgoing_previous_auth_info;
767 } lsa_TrustDomainInfoAuthInfo;
769 typedef struct {
770 lsa_TrustDomainInfoInfoEx info_ex;
771 lsa_TrustDomainInfoPosixOffset posix_offset;
772 lsa_TrustDomainInfoAuthInfo auth_info;
773 } lsa_TrustDomainInfoFullInfo;
775 typedef struct {
776 lsa_DATA_BUF2 auth_blob;
777 } lsa_TrustDomainInfoAuthInfoInternal;
779 typedef struct {
780 lsa_TrustDomainInfoInfoEx info_ex;
781 lsa_TrustDomainInfoPosixOffset posix_offset;
782 lsa_TrustDomainInfoAuthInfoInternal auth_info;
783 } lsa_TrustDomainInfoFullInfoInternal;
785 typedef struct {
786 lsa_TrustDomainInfoInfoEx info_ex;
787 uint32 forest_trust_length;
788 [size_is(forest_trust_length)] uint8 *forest_trust_data;
789 } lsa_TrustDomainInfoInfoEx2Internal;
791 typedef struct {
792 lsa_TrustDomainInfoInfoEx2Internal info;
793 lsa_TrustDomainInfoPosixOffset posix_offset;
794 lsa_TrustDomainInfoAuthInfo auth_info;
795 } lsa_TrustDomainInfoFullInfo2Internal;
797 typedef struct {
798 kerb_EncTypes enc_types;
799 } lsa_TrustDomainInfoSupportedEncTypes;
801 typedef [switch_type(lsa_TrustDomInfoEnum)] union {
802 [case(LSA_TRUSTED_DOMAIN_INFO_NAME)]
803 lsa_TrustDomainInfoName name;
804 [case(LSA_TRUSTED_DOMAIN_INFO_CONTROLLERS)]
805 lsa_TrustDomainInfoControllers controllers;
806 [case(LSA_TRUSTED_DOMAIN_INFO_POSIX_OFFSET)]
807 lsa_TrustDomainInfoPosixOffset posix_offset;
808 [case(LSA_TRUSTED_DOMAIN_INFO_PASSWORD)]
809 lsa_TrustDomainInfoPassword password;
810 [case(LSA_TRUSTED_DOMAIN_INFO_BASIC)]
811 lsa_TrustDomainInfoBasic info_basic;
812 [case(LSA_TRUSTED_DOMAIN_INFO_INFO_EX)]
813 lsa_TrustDomainInfoInfoEx info_ex;
814 [case(LSA_TRUSTED_DOMAIN_INFO_AUTH_INFO)]
815 lsa_TrustDomainInfoAuthInfo auth_info;
816 [case(LSA_TRUSTED_DOMAIN_INFO_FULL_INFO)]
817 lsa_TrustDomainInfoFullInfo full_info;
818 [case(LSA_TRUSTED_DOMAIN_INFO_AUTH_INFO_INTERNAL)]
819 lsa_TrustDomainInfoAuthInfoInternal auth_info_internal;
820 [case(LSA_TRUSTED_DOMAIN_INFO_FULL_INFO_INTERNAL)]
821 lsa_TrustDomainInfoFullInfoInternal full_info_internal;
822 [case(LSA_TRUSTED_DOMAIN_INFO_INFO_EX2_INTERNAL)]
823 lsa_TrustDomainInfoInfoEx2Internal info_ex2_internal;
824 [case(LSA_TRUSTED_DOMAIN_INFO_FULL_INFO_2_INTERNAL)]
825 lsa_TrustDomainInfoFullInfo2Internal full_info2_internal;
826 [case(LSA_TRUSTED_DOMAIN_SUPPORTED_ENCRYPTION_TYPES)]
827 lsa_TrustDomainInfoSupportedEncTypes enc_types;
828 } lsa_TrustedDomainInfo;
830 /* Function: 0x1a */
831 NTSTATUS lsa_QueryTrustedDomainInfo(
832 [in] policy_handle *trustdom_handle,
833 [in] lsa_TrustDomInfoEnum level,
834 [out,switch_is(level),ref] lsa_TrustedDomainInfo **info
837 /* Function: 0x1b */
838 NTSTATUS lsa_SetInformationTrustedDomain(
839 [in] policy_handle *trustdom_handle,
840 [in] lsa_TrustDomInfoEnum level,
841 [in,switch_is(level)] lsa_TrustedDomainInfo *info
844 /* Function: 0x1c */
845 [public] NTSTATUS lsa_OpenSecret(
846 [in] policy_handle *handle,
847 [in] lsa_String name,
848 [in] lsa_SecretAccessMask access_mask,
849 [out] policy_handle *sec_handle
852 /* Function: 0x1d */
854 [public] NTSTATUS lsa_SetSecret(
855 [in] policy_handle *sec_handle,
856 [in,unique] lsa_DATA_BUF *new_val,
857 [in,unique] lsa_DATA_BUF *old_val
860 typedef struct {
861 lsa_DATA_BUF *buf;
862 } lsa_DATA_BUF_PTR;
864 /* Function: 0x1e */
865 [public] NTSTATUS lsa_QuerySecret (
866 [in] policy_handle *sec_handle,
867 [in,out,unique] lsa_DATA_BUF_PTR *new_val,
868 [in,out,unique] NTTIME_hyper *new_mtime,
869 [in,out,unique] lsa_DATA_BUF_PTR *old_val,
870 [in,out,unique] NTTIME_hyper *old_mtime
873 /* Function: 0x1f */
874 NTSTATUS lsa_LookupPrivValue(
875 [in] policy_handle *handle,
876 [in,ref] lsa_String *name,
877 [out,ref] lsa_LUID *luid
881 /* Function: 0x20 */
882 NTSTATUS lsa_LookupPrivName(
883 [in] policy_handle *handle,
884 [in,ref] lsa_LUID *luid,
885 [out,ref] lsa_StringLarge **name
889 /*******************/
890 /* Function: 0x21 */
891 NTSTATUS lsa_LookupPrivDisplayName(
892 [in] policy_handle *handle,
893 [in,ref] lsa_String *name,
894 [in] uint16 language_id,
895 [in] uint16 language_id_sys,
896 [out,ref] lsa_StringLarge **disp_name,
897 /* see http://www.microsoft.com/globaldev/nlsweb/ for
898 language definitions */
899 [out,ref] uint16 *returned_language_id
902 /*******************/
903 /* Function: 0x22 */
904 NTSTATUS lsa_DeleteObject (
905 [in,out] policy_handle *handle
908 /*******************/
909 /* Function: 0x23 */
910 NTSTATUS lsa_EnumAccountsWithUserRight (
911 [in] policy_handle *handle,
912 [in,unique] lsa_String *name,
913 [out] lsa_SidArray *sids
916 /* Function: 0x24 */
917 typedef struct {
918 [string,charset(UTF16)] uint16 *name;
919 } lsa_RightAttribute;
921 typedef struct {
922 [range(0,256)] uint32 count;
923 [size_is(count)] lsa_StringLarge *names;
924 } lsa_RightSet;
926 NTSTATUS lsa_EnumAccountRights (
927 [in] policy_handle *handle,
928 [in,ref] dom_sid2 *sid,
929 [out,ref] lsa_RightSet *rights
933 /**********************/
934 /* Function: 0x25 */
935 NTSTATUS lsa_AddAccountRights (
936 [in] policy_handle *handle,
937 [in,ref] dom_sid2 *sid,
938 [in,ref] lsa_RightSet *rights
941 /**********************/
942 /* Function: 0x26 */
943 NTSTATUS lsa_RemoveAccountRights (
944 [in] policy_handle *handle,
945 [in,ref] dom_sid2 *sid,
946 [in] uint8 remove_all,
947 [in,ref] lsa_RightSet *rights
950 /* Function: 0x27 */
951 NTSTATUS lsa_QueryTrustedDomainInfoBySid(
952 [in] policy_handle *handle,
953 [in,ref] dom_sid2 *dom_sid,
954 [in] lsa_TrustDomInfoEnum level,
955 [out,switch_is(level),ref] lsa_TrustedDomainInfo **info
958 /* Function: 0x28 */
959 NTSTATUS lsa_SetTrustedDomainInfo(
960 [in] policy_handle *handle,
961 [in] dom_sid2 *dom_sid,
962 [in] lsa_TrustDomInfoEnum level,
963 [in,switch_is(level)] lsa_TrustedDomainInfo *info
966 /* Function: 0x29 */
967 NTSTATUS lsa_DeleteTrustedDomain(
968 [in] policy_handle *handle,
969 [in] dom_sid2 *dom_sid
972 /* Function: 0x2a */
973 NTSTATUS lsa_StorePrivateData(
974 [in] policy_handle *handle,
975 [in,ref] lsa_String *name,
976 [in,unique] lsa_DATA_BUF *val
979 /* Function: 0x2b */
980 NTSTATUS lsa_RetrievePrivateData(
981 [in] policy_handle *handle,
982 [in,ref] lsa_String *name,
983 [in,out,ref] lsa_DATA_BUF **val
986 /**********************/
987 /* Function: 0x2c */
988 [public] NTSTATUS lsa_OpenPolicy2 (
989 [in,unique] [string,charset(UTF16)] uint16 *system_name,
990 [in] lsa_ObjectAttribute *attr,
991 [in] lsa_PolicyAccessMask access_mask,
992 [out] policy_handle *handle
995 /**********************/
996 /* Function: 0x2d */
997 NTSTATUS lsa_GetUserName(
998 [in,unique] [string,charset(UTF16)] uint16 *system_name,
999 [in,out,ref] lsa_String **account_name,
1000 [in,out,unique] lsa_String **authority_name
1003 /**********************/
1004 /* Function: 0x2e */
1006 NTSTATUS lsa_QueryInfoPolicy2(
1007 [in] policy_handle *handle,
1008 [in] lsa_PolicyInfo level,
1009 [out,ref,switch_is(level)] lsa_PolicyInformation **info
1012 /* Function 0x2f */
1013 NTSTATUS lsa_SetInfoPolicy2(
1014 [in] policy_handle *handle,
1015 [in] lsa_PolicyInfo level,
1016 [in,switch_is(level)] lsa_PolicyInformation *info
1019 /**********************/
1020 /* Function 0x30 */
1021 NTSTATUS lsa_QueryTrustedDomainInfoByName(
1022 [in] policy_handle *handle,
1023 [in,ref] lsa_String *trusted_domain,
1024 [in] lsa_TrustDomInfoEnum level,
1025 [out,ref,switch_is(level)] lsa_TrustedDomainInfo **info
1028 /**********************/
1029 /* Function 0x31 */
1030 [public] NTSTATUS lsa_SetTrustedDomainInfoByName(
1031 [in] policy_handle *handle,
1032 [in,ref] lsa_String *trusted_domain,
1033 [in] lsa_TrustDomInfoEnum level,
1034 [in,ref,switch_is(level)] lsa_TrustedDomainInfo *info
1037 /* Function 0x32 */
1039 /* w2k3 treats max_size as max_domains*82 */
1040 const int LSA_ENUM_TRUST_DOMAIN_EX_MULTIPLIER = 82;
1042 typedef struct {
1043 uint32 count;
1044 [size_is(count)] lsa_TrustDomainInfoInfoEx *domains;
1045 } lsa_DomainListEx;
1047 NTSTATUS lsa_EnumTrustedDomainsEx (
1048 [in] policy_handle *handle,
1049 [in,out] uint32 *resume_handle,
1050 [out] lsa_DomainListEx *domains,
1051 [in] uint32 max_size
1054 /* Function 0x33 */
1055 NTSTATUS lsa_CreateTrustedDomainEx(
1056 [in] policy_handle *policy_handle,
1057 [in] lsa_TrustDomainInfoInfoEx *info,
1058 [in] lsa_TrustDomainInfoAuthInfo *auth_info,
1059 [in] lsa_TrustedAccessMask access_mask,
1060 [out] policy_handle *trustdom_handle
1064 /* Function 0x34 */
1065 NTSTATUS lsa_CloseTrustedDomainEx(
1066 [in,out] policy_handle *handle
1069 /* Function 0x35 */
1070 typedef [bitmap32bit] bitmap {
1071 LSA_POLICY_KERBEROS_VALIDATE_CLIENT = 0x00000080
1072 } lsa_krbAuthenticationOptions;
1074 /* w2k3 returns either 0x000bbbd000000000 or 0x000a48e800000000
1075 for reserved - gd */
1076 typedef struct {
1077 lsa_krbAuthenticationOptions authentication_options;
1078 hyper service_tkt_lifetime;
1079 hyper user_tkt_lifetime;
1080 hyper user_tkt_renewaltime;
1081 hyper clock_skew;
1082 hyper reserved;
1083 } lsa_DomainInfoKerberos;
1085 typedef struct {
1086 uint32 blob_size;
1087 [size_is(blob_size)] uint8 *efs_blob;
1088 } lsa_DomainInfoEfs;
1090 typedef enum {
1091 LSA_DOMAIN_INFO_POLICY_EFS=2,
1092 LSA_DOMAIN_INFO_POLICY_KERBEROS=3
1093 } lsa_DomainInfoEnum;
1095 typedef [switch_type(uint16)] union {
1096 [case(LSA_DOMAIN_INFO_POLICY_EFS)] lsa_DomainInfoEfs efs_info;
1097 [case(LSA_DOMAIN_INFO_POLICY_KERBEROS)] lsa_DomainInfoKerberos kerberos_info;
1098 } lsa_DomainInformationPolicy;
1100 NTSTATUS lsa_QueryDomainInformationPolicy(
1101 [in] policy_handle *handle,
1102 [in] uint16 level,
1103 [out,ref,switch_is(level)] lsa_DomainInformationPolicy **info
1106 /* Function 0x36 */
1107 NTSTATUS lsa_SetDomainInformationPolicy(
1108 [in] policy_handle *handle,
1109 [in] uint16 level,
1110 [in,unique,switch_is(level)] lsa_DomainInformationPolicy *info
1113 /**********************/
1114 /* Function 0x37 */
1115 NTSTATUS lsa_OpenTrustedDomainByName(
1116 [in] policy_handle *handle,
1117 [in] lsa_String name,
1118 [in] lsa_TrustedAccessMask access_mask,
1119 [out] policy_handle *trustdom_handle
1122 /* Function 0x38 */
1123 [todo] NTSTATUS lsa_TestCall();
1125 /**********************/
1126 /* Function 0x39 */
1128 typedef struct {
1129 lsa_SidType sid_type;
1130 lsa_String name;
1131 uint32 sid_index;
1132 uint32 unknown;
1133 } lsa_TranslatedName2;
1135 typedef struct {
1136 [range(0,1000)] uint32 count;
1137 [size_is(count)] lsa_TranslatedName2 *names;
1138 } lsa_TransNameArray2;
1140 typedef [v1_enum] enum {
1141 LSA_LOOKUP_OPTION_SEARCH_ISOLATED_NAMES = 0x00000000,
1142 LSA_LOOKUP_OPTION_SEARCH_ISOLATED_NAMES_LOCAL = 0x80000000
1143 } lsa_LookupOptions;
1145 typedef [v1_enum] enum {
1146 LSA_CLIENT_REVISION_1 = 0x00000001,
1147 LSA_CLIENT_REVISION_2 = 0x00000002
1148 } lsa_ClientRevision;
1150 [public] NTSTATUS lsa_LookupSids2(
1151 [in] policy_handle *handle,
1152 [in,ref] lsa_SidArray *sids,
1153 [out,ref] lsa_RefDomainList **domains,
1154 [in,out,ref] lsa_TransNameArray2 *names,
1155 [in] lsa_LookupNamesLevel level,
1156 [in,out,ref] uint32 *count,
1157 [in] lsa_LookupOptions lookup_options,
1158 [in] lsa_ClientRevision client_revision
1161 /**********************/
1162 /* Function 0x3a */
1164 typedef struct {
1165 lsa_SidType sid_type;
1166 uint32 rid;
1167 uint32 sid_index;
1168 uint32 unknown;
1169 } lsa_TranslatedSid2;
1171 typedef struct {
1172 [range(0,1000)] uint32 count;
1173 [size_is(count)] lsa_TranslatedSid2 *sids;
1174 } lsa_TransSidArray2;
1176 [public] NTSTATUS lsa_LookupNames2 (
1177 [in] policy_handle *handle,
1178 [in,range(0,1000)] uint32 num_names,
1179 [in,size_is(num_names)] lsa_String names[],
1180 [out,ref] lsa_RefDomainList **domains,
1181 [in,out,ref] lsa_TransSidArray2 *sids,
1182 [in] lsa_LookupNamesLevel level,
1183 [in,out,ref] uint32 *count,
1184 [in] lsa_LookupOptions lookup_options,
1185 [in] lsa_ClientRevision client_revision
1188 /* Function 0x3b */
1189 NTSTATUS lsa_CreateTrustedDomainEx2(
1190 [in] policy_handle *policy_handle,
1191 [in] lsa_TrustDomainInfoInfoEx *info,
1192 [in] lsa_TrustDomainInfoAuthInfoInternal *auth_info_internal,
1193 [in] lsa_TrustedAccessMask access_mask,
1194 [out] policy_handle *trustdom_handle
1197 /* Function 0x3c */
1198 [todo] NTSTATUS lsa_CREDRWRITE();
1200 /* Function 0x3d */
1201 [todo] NTSTATUS lsa_CREDRREAD();
1203 /* Function 0x3e */
1204 [todo] NTSTATUS lsa_CREDRENUMERATE();
1206 /* Function 0x3f */
1207 [todo] NTSTATUS lsa_CREDRWRITEDOMAINCREDENTIALS();
1209 /* Function 0x40 */
1210 [todo] NTSTATUS lsa_CREDRREADDOMAINCREDENTIALS();
1212 /* Function 0x41 */
1213 [todo] NTSTATUS lsa_CREDRDELETE();
1215 /* Function 0x42 */
1216 [todo] NTSTATUS lsa_CREDRGETTARGETINFO();
1218 /* Function 0x43 */
1219 [todo] NTSTATUS lsa_CREDRPROFILELOADED();
1221 /**********************/
1222 /* Function 0x44 */
1223 typedef struct {
1224 lsa_SidType sid_type;
1225 dom_sid2 *sid;
1226 uint32 sid_index;
1227 uint32 flags;
1228 } lsa_TranslatedSid3;
1230 typedef struct {
1231 [range(0,1000)] uint32 count;
1232 [size_is(count)] lsa_TranslatedSid3 *sids;
1233 } lsa_TransSidArray3;
1235 [public] NTSTATUS lsa_LookupNames3 (
1236 [in] policy_handle *handle,
1237 [in,range(0,1000)] uint32 num_names,
1238 [in,size_is(num_names)] lsa_String names[],
1239 [out,ref] lsa_RefDomainList **domains,
1240 [in,out,ref] lsa_TransSidArray3 *sids,
1241 [in] lsa_LookupNamesLevel level,
1242 [in,out,ref] uint32 *count,
1243 [in] lsa_LookupOptions lookup_options,
1244 [in] lsa_ClientRevision client_revision
1247 /* Function 0x45 */
1248 [todo] NTSTATUS lsa_CREDRGETSESSIONTYPES();
1250 /* Function 0x46 */
1251 [todo] NTSTATUS lsa_LSARREGISTERAUDITEVENT();
1253 /* Function 0x47 */
1254 [todo] NTSTATUS lsa_LSARGENAUDITEVENT();
1256 /* Function 0x48 */
1257 [todo] NTSTATUS lsa_LSARUNREGISTERAUDITEVENT();
1259 /* Function 0x49 */
1260 typedef [bitmap32bit,public] bitmap {
1261 /* these apply to LSA_FOREST_TRUST_TOP_LEVEL_NAME */
1262 LSA_TLN_DISABLED_NEW = 0x00000001,
1263 LSA_TLN_DISABLED_ADMIN = 0x00000002,
1264 LSA_TLN_DISABLED_CONFLICT = 0x00000004,
1266 /* these apply to LSA_FOREST_TRUST_DOMAIN_INFO */
1267 LSA_SID_DISABLED_ADMIN = 0x00000001,
1268 LSA_SID_DISABLED_CONFLICT = 0x00000002,
1269 LSA_NB_DISABLED_ADMIN = 0x00000004,
1270 LSA_NB_DISABLED_CONFLICT = 0x00000008
1271 } lsa_ForestTrustRecordFlags;
1273 const uint32 LSA_TLN_DISABLED_MASK = (
1274 LSA_TLN_DISABLED_NEW |
1275 LSA_TLN_DISABLED_ADMIN |
1276 LSA_TLN_DISABLED_CONFLICT);
1277 const uint32 LSA_SID_DISABLED_MASK = (
1278 LSA_SID_DISABLED_ADMIN |
1279 LSA_SID_DISABLED_CONFLICT);
1280 const uint32 LSA_NB_DISABLED_MASK = (
1281 LSA_NB_DISABLED_ADMIN |
1282 LSA_NB_DISABLED_CONFLICT);
1284 typedef enum {
1285 LSA_FOREST_TRUST_TOP_LEVEL_NAME = 0,
1286 LSA_FOREST_TRUST_TOP_LEVEL_NAME_EX = 1,
1287 LSA_FOREST_TRUST_DOMAIN_INFO = 2,
1288 LSA_FOREST_TRUST_RECORD_TYPE_LAST = 3
1289 } lsa_ForestTrustRecordType;
1291 typedef struct {
1292 [range(0,131072)] uint3264 length;
1293 [size_is(length)] uint8 *data;
1294 } lsa_ForestTrustBinaryData;
1296 typedef struct {
1297 dom_sid2 *domain_sid;
1298 lsa_StringLarge dns_domain_name;
1299 lsa_StringLarge netbios_domain_name;
1300 } lsa_ForestTrustDomainInfo;
1302 typedef [switch_type(lsa_ForestTrustRecordType)] union {
1303 [case(LSA_FOREST_TRUST_TOP_LEVEL_NAME)] lsa_StringLarge top_level_name;
1304 [case(LSA_FOREST_TRUST_TOP_LEVEL_NAME_EX)] lsa_StringLarge top_level_name_ex;
1305 [case(LSA_FOREST_TRUST_DOMAIN_INFO)] lsa_ForestTrustDomainInfo domain_info;
1306 [default] lsa_ForestTrustBinaryData data;
1307 } lsa_ForestTrustData;
1309 typedef struct {
1310 lsa_ForestTrustRecordFlags flags;
1311 lsa_ForestTrustRecordType type;
1312 NTTIME_hyper time;
1313 [switch_is(type)] lsa_ForestTrustData forest_trust_data;
1314 } lsa_ForestTrustRecord;
1316 typedef [public] struct {
1317 [range(0,4000)] uint32 count;
1318 [size_is(count)] lsa_ForestTrustRecord **entries;
1319 } lsa_ForestTrustInformation;
1321 [public] NTSTATUS lsa_lsaRQueryForestTrustInformation(
1322 [in] policy_handle *handle,
1323 [in,ref] lsa_String *trusted_domain_name,
1324 [in] lsa_ForestTrustRecordType highest_record_type,
1325 [out,ref] lsa_ForestTrustInformation **forest_trust_info
1328 /*****************
1329 * Function 0x4a */
1331 typedef [v1_enum] enum {
1332 LSA_FOREST_TRUST_COLLISION_TDO = 0,
1333 LSA_FOREST_TRUST_COLLISION_XREF = 1,
1334 LSA_FOREST_TRUST_COLLISION_OTHER = 2
1335 } lsa_ForestTrustCollisionRecordType;
1337 typedef [public] struct {
1338 uint32 index;
1339 lsa_ForestTrustCollisionRecordType type;
1340 lsa_ForestTrustRecordFlags flags;
1341 lsa_String name;
1342 } lsa_ForestTrustCollisionRecord;
1344 typedef [public] struct {
1345 uint32 count;
1346 [size_is(count)] lsa_ForestTrustCollisionRecord **entries;
1347 } lsa_ForestTrustCollisionInfo;
1349 [public] NTSTATUS lsa_lsaRSetForestTrustInformation(
1350 [in] policy_handle *handle,
1351 [in,ref] lsa_StringLarge *trusted_domain_name,
1352 [in] lsa_ForestTrustRecordType highest_record_type,
1353 [in,ref] lsa_ForestTrustInformation *forest_trust_info,
1354 [in] boolean8 check_only,
1355 [out,ref] lsa_ForestTrustCollisionInfo **collision_info
1358 /* Function 0x4b */
1359 [todo] NTSTATUS lsa_CREDRRENAME();
1361 /*****************/
1362 /* Function 0x4c */
1364 [public] NTSTATUS lsa_LookupSids3(
1365 [in,ref] lsa_SidArray *sids,
1366 [out,ref] lsa_RefDomainList **domains,
1367 [in,out,ref] lsa_TransNameArray2 *names,
1368 [in] lsa_LookupNamesLevel level,
1369 [in,out,ref] uint32 *count,
1370 [in] lsa_LookupOptions lookup_options,
1371 [in] lsa_ClientRevision client_revision
1374 const int LSA_CLIENT_REVISION_NO_DNS = 0x00000001;
1375 const int LSA_CLIENT_REVISION_DNS = 0x00000002;
1377 const int LSA_LOOKUP_OPTIONS_NO_ISOLATED = 0x80000000;
1379 /* Function 0x4d */
1380 NTSTATUS lsa_LookupNames4(
1381 [in,range(0,1000)] uint32 num_names,
1382 [in,size_is(num_names)] lsa_String names[],
1383 [out,ref] lsa_RefDomainList **domains,
1384 [in,out,ref] lsa_TransSidArray3 *sids,
1385 [in] lsa_LookupNamesLevel level,
1386 [in,out,ref] uint32 *count,
1387 [in] lsa_LookupOptions lookup_options,
1388 [in] lsa_ClientRevision client_revision
1391 /* Function 0x4e */
1392 [todo] NTSTATUS lsa_LSAROPENPOLICYSCE();
1394 /* Function 0x4f */
1395 [todo] NTSTATUS lsa_LSARADTREGISTERSECURITYEVENTSOURCE();
1397 /* Function 0x50 */
1398 [todo] NTSTATUS lsa_LSARADTUNREGISTERSECURITYEVENTSOURCE();
1400 /* Function 0x51 */
1401 [todo] NTSTATUS lsa_LSARADTREPORTSECURITYEVENT();