4 lsa interface definition
7 import
"misc.idl", "security.idl";
9 [ uuid("12345778-1234-abcd-ef00-0123456789ab"),
11 endpoint("ncacn_np:[\\pipe\\lsarpc]","ncacn_np:[\\pipe\\lsass]", "ncacn_ip_tcp:", "ncalrpc:"),
12 pyhelper
("librpc/ndr/py_lsa.c"),
13 pointer_default(unique),
14 helpstring("Local Security Authority")
17 typedef bitmap security_secinfo security_secinfo
;
18 typedef bitmap kerb_EncTypes kerb_EncTypes
;
20 typedef [public] struct {
21 [value
(2*strlen_m
(string))] uint16 length
;
22 [value
(2*strlen_m
(string))] uint16 size
;
23 [charset
(UTF16
),size_is(size
/2),length_is(length
/2)] uint16
*string;
26 typedef [public] struct {
27 [value
(2*strlen_m
(string))] uint16 length
;
28 [value
(2*strlen_m_term
(string))] uint16 size
;
29 [charset
(UTF16
),size_is(size
/2),length_is(length
/2)] uint16
*string;
32 typedef [public] struct {
34 [size_is(count
)] lsa_String
*names
;
37 typedef [public] struct {
38 [value
(strlen_m
(string))] uint16 length
;
39 [value
(strlen_m
(string))] uint16 size
;
40 [charset
(DOS
),size_is(size
),length_is(length
)] uint8
*string;
43 typedef [public] struct {
44 [value
(strlen_m
(string))] uint16 length
;
45 [value
(strlen_m_term
(string))] uint16 size
;
46 [charset
(DOS
),size_is(size
),length_is(length
)] uint8
*string;
47 } lsa_AsciiStringLarge
;
49 typedef [public] struct {
52 [size_is(size
/2),length_is(length
/2)] uint16
*array
;
58 [in,out] policy_handle
*handle
64 [public] NTSTATUS lsa_Delete
(
65 [in] policy_handle
*handle
83 [size_is(count
)] lsa_PrivEntry
*privs
;
86 [public] NTSTATUS lsa_EnumPrivs
(
87 [in] policy_handle
*handle,
88 [in,out,ref] uint32
*resume_handle
,
89 [out,ref] lsa_PrivArray
*privs
,
95 NTSTATUS lsa_QuerySecurity
(
96 [in] policy_handle
*handle,
97 [in] security_secinfo sec_info
,
98 [out,ref] sec_desc_buf
**sdbuf
103 NTSTATUS lsa_SetSecObj
(
104 [in] policy_handle
*handle,
105 [in] security_secinfo sec_info
,
106 [in,ref] sec_desc_buf
*sdbuf
111 [todo
] NTSTATUS lsa_ChangePassword
();
117 uint3264 len
; /* ignored */
118 uint16 impersonation_level
;
120 uint8 effective_only
;
124 uint3264 len
; /* ignored */
126 [string,charset
(UTF16
)] uint16
*object_name
;
128 security_descriptor
*sec_desc
;
129 lsa_QosInfo
*sec_qos
;
130 } lsa_ObjectAttribute
;
132 typedef [public,bitmap32bit
] bitmap
{
133 LSA_POLICY_VIEW_LOCAL_INFORMATION
= 0x00000001,
134 LSA_POLICY_VIEW_AUDIT_INFORMATION
= 0x00000002,
135 LSA_POLICY_GET_PRIVATE_INFORMATION
= 0x00000004,
136 LSA_POLICY_TRUST_ADMIN
= 0x00000008,
137 LSA_POLICY_CREATE_ACCOUNT
= 0x00000010,
138 LSA_POLICY_CREATE_SECRET
= 0x00000020,
139 LSA_POLICY_CREATE_PRIVILEGE
= 0x00000040,
140 LSA_POLICY_SET_DEFAULT_QUOTA_LIMITS
= 0x00000080,
141 LSA_POLICY_SET_AUDIT_REQUIREMENTS
= 0x00000100,
142 LSA_POLICY_AUDIT_LOG_ADMIN
= 0x00000200,
143 LSA_POLICY_SERVER_ADMIN
= 0x00000400,
144 LSA_POLICY_LOOKUP_NAMES
= 0x00000800,
145 LSA_POLICY_NOTIFICATION
= 0x00001000
146 } lsa_PolicyAccessMask
;
148 const int LSA_POLICY_ALL_ACCESS
=
149 (STANDARD_RIGHTS_REQUIRED_ACCESS |
150 LSA_POLICY_VIEW_LOCAL_INFORMATION |
151 LSA_POLICY_VIEW_AUDIT_INFORMATION |
152 LSA_POLICY_GET_PRIVATE_INFORMATION |
153 LSA_POLICY_TRUST_ADMIN |
154 LSA_POLICY_CREATE_ACCOUNT |
155 LSA_POLICY_CREATE_SECRET |
156 LSA_POLICY_CREATE_PRIVILEGE |
157 LSA_POLICY_SET_DEFAULT_QUOTA_LIMITS |
158 LSA_POLICY_SET_AUDIT_REQUIREMENTS |
159 LSA_POLICY_AUDIT_LOG_ADMIN |
160 LSA_POLICY_SERVER_ADMIN |
161 LSA_POLICY_LOOKUP_NAMES |
162 LSA_POLICY_NOTIFICATION
);
164 const int LSA_POLICY_READ
=
165 (STANDARD_RIGHTS_READ_ACCESS |
166 LSA_POLICY_VIEW_LOCAL_INFORMATION |
167 LSA_POLICY_VIEW_AUDIT_INFORMATION |
168 LSA_POLICY_GET_PRIVATE_INFORMATION
);
170 const int LSA_POLICY_WRITE
=
171 (STANDARD_RIGHTS_READ_ACCESS |
172 LSA_POLICY_TRUST_ADMIN |
173 LSA_POLICY_CREATE_ACCOUNT |
174 LSA_POLICY_CREATE_SECRET |
175 LSA_POLICY_CREATE_PRIVILEGE |
176 LSA_POLICY_SET_DEFAULT_QUOTA_LIMITS |
177 LSA_POLICY_SET_AUDIT_REQUIREMENTS |
178 LSA_POLICY_AUDIT_LOG_ADMIN |
179 LSA_POLICY_SERVER_ADMIN
);
181 const int LSA_POLICY_EXECUTE
=
182 (STANDARD_RIGHTS_EXECUTE_ACCESS |
183 LSA_POLICY_VIEW_LOCAL_INFORMATION |
184 LSA_POLICY_LOOKUP_NAMES
);
186 typedef [public,bitmap32bit
] bitmap
{
187 LSA_ACCOUNT_VIEW
= 0x00000001,
188 LSA_ACCOUNT_ADJUST_PRIVILEGES
= 0x00000002,
189 LSA_ACCOUNT_ADJUST_QUOTAS
= 0x00000004,
190 LSA_ACCOUNT_ADJUST_SYSTEM_ACCESS
= 0x00000008
191 } lsa_AccountAccessMask
;
193 const int LSA_ACCOUNT_ALL_ACCESS
=
194 (STANDARD_RIGHTS_REQUIRED_ACCESS |
196 LSA_ACCOUNT_ADJUST_PRIVILEGES |
197 LSA_ACCOUNT_ADJUST_QUOTAS |
198 LSA_ACCOUNT_ADJUST_SYSTEM_ACCESS
);
200 const int LSA_ACCOUNT_READ
=
201 (STANDARD_RIGHTS_READ_ACCESS |
204 const int LSA_ACCOUNT_WRITE
=
205 (STANDARD_RIGHTS_READ_ACCESS |
206 LSA_ACCOUNT_ADJUST_PRIVILEGES |
207 LSA_ACCOUNT_ADJUST_QUOTAS |
208 LSA_ACCOUNT_ADJUST_SYSTEM_ACCESS
);
210 const int LSA_ACCOUNT_EXECUTE
=
211 (STANDARD_RIGHTS_EXECUTE_ACCESS
);
213 typedef [public,bitmap32bit
] bitmap
{
214 LSA_SECRET_SET_VALUE
= 0x00000001,
215 LSA_SECRET_QUERY_VALUE
= 0x00000002
216 } lsa_SecretAccessMask
;
218 const int LSA_SECRET_ALL_ACCESS
=
219 (LSA_SECRET_QUERY_VALUE |
220 LSA_SECRET_SET_VALUE |
222 STANDARD_RIGHTS_READ_ACCESS |
224 SEC_STD_WRITE_OWNER
); /* 0x000F0003 */
226 const int LSA_SECRET_READ
=
227 (LSA_SECRET_QUERY_VALUE |
228 STANDARD_RIGHTS_READ_ACCESS
); /* 0x00020002 */
230 const int LSA_SECRET_WRITE
=
231 (LSA_SECRET_SET_VALUE |
232 STANDARD_RIGHTS_READ_ACCESS
); /* 0x00020001 */
234 const int LSA_SECRET_EXECUTE
=
235 (STANDARD_RIGHTS_READ_ACCESS
); /* 0x00020000 */
237 typedef [public,bitmap32bit
] bitmap
{
238 LSA_TRUSTED_QUERY_DOMAIN_NAME
= 0x00000001,
239 LSA_TRUSTED_QUERY_CONTROLLERS
= 0x00000002,
240 LSA_TRUSTED_SET_CONTROLLERS
= 0x00000004,
241 LSA_TRUSTED_QUERY_POSIX
= 0x00000008,
242 LSA_TRUSTED_SET_POSIX
= 0x00000010,
243 LSA_TRUSTED_SET_AUTH
= 0x00000020,
244 LSA_TRUSTED_QUERY_AUTH
= 0x00000040
245 } lsa_TrustedAccessMask
;
247 const int LSA_TRUSTED_DOMAIN_ALL_ACCESS
=
248 (LSA_TRUSTED_QUERY_DOMAIN_NAME |
249 LSA_TRUSTED_QUERY_CONTROLLERS |
250 LSA_TRUSTED_SET_CONTROLLERS |
251 LSA_TRUSTED_QUERY_POSIX |
252 LSA_TRUSTED_SET_POSIX |
253 LSA_TRUSTED_SET_AUTH |
254 LSA_TRUSTED_QUERY_AUTH |
256 STANDARD_RIGHTS_READ_ACCESS |
258 SEC_STD_WRITE_OWNER
); /* 0x000F007F */
260 const int LSA_TRUSTED_DOMAIN_READ
=
261 (LSA_TRUSTED_QUERY_DOMAIN_NAME |
262 STANDARD_RIGHTS_READ_ACCESS
); /* 0x00020001 */
264 const int LSA_TRUSTED_DOMAIN_WRITE
=
265 (LSA_TRUSTED_SET_CONTROLLERS |
266 LSA_TRUSTED_SET_POSIX |
267 LSA_TRUSTED_SET_AUTH |
268 STANDARD_RIGHTS_READ_ACCESS
); /* 0x00020034 */
270 const int LSA_TRUSTED_DOMAIN_EXECUTE
=
271 (LSA_TRUSTED_QUERY_DOMAIN_NAME |
272 LSA_TRUSTED_QUERY_POSIX |
273 STANDARD_RIGHTS_READ_ACCESS
); /* 0x0002000C */
276 /* notice the screwup with the system_name - thats why MS created
278 [public] NTSTATUS lsa_OpenPolicy
(
279 [in,unique] uint16
*system_name
,
280 [in] lsa_ObjectAttribute
*attr
,
281 [in] lsa_PolicyAccessMask access_mask
,
282 [out] policy_handle
*handle
292 uint32 maximum_log_size
;
293 hyper retention_time
;
294 uint8 shutdown_in_progress
;
295 hyper time_to_shutdown
;
296 uint32 next_audit_record
;
299 typedef [v1_enum] enum {
300 LSA_AUDIT_POLICY_NONE
=0,
301 LSA_AUDIT_POLICY_SUCCESS
=1,
302 LSA_AUDIT_POLICY_FAILURE
=2,
303 LSA_AUDIT_POLICY_ALL
=(LSA_AUDIT_POLICY_SUCCESS|LSA_AUDIT_POLICY_FAILURE
),
304 LSA_AUDIT_POLICY_CLEAR
=4
305 } lsa_PolicyAuditPolicy
;
308 LSA_AUDIT_CATEGORY_SYSTEM
= 0,
309 LSA_AUDIT_CATEGORY_LOGON
= 1,
310 LSA_AUDIT_CATEGORY_FILE_AND_OBJECT_ACCESS
= 2,
311 LSA_AUDIT_CATEGORY_USE_OF_USER_RIGHTS
= 3,
312 LSA_AUDIT_CATEGORY_PROCCESS_TRACKING
= 4,
313 LSA_AUDIT_CATEGORY_SECURITY_POLICY_CHANGES
= 5,
314 LSA_AUDIT_CATEGORY_ACCOUNT_MANAGEMENT
= 6,
315 LSA_AUDIT_CATEGORY_DIRECTORY_SERVICE_ACCESS
= 7, /* only in win2k/2k3 */
316 LSA_AUDIT_CATEGORY_ACCOUNT_LOGON
= 8 /* only in win2k/2k3 */
317 } lsa_PolicyAuditEventType
;
320 uint32 auditing_mode
;
321 [size_is(count
)] lsa_PolicyAuditPolicy
*settings
;
323 } lsa_AuditEventsInfo
;
326 lsa_StringLarge name
;
334 typedef [v1_enum] enum {
346 } lsa_ReplicaSourceInfo
;
350 uint32 non_paged_pool
;
355 } lsa_DefaultQuotaInfo
;
359 NTTIME_hyper db_create_time
;
360 } lsa_ModificationInfo
;
363 uint8 shutdown_on_full
;
364 } lsa_AuditFullSetInfo
;
367 uint8 shutdown_on_full
;
369 } lsa_AuditFullQueryInfo
;
371 typedef [public] struct {
372 /* it's important that we use the lsa_StringLarge here,
373 * because otherwise windows clients result with such dns hostnames
374 * e.g. w2k3-client.samba4.samba.orgsamba4.samba.org
376 * w2k3-client.samba4.samba.org
378 lsa_StringLarge name
;
379 lsa_StringLarge dns_domain
;
380 lsa_StringLarge dns_forest
;
386 LSA_POLICY_INFO_AUDIT_LOG
=1,
387 LSA_POLICY_INFO_AUDIT_EVENTS
=2,
388 LSA_POLICY_INFO_DOMAIN
=3,
389 LSA_POLICY_INFO_PD
=4,
390 LSA_POLICY_INFO_ACCOUNT_DOMAIN
=5,
391 LSA_POLICY_INFO_ROLE
=6,
392 LSA_POLICY_INFO_REPLICA
=7,
393 LSA_POLICY_INFO_QUOTA
=8,
394 LSA_POLICY_INFO_MOD
=9,
395 LSA_POLICY_INFO_AUDIT_FULL_SET
=10,
396 LSA_POLICY_INFO_AUDIT_FULL_QUERY
=11,
397 LSA_POLICY_INFO_DNS
=12,
398 LSA_POLICY_INFO_DNS_INT
=13,
399 LSA_POLICY_INFO_L_ACCOUNT_DOMAIN
=14
402 typedef [switch_type(uint16
)] union {
403 [case(LSA_POLICY_INFO_AUDIT_LOG
)] lsa_AuditLogInfo audit_log
;
404 [case(LSA_POLICY_INFO_AUDIT_EVENTS
)] lsa_AuditEventsInfo audit_events
;
405 [case(LSA_POLICY_INFO_DOMAIN
)] lsa_DomainInfo domain
;
406 [case(LSA_POLICY_INFO_PD
)] lsa_PDAccountInfo pd
;
407 [case(LSA_POLICY_INFO_ACCOUNT_DOMAIN
)] lsa_DomainInfo account_domain
;
408 [case(LSA_POLICY_INFO_ROLE
)] lsa_ServerRole role
;
409 [case(LSA_POLICY_INFO_REPLICA
)] lsa_ReplicaSourceInfo replica
;
410 [case(LSA_POLICY_INFO_QUOTA
)] lsa_DefaultQuotaInfo quota
;
411 [case(LSA_POLICY_INFO_MOD
)] lsa_ModificationInfo mod
;
412 [case(LSA_POLICY_INFO_AUDIT_FULL_SET
)] lsa_AuditFullSetInfo auditfullset
;
413 [case(LSA_POLICY_INFO_AUDIT_FULL_QUERY
)] lsa_AuditFullQueryInfo auditfullquery
;
414 [case(LSA_POLICY_INFO_DNS
)] lsa_DnsDomainInfo dns
;
415 [case(LSA_POLICY_INFO_DNS_INT
)] lsa_DnsDomainInfo dns
;
416 [case(LSA_POLICY_INFO_L_ACCOUNT_DOMAIN
)] lsa_DomainInfo l_account_domain
;
417 } lsa_PolicyInformation
;
419 NTSTATUS lsa_QueryInfoPolicy
(
420 [in] policy_handle
*handle,
421 [in] lsa_PolicyInfo level
,
422 [out,ref,switch_is(level
)] lsa_PolicyInformation
**info
427 NTSTATUS lsa_SetInfoPolicy
(
428 [in] policy_handle
*handle,
429 [in] lsa_PolicyInfo level
,
430 [in,switch_is(level
)] lsa_PolicyInformation
*info
435 [todo
] NTSTATUS lsa_ClearAuditLog
();
439 [public] NTSTATUS lsa_CreateAccount
(
440 [in] policy_handle
*handle,
441 [in,ref] dom_sid2
*sid
,
442 [in] lsa_AccountAccessMask access_mask
,
443 [out] policy_handle
*acct_handle
447 /* NOTE: This only returns accounts that have at least
455 typedef [public] struct {
456 [range(0,20480)] uint32 num_sids
;
457 [size_is(num_sids
)] lsa_SidPtr
*sids
;
460 [public] NTSTATUS lsa_EnumAccounts
(
461 [in] policy_handle
*handle,
462 [in,out,ref] uint32
*resume_handle
,
463 [out,ref] lsa_SidArray
*sids
,
464 [in,range(0,8192)] uint32 num_entries
467 /*************************************************/
470 [public] NTSTATUS lsa_CreateTrustedDomain
(
471 [in] policy_handle
*policy_handle
,
472 [in] lsa_DomainInfo
*info
,
473 [in] lsa_TrustedAccessMask access_mask
,
474 [out] policy_handle
*trustdom_handle
481 /* w2k3 treats max_size as max_domains*60 */
482 const int LSA_ENUM_TRUST_DOMAIN_MULTIPLIER
= 60;
486 [size_is(count
)] lsa_DomainInfo
*domains
;
489 NTSTATUS lsa_EnumTrustDom
(
490 [in] policy_handle
*handle,
491 [in,out,ref] uint32
*resume_handle
,
492 [out,ref] lsa_DomainList
*domains
,
499 typedef [public] enum {
500 SID_NAME_USE_NONE
= 0,/* NOTUSED */
501 SID_NAME_USER
= 1, /* user */
502 SID_NAME_DOM_GRP
= 2, /* domain group */
503 SID_NAME_DOMAIN
= 3, /* domain: don't know what this is */
504 SID_NAME_ALIAS
= 4, /* local group */
505 SID_NAME_WKN_GRP
= 5, /* well-known group */
506 SID_NAME_DELETED
= 6, /* deleted account: needed for c2 rating */
507 SID_NAME_INVALID
= 7, /* invalid account */
508 SID_NAME_UNKNOWN
= 8, /* oops. */
509 SID_NAME_COMPUTER
= 9, /* machine */
510 SID_NAME_LABEL
= 10 /* Mandatory Label */
514 lsa_SidType sid_type
;
520 [range(0,1000)] uint32 count
;
521 [size_is(count
)] lsa_TranslatedSid
*sids
;
524 const int LSA_REF_DOMAIN_LIST_MULTIPLIER
= 32;
525 typedef [public] struct {
526 [range(0,1000)] uint32 count
;
527 [size_is(count
)] lsa_DomainInfo
*domains
;
531 /* Level 1: Ask everywhere
532 * Level 2: Ask domain and trusted domains, no builtin and wkn
533 * Level 3: Only ask domain
534 * Level 4: W2k3ad: Only ask AD trusts
535 * Level 5: Only ask transitive forest trusts
539 typedef [public] enum {
540 LSA_LOOKUP_NAMES_ALL
= 1,
541 LSA_LOOKUP_NAMES_DOMAINS_ONLY
= 2,
542 LSA_LOOKUP_NAMES_PRIMARY_DOMAIN_ONLY
= 3,
543 LSA_LOOKUP_NAMES_UPLEVEL_TRUSTS_ONLY
= 4,
544 LSA_LOOKUP_NAMES_FOREST_TRUSTS_ONLY
= 5,
545 LSA_LOOKUP_NAMES_UPLEVEL_TRUSTS_ONLY2
= 6,
546 LSA_LOOKUP_NAMES_RODC_REFERRAL_TO_FULL_DC
= 7
547 } lsa_LookupNamesLevel
;
549 [public] NTSTATUS lsa_LookupNames
(
550 [in] policy_handle
*handle,
551 [in,range(0,1000)] uint32 num_names
,
552 [in,size_is(num_names
)] lsa_String names
[],
553 [out,ref] lsa_RefDomainList
**domains
,
554 [in,out,ref] lsa_TransSidArray
*sids
,
555 [in] lsa_LookupNamesLevel level
,
556 [in,out,ref] uint32
*count
564 lsa_SidType sid_type
;
567 } lsa_TranslatedName
;
569 typedef [public] struct {
570 [range(0,20480)] uint32 count
;
571 [size_is(count
)] lsa_TranslatedName
*names
;
572 } lsa_TransNameArray
;
574 [public] NTSTATUS lsa_LookupSids
(
575 [in] policy_handle
*handle,
576 [in,ref] lsa_SidArray
*sids
,
577 [out,ref] lsa_RefDomainList
**domains
,
578 [in,out,ref] lsa_TransNameArray
*names
,
579 [in] lsa_LookupNamesLevel level
,
580 [in,out,ref] uint32
*count
585 [public] NTSTATUS lsa_CreateSecret
(
586 [in] policy_handle
*handle,
587 [in] lsa_String name
,
588 [in] lsa_SecretAccessMask access_mask
,
589 [out] policy_handle
*sec_handle
593 /*****************************************/
595 NTSTATUS lsa_OpenAccount
(
596 [in] policy_handle
*handle,
597 [in,ref] dom_sid2
*sid
,
598 [in] lsa_AccountAccessMask access_mask
,
599 [out] policy_handle
*acct_handle
603 /****************************************/
612 [range(0,1000)] uint32 count
;
614 [size_is(count
)] lsa_LUIDAttribute set
[*];
617 NTSTATUS lsa_EnumPrivsAccount
(
618 [in] policy_handle
*handle,
619 [out,ref] lsa_PrivilegeSet
**privs
623 /****************************************/
625 NTSTATUS lsa_AddPrivilegesToAccount
(
626 [in] policy_handle
*handle,
627 [in,ref] lsa_PrivilegeSet
*privs
631 /****************************************/
633 NTSTATUS lsa_RemovePrivilegesFromAccount
(
634 [in] policy_handle
*handle,
635 [in] uint8 remove_all
,
636 [in,unique] lsa_PrivilegeSet
*privs
640 [todo
] NTSTATUS lsa_GetQuotasForAccount
();
643 [todo
] NTSTATUS lsa_SetQuotasForAccount
();
646 NTSTATUS lsa_GetSystemAccessAccount
(
647 [in] policy_handle
*handle,
648 [out,ref] lsa_AccountAccessMask
*access_mask
652 NTSTATUS lsa_SetSystemAccessAccount
(
653 [in] policy_handle
*handle,
654 [in] lsa_AccountAccessMask access_mask
658 NTSTATUS lsa_OpenTrustedDomain
(
659 [in] policy_handle
*handle,
661 [in] lsa_TrustedAccessMask access_mask
,
662 [out] policy_handle
*trustdom_handle
665 typedef [flag
(NDR_PAHEX
)] struct {
668 [size_is(size
),length_is(length
)] uint8
*data
;
671 typedef [flag
(NDR_PAHEX
)] struct {
672 [range(0,65536)] uint32 size
;
673 [size_is(size
)] uint8
*data
;
677 LSA_TRUSTED_DOMAIN_INFO_NAME
= 1,
678 LSA_TRUSTED_DOMAIN_INFO_CONTROLLERS
= 2,
679 LSA_TRUSTED_DOMAIN_INFO_POSIX_OFFSET
= 3,
680 LSA_TRUSTED_DOMAIN_INFO_PASSWORD
= 4,
681 LSA_TRUSTED_DOMAIN_INFO_BASIC
= 5,
682 LSA_TRUSTED_DOMAIN_INFO_INFO_EX
= 6,
683 LSA_TRUSTED_DOMAIN_INFO_AUTH_INFO
= 7,
684 LSA_TRUSTED_DOMAIN_INFO_FULL_INFO
= 8,
685 LSA_TRUSTED_DOMAIN_INFO_AUTH_INFO_INTERNAL
= 9,
686 LSA_TRUSTED_DOMAIN_INFO_FULL_INFO_INTERNAL
= 10,
687 LSA_TRUSTED_DOMAIN_INFO_INFO_EX2_INTERNAL
= 11,
688 LSA_TRUSTED_DOMAIN_INFO_FULL_INFO_2_INTERNAL
= 12,
689 LSA_TRUSTED_DOMAIN_SUPPORTED_ENCRYPTION_TYPES
= 13
690 } lsa_TrustDomInfoEnum
;
692 typedef [public,bitmap32bit
] bitmap
{
693 LSA_TRUST_DIRECTION_INBOUND
= 0x00000001,
694 LSA_TRUST_DIRECTION_OUTBOUND
= 0x00000002
695 } lsa_TrustDirection
;
697 typedef [public,v1_enum] enum {
698 LSA_TRUST_TYPE_DOWNLEVEL
= 0x00000001,
699 LSA_TRUST_TYPE_UPLEVEL
= 0x00000002,
700 LSA_TRUST_TYPE_MIT
= 0x00000003,
701 LSA_TRUST_TYPE_DCE
= 0x00000004
704 typedef [public,bitmap32bit
] bitmap
{
705 LSA_TRUST_ATTRIBUTE_NON_TRANSITIVE
= 0x00000001,
706 LSA_TRUST_ATTRIBUTE_UPLEVEL_ONLY
= 0x00000002,
707 LSA_TRUST_ATTRIBUTE_QUARANTINED_DOMAIN
= 0x00000004,
708 LSA_TRUST_ATTRIBUTE_FOREST_TRANSITIVE
= 0x00000008,
709 LSA_TRUST_ATTRIBUTE_CROSS_ORGANIZATION
= 0x00000010,
710 LSA_TRUST_ATTRIBUTE_WITHIN_FOREST
= 0x00000020,
711 LSA_TRUST_ATTRIBUTE_TREAT_AS_EXTERNAL
= 0x00000040,
712 LSA_TRUST_ATTRIBUTE_USES_RC4_ENCRYPTION
= 0x00000080,
713 LSA_TRUST_ATTRIBUTE_CROSS_ORGANIZATION_NO_TGT_DELEGATION
= 0x00000200,
714 LSA_TRUST_ATTRIBUTE_PIM_TRUST
= 0x00000400,
715 LSA_TRUST_ATTRIBUTE_CROSS_ORGANIZATION_ENABLE_TGT_DELEGATION
= 0x00000800
716 } lsa_TrustAttributes
;
719 lsa_StringLarge netbios_name
;
720 } lsa_TrustDomainInfoName
;
725 [size_is(entries
)] lsa_StringLarge
*netbios_names
;
726 } lsa_TrustDomainInfoControllers
;
730 } lsa_TrustDomainInfoPosixOffset
;
733 lsa_DATA_BUF
*password
;
734 lsa_DATA_BUF
*old_password
;
735 } lsa_TrustDomainInfoPassword
;
738 lsa_String netbios_name
;
740 } lsa_TrustDomainInfoBasic
;
742 typedef [public] struct {
743 lsa_StringLarge domain_name
;
744 lsa_StringLarge netbios_name
;
746 lsa_TrustDirection trust_direction
;
747 lsa_TrustType trust_type
;
748 lsa_TrustAttributes trust_attributes
;
749 } lsa_TrustDomainInfoInfoEx
;
751 typedef [public,v1_enum] enum {
752 TRUST_AUTH_TYPE_NONE
= 0,
753 TRUST_AUTH_TYPE_NT4OWF
= 1,
754 TRUST_AUTH_TYPE_CLEAR
= 2,
755 TRUST_AUTH_TYPE_VERSION
= 3
759 NTTIME_hyper last_update_time
;
760 lsa_TrustAuthType AuthType
;
762 } lsa_TrustDomainInfoBuffer
;
764 typedef [public] struct {
765 uint32 incoming_count
;
766 lsa_TrustDomainInfoBuffer
*incoming_current_auth_info
;
767 lsa_TrustDomainInfoBuffer
*incoming_previous_auth_info
;
768 uint32 outgoing_count
;
769 lsa_TrustDomainInfoBuffer
*outgoing_current_auth_info
;
770 lsa_TrustDomainInfoBuffer
*outgoing_previous_auth_info
;
771 } lsa_TrustDomainInfoAuthInfo
;
774 lsa_TrustDomainInfoInfoEx info_ex
;
775 lsa_TrustDomainInfoPosixOffset posix_offset
;
776 lsa_TrustDomainInfoAuthInfo auth_info
;
777 } lsa_TrustDomainInfoFullInfo
;
780 lsa_DATA_BUF2 auth_blob
;
781 } lsa_TrustDomainInfoAuthInfoInternal
;
784 lsa_TrustDomainInfoInfoEx info_ex
;
785 lsa_TrustDomainInfoPosixOffset posix_offset
;
786 lsa_TrustDomainInfoAuthInfoInternal auth_info
;
787 } lsa_TrustDomainInfoFullInfoInternal
;
790 lsa_TrustDomainInfoInfoEx info_ex
;
791 uint32 forest_trust_length
;
792 [size_is(forest_trust_length
)] uint8
*forest_trust_data
;
793 } lsa_TrustDomainInfoInfoEx2Internal
;
796 lsa_TrustDomainInfoInfoEx2Internal info
;
797 lsa_TrustDomainInfoPosixOffset posix_offset
;
798 lsa_TrustDomainInfoAuthInfo auth_info
;
799 } lsa_TrustDomainInfoFullInfo2Internal
;
802 kerb_EncTypes enc_types
;
803 } lsa_TrustDomainInfoSupportedEncTypes
;
805 typedef [switch_type(lsa_TrustDomInfoEnum
)] union {
806 [case(LSA_TRUSTED_DOMAIN_INFO_NAME
)]
807 lsa_TrustDomainInfoName name
;
808 [case(LSA_TRUSTED_DOMAIN_INFO_CONTROLLERS
)]
809 lsa_TrustDomainInfoControllers controllers
;
810 [case(LSA_TRUSTED_DOMAIN_INFO_POSIX_OFFSET
)]
811 lsa_TrustDomainInfoPosixOffset posix_offset
;
812 [case(LSA_TRUSTED_DOMAIN_INFO_PASSWORD
)]
813 lsa_TrustDomainInfoPassword password
;
814 [case(LSA_TRUSTED_DOMAIN_INFO_BASIC
)]
815 lsa_TrustDomainInfoBasic info_basic
;
816 [case(LSA_TRUSTED_DOMAIN_INFO_INFO_EX
)]
817 lsa_TrustDomainInfoInfoEx info_ex
;
818 [case(LSA_TRUSTED_DOMAIN_INFO_AUTH_INFO
)]
819 lsa_TrustDomainInfoAuthInfo auth_info
;
820 [case(LSA_TRUSTED_DOMAIN_INFO_FULL_INFO
)]
821 lsa_TrustDomainInfoFullInfo full_info
;
822 [case(LSA_TRUSTED_DOMAIN_INFO_AUTH_INFO_INTERNAL
)]
823 lsa_TrustDomainInfoAuthInfoInternal auth_info_internal
;
824 [case(LSA_TRUSTED_DOMAIN_INFO_FULL_INFO_INTERNAL
)]
825 lsa_TrustDomainInfoFullInfoInternal full_info_internal
;
826 [case(LSA_TRUSTED_DOMAIN_INFO_INFO_EX2_INTERNAL
)]
827 lsa_TrustDomainInfoInfoEx2Internal info_ex2_internal
;
828 [case(LSA_TRUSTED_DOMAIN_INFO_FULL_INFO_2_INTERNAL
)]
829 lsa_TrustDomainInfoFullInfo2Internal full_info2_internal
;
830 [case(LSA_TRUSTED_DOMAIN_SUPPORTED_ENCRYPTION_TYPES
)]
831 lsa_TrustDomainInfoSupportedEncTypes enc_types
;
832 } lsa_TrustedDomainInfo
;
835 NTSTATUS lsa_QueryTrustedDomainInfo
(
836 [in] policy_handle
*trustdom_handle
,
837 [in] lsa_TrustDomInfoEnum level
,
838 [out,switch_is(level
),ref] lsa_TrustedDomainInfo
**info
842 NTSTATUS lsa_SetInformationTrustedDomain
(
843 [in] policy_handle
*trustdom_handle
,
844 [in] lsa_TrustDomInfoEnum level
,
845 [in,switch_is(level
)] lsa_TrustedDomainInfo
*info
849 [public] NTSTATUS lsa_OpenSecret
(
850 [in] policy_handle
*handle,
851 [in] lsa_String name
,
852 [in] lsa_SecretAccessMask access_mask
,
853 [out] policy_handle
*sec_handle
858 [public] NTSTATUS lsa_SetSecret
(
859 [in] policy_handle
*sec_handle
,
860 [in,unique] lsa_DATA_BUF
*new_val
,
861 [in,unique] lsa_DATA_BUF
*old_val
869 [public] NTSTATUS lsa_QuerySecret
(
870 [in] policy_handle
*sec_handle
,
871 [in,out,unique] lsa_DATA_BUF_PTR
*new_val
,
872 [in,out,unique] NTTIME_hyper
*new_mtime
,
873 [in,out,unique] lsa_DATA_BUF_PTR
*old_val
,
874 [in,out,unique] NTTIME_hyper
*old_mtime
878 NTSTATUS lsa_LookupPrivValue
(
879 [in] policy_handle
*handle,
880 [in,ref] lsa_String
*name
,
881 [out,ref] lsa_LUID
*luid
886 NTSTATUS lsa_LookupPrivName
(
887 [in] policy_handle
*handle,
888 [in,ref] lsa_LUID
*luid
,
889 [out,ref] lsa_StringLarge
**name
893 /*******************/
895 NTSTATUS lsa_LookupPrivDisplayName
(
896 [in] policy_handle
*handle,
897 [in,ref] lsa_String
*name
,
898 [in] uint16 language_id
,
899 [in] uint16 language_id_sys
,
900 [out,ref] lsa_StringLarge
**disp_name
,
901 /* see http://www.microsoft.com/globaldev/nlsweb/ for
902 language definitions */
903 [out,ref] uint16
*returned_language_id
906 /*******************/
908 NTSTATUS lsa_DeleteObject
(
909 [in,out] policy_handle
*handle
912 /*******************/
914 NTSTATUS lsa_EnumAccountsWithUserRight
(
915 [in] policy_handle
*handle,
916 [in,unique] lsa_String
*name
,
917 [out] lsa_SidArray
*sids
922 [string,charset
(UTF16
)] uint16
*name
;
923 } lsa_RightAttribute
;
926 [range(0,256)] uint32 count
;
927 [size_is(count
)] lsa_StringLarge
*names
;
930 NTSTATUS lsa_EnumAccountRights
(
931 [in] policy_handle
*handle,
932 [in,ref] dom_sid2
*sid
,
933 [out,ref] lsa_RightSet
*rights
937 /**********************/
939 NTSTATUS lsa_AddAccountRights
(
940 [in] policy_handle
*handle,
941 [in,ref] dom_sid2
*sid
,
942 [in,ref] lsa_RightSet
*rights
945 /**********************/
947 NTSTATUS lsa_RemoveAccountRights
(
948 [in] policy_handle
*handle,
949 [in,ref] dom_sid2
*sid
,
950 [in] uint8 remove_all
,
951 [in,ref] lsa_RightSet
*rights
955 NTSTATUS lsa_QueryTrustedDomainInfoBySid
(
956 [in] policy_handle
*handle,
957 [in,ref] dom_sid2
*dom_sid
,
958 [in] lsa_TrustDomInfoEnum level
,
959 [out,switch_is(level
),ref] lsa_TrustedDomainInfo
**info
963 NTSTATUS lsa_SetTrustedDomainInfo
(
964 [in] policy_handle
*handle,
965 [in] dom_sid2
*dom_sid
,
966 [in] lsa_TrustDomInfoEnum level
,
967 [in,switch_is(level
)] lsa_TrustedDomainInfo
*info
971 NTSTATUS lsa_DeleteTrustedDomain
(
972 [in] policy_handle
*handle,
973 [in] dom_sid2
*dom_sid
977 NTSTATUS lsa_StorePrivateData
(
978 [in] policy_handle
*handle,
979 [in,ref] lsa_String
*name
,
980 [in,unique] lsa_DATA_BUF
*val
984 NTSTATUS lsa_RetrievePrivateData
(
985 [in] policy_handle
*handle,
986 [in,ref] lsa_String
*name
,
987 [in,out,ref] lsa_DATA_BUF
**val
990 /**********************/
992 [public] NTSTATUS lsa_OpenPolicy2
(
993 [in,unique] [string,charset
(UTF16
)] uint16
*system_name
,
994 [in] lsa_ObjectAttribute
*attr
,
995 [in] lsa_PolicyAccessMask access_mask
,
996 [out] policy_handle
*handle
999 /**********************/
1000 /* Function: 0x2d */
1001 NTSTATUS lsa_GetUserName
(
1002 [in,unique] [string,charset
(UTF16
)] uint16
*system_name
,
1003 [in,out,ref] lsa_String
**account_name
,
1004 [in,out,unique] lsa_String
**authority_name
1007 /**********************/
1008 /* Function: 0x2e */
1010 NTSTATUS lsa_QueryInfoPolicy2
(
1011 [in] policy_handle
*handle,
1012 [in] lsa_PolicyInfo level
,
1013 [out,ref,switch_is(level
)] lsa_PolicyInformation
**info
1017 NTSTATUS lsa_SetInfoPolicy2
(
1018 [in] policy_handle
*handle,
1019 [in] lsa_PolicyInfo level
,
1020 [in,switch_is(level
)] lsa_PolicyInformation
*info
1023 /**********************/
1025 NTSTATUS lsa_QueryTrustedDomainInfoByName
(
1026 [in] policy_handle
*handle,
1027 [in,ref] lsa_String
*trusted_domain
,
1028 [in] lsa_TrustDomInfoEnum level
,
1029 [out,ref,switch_is(level
)] lsa_TrustedDomainInfo
**info
1032 /**********************/
1034 [public] NTSTATUS lsa_SetTrustedDomainInfoByName
(
1035 [in] policy_handle
*handle,
1036 [in,ref] lsa_String
*trusted_domain
,
1037 [in] lsa_TrustDomInfoEnum level
,
1038 [in,ref,switch_is(level
)] lsa_TrustedDomainInfo
*info
1043 /* w2k3 treats max_size as max_domains*82 */
1044 const int LSA_ENUM_TRUST_DOMAIN_EX_MULTIPLIER
= 82;
1048 [size_is(count
)] lsa_TrustDomainInfoInfoEx
*domains
;
1051 NTSTATUS lsa_EnumTrustedDomainsEx
(
1052 [in] policy_handle
*handle,
1053 [in,out] uint32
*resume_handle
,
1054 [out] lsa_DomainListEx
*domains
,
1055 [in] uint32 max_size
1059 NTSTATUS lsa_CreateTrustedDomainEx
(
1060 [in] policy_handle
*policy_handle
,
1061 [in] lsa_TrustDomainInfoInfoEx
*info
,
1062 [in] lsa_TrustDomainInfoAuthInfo
*auth_info
,
1063 [in] lsa_TrustedAccessMask access_mask
,
1064 [out] policy_handle
*trustdom_handle
1069 NTSTATUS lsa_CloseTrustedDomainEx
(
1070 [in,out] policy_handle
*handle
1074 typedef [bitmap32bit
] bitmap
{
1075 LSA_POLICY_KERBEROS_VALIDATE_CLIENT
= 0x00000080
1076 } lsa_krbAuthenticationOptions
;
1078 /* w2k3 returns either 0x000bbbd000000000 or 0x000a48e800000000
1079 for reserved - gd */
1081 lsa_krbAuthenticationOptions authentication_options
;
1082 hyper service_tkt_lifetime
;
1083 hyper user_tkt_lifetime
;
1084 hyper user_tkt_renewaltime
;
1087 } lsa_DomainInfoKerberos
;
1091 [size_is(blob_size
)] uint8
*efs_blob
;
1092 } lsa_DomainInfoEfs
;
1095 LSA_DOMAIN_INFO_POLICY_EFS
=2,
1096 LSA_DOMAIN_INFO_POLICY_KERBEROS
=3
1097 } lsa_DomainInfoEnum
;
1099 typedef [switch_type(uint16
)] union {
1100 [case(LSA_DOMAIN_INFO_POLICY_EFS
)] lsa_DomainInfoEfs efs_info
;
1101 [case(LSA_DOMAIN_INFO_POLICY_KERBEROS
)] lsa_DomainInfoKerberos kerberos_info
;
1102 } lsa_DomainInformationPolicy
;
1104 NTSTATUS lsa_QueryDomainInformationPolicy
(
1105 [in] policy_handle
*handle,
1107 [out,ref,switch_is(level
)] lsa_DomainInformationPolicy
**info
1111 NTSTATUS lsa_SetDomainInformationPolicy
(
1112 [in] policy_handle
*handle,
1114 [in,unique,switch_is(level
)] lsa_DomainInformationPolicy
*info
1117 /**********************/
1119 NTSTATUS lsa_OpenTrustedDomainByName
(
1120 [in] policy_handle
*handle,
1121 [in] lsa_String name
,
1122 [in] lsa_TrustedAccessMask access_mask
,
1123 [out] policy_handle
*trustdom_handle
1127 [todo
] NTSTATUS lsa_TestCall
();
1129 /**********************/
1133 lsa_SidType sid_type
;
1137 } lsa_TranslatedName2
;
1140 [range(0,1000)] uint32 count
;
1141 [size_is(count
)] lsa_TranslatedName2
*names
;
1142 } lsa_TransNameArray2
;
1144 typedef [v1_enum] enum {
1145 LSA_LOOKUP_OPTION_SEARCH_ISOLATED_NAMES
= 0x00000000,
1146 LSA_LOOKUP_OPTION_SEARCH_ISOLATED_NAMES_LOCAL
= 0x80000000
1147 } lsa_LookupOptions
;
1149 typedef [v1_enum] enum {
1150 LSA_CLIENT_REVISION_1
= 0x00000001,
1151 LSA_CLIENT_REVISION_2
= 0x00000002
1152 } lsa_ClientRevision
;
1154 [public] NTSTATUS lsa_LookupSids2
(
1155 [in] policy_handle
*handle,
1156 [in,ref] lsa_SidArray
*sids
,
1157 [out,ref] lsa_RefDomainList
**domains
,
1158 [in,out,ref] lsa_TransNameArray2
*names
,
1159 [in] lsa_LookupNamesLevel level
,
1160 [in,out,ref] uint32
*count
,
1161 [in] lsa_LookupOptions lookup_options
,
1162 [in] lsa_ClientRevision client_revision
1165 /**********************/
1169 lsa_SidType sid_type
;
1173 } lsa_TranslatedSid2
;
1176 [range(0,1000)] uint32 count
;
1177 [size_is(count
)] lsa_TranslatedSid2
*sids
;
1178 } lsa_TransSidArray2
;
1180 [public] NTSTATUS lsa_LookupNames2
(
1181 [in] policy_handle
*handle,
1182 [in,range(0,1000)] uint32 num_names
,
1183 [in,size_is(num_names
)] lsa_String names
[],
1184 [out,ref] lsa_RefDomainList
**domains
,
1185 [in,out,ref] lsa_TransSidArray2
*sids
,
1186 [in] lsa_LookupNamesLevel level
,
1187 [in,out,ref] uint32
*count
,
1188 [in] lsa_LookupOptions lookup_options
,
1189 [in] lsa_ClientRevision client_revision
1193 NTSTATUS lsa_CreateTrustedDomainEx2
(
1194 [in] policy_handle
*policy_handle
,
1195 [in] lsa_TrustDomainInfoInfoEx
*info
,
1196 [in] lsa_TrustDomainInfoAuthInfoInternal
*auth_info_internal
,
1197 [in] lsa_TrustedAccessMask access_mask
,
1198 [out] policy_handle
*trustdom_handle
1202 [todo
] NTSTATUS lsa_CREDRWRITE
();
1205 [todo
] NTSTATUS lsa_CREDRREAD
();
1208 [todo
] NTSTATUS lsa_CREDRENUMERATE
();
1211 [todo
] NTSTATUS lsa_CREDRWRITEDOMAINCREDENTIALS
();
1214 [todo
] NTSTATUS lsa_CREDRREADDOMAINCREDENTIALS
();
1217 [todo
] NTSTATUS lsa_CREDRDELETE
();
1220 [todo
] NTSTATUS lsa_CREDRGETTARGETINFO
();
1223 [todo
] NTSTATUS lsa_CREDRPROFILELOADED
();
1225 /**********************/
1228 lsa_SidType sid_type
;
1232 } lsa_TranslatedSid3
;
1235 [range(0,1000)] uint32 count
;
1236 [size_is(count
)] lsa_TranslatedSid3
*sids
;
1237 } lsa_TransSidArray3
;
1239 [public] NTSTATUS lsa_LookupNames3
(
1240 [in] policy_handle
*handle,
1241 [in,range(0,1000)] uint32 num_names
,
1242 [in,size_is(num_names
)] lsa_String names
[],
1243 [out,ref] lsa_RefDomainList
**domains
,
1244 [in,out,ref] lsa_TransSidArray3
*sids
,
1245 [in] lsa_LookupNamesLevel level
,
1246 [in,out,ref] uint32
*count
,
1247 [in] lsa_LookupOptions lookup_options
,
1248 [in] lsa_ClientRevision client_revision
1252 [todo
] NTSTATUS lsa_CREDRGETSESSIONTYPES
();
1255 [todo
] NTSTATUS lsa_LSARREGISTERAUDITEVENT
();
1258 [todo
] NTSTATUS lsa_LSARGENAUDITEVENT
();
1261 [todo
] NTSTATUS lsa_LSARUNREGISTERAUDITEVENT
();
1264 typedef [bitmap32bit
,public] bitmap
{
1265 /* these apply to LSA_FOREST_TRUST_TOP_LEVEL_NAME */
1266 LSA_TLN_DISABLED_NEW
= 0x00000001,
1267 LSA_TLN_DISABLED_ADMIN
= 0x00000002,
1268 LSA_TLN_DISABLED_CONFLICT
= 0x00000004,
1270 /* these apply to LSA_FOREST_TRUST_DOMAIN_INFO */
1271 LSA_SID_DISABLED_ADMIN
= 0x00000001,
1272 LSA_SID_DISABLED_CONFLICT
= 0x00000002,
1273 LSA_NB_DISABLED_ADMIN
= 0x00000004,
1274 LSA_NB_DISABLED_CONFLICT
= 0x00000008
1275 } lsa_ForestTrustRecordFlags
;
1277 const uint32 LSA_TLN_DISABLED_MASK
= (
1278 LSA_TLN_DISABLED_NEW |
1279 LSA_TLN_DISABLED_ADMIN |
1280 LSA_TLN_DISABLED_CONFLICT
);
1281 const uint32 LSA_SID_DISABLED_MASK
= (
1282 LSA_SID_DISABLED_ADMIN |
1283 LSA_SID_DISABLED_CONFLICT
);
1284 const uint32 LSA_NB_DISABLED_MASK
= (
1285 LSA_NB_DISABLED_ADMIN |
1286 LSA_NB_DISABLED_CONFLICT
);
1289 LSA_FOREST_TRUST_TOP_LEVEL_NAME
= 0,
1290 LSA_FOREST_TRUST_TOP_LEVEL_NAME_EX
= 1,
1291 LSA_FOREST_TRUST_DOMAIN_INFO
= 2,
1292 LSA_FOREST_TRUST_RECORD_TYPE_LAST
= 3
1293 } lsa_ForestTrustRecordType
;
1296 [range(0,131072)] uint3264 length
;
1297 [size_is(length
)] uint8
*data
;
1298 } lsa_ForestTrustBinaryData
;
1301 dom_sid2
*domain_sid
;
1302 lsa_StringLarge dns_domain_name
;
1303 lsa_StringLarge netbios_domain_name
;
1304 } lsa_ForestTrustDomainInfo
;
1306 typedef [switch_type(lsa_ForestTrustRecordType
)] union {
1307 [case(LSA_FOREST_TRUST_TOP_LEVEL_NAME
)] lsa_StringLarge top_level_name
;
1308 [case(LSA_FOREST_TRUST_TOP_LEVEL_NAME_EX
)] lsa_StringLarge top_level_name_ex
;
1309 [case(LSA_FOREST_TRUST_DOMAIN_INFO
)] lsa_ForestTrustDomainInfo domain_info
;
1310 [default] lsa_ForestTrustBinaryData data
;
1311 } lsa_ForestTrustData
;
1314 lsa_ForestTrustRecordFlags flags
;
1315 lsa_ForestTrustRecordType type
;
1317 [switch_is(type
)] lsa_ForestTrustData forest_trust_data
;
1318 } lsa_ForestTrustRecord
;
1320 typedef [public] struct {
1321 [range(0,4000)] uint32 count
;
1322 [size_is(count
)] lsa_ForestTrustRecord
**entries
;
1323 } lsa_ForestTrustInformation
;
1325 [public] NTSTATUS lsa_lsaRQueryForestTrustInformation
(
1326 [in] policy_handle
*handle,
1327 [in,ref] lsa_String
*trusted_domain_name
,
1328 [in] lsa_ForestTrustRecordType highest_record_type
,
1329 [out,ref] lsa_ForestTrustInformation
**forest_trust_info
1335 typedef [v1_enum] enum {
1336 LSA_FOREST_TRUST_COLLISION_TDO
= 0,
1337 LSA_FOREST_TRUST_COLLISION_XREF
= 1,
1338 LSA_FOREST_TRUST_COLLISION_OTHER
= 2
1339 } lsa_ForestTrustCollisionRecordType
;
1341 typedef [public] struct {
1343 lsa_ForestTrustCollisionRecordType type
;
1344 lsa_ForestTrustRecordFlags flags
;
1346 } lsa_ForestTrustCollisionRecord
;
1348 typedef [public] struct {
1350 [size_is(count
)] lsa_ForestTrustCollisionRecord
**entries
;
1351 } lsa_ForestTrustCollisionInfo
;
1353 [public] NTSTATUS lsa_lsaRSetForestTrustInformation
(
1354 [in] policy_handle
*handle,
1355 [in,ref] lsa_StringLarge
*trusted_domain_name
,
1356 [in] lsa_ForestTrustRecordType highest_record_type
,
1357 [in,ref] lsa_ForestTrustInformation
*forest_trust_info
,
1358 [in] boolean8 check_only
,
1359 [out,ref] lsa_ForestTrustCollisionInfo
**collision_info
1363 [todo
] NTSTATUS lsa_CREDRRENAME
();
1368 [public] NTSTATUS lsa_LookupSids3
(
1369 [in,ref] lsa_SidArray
*sids
,
1370 [out,ref] lsa_RefDomainList
**domains
,
1371 [in,out,ref] lsa_TransNameArray2
*names
,
1372 [in] lsa_LookupNamesLevel level
,
1373 [in,out,ref] uint32
*count
,
1374 [in] lsa_LookupOptions lookup_options
,
1375 [in] lsa_ClientRevision client_revision
1378 const int LSA_CLIENT_REVISION_NO_DNS
= 0x00000001;
1379 const int LSA_CLIENT_REVISION_DNS
= 0x00000002;
1381 const int LSA_LOOKUP_OPTIONS_NO_ISOLATED
= 0x80000000;
1384 NTSTATUS lsa_LookupNames4
(
1385 [in,range(0,1000)] uint32 num_names
,
1386 [in,size_is(num_names
)] lsa_String names
[],
1387 [out,ref] lsa_RefDomainList
**domains
,
1388 [in,out,ref] lsa_TransSidArray3
*sids
,
1389 [in] lsa_LookupNamesLevel level
,
1390 [in,out,ref] uint32
*count
,
1391 [in] lsa_LookupOptions lookup_options
,
1392 [in] lsa_ClientRevision client_revision
1396 [todo
] NTSTATUS lsa_LSAROPENPOLICYSCE
();
1399 [todo
] NTSTATUS lsa_LSARADTREGISTERSECURITYEVENTSOURCE
();
1402 [todo
] NTSTATUS lsa_LSARADTUNREGISTERSECURITYEVENTSOURCE
();
1405 [todo
] NTSTATUS lsa_LSARADTREPORTSECURITYEVENT
();