2 * Unix SMB/CIFS implementation.
3 * client auto-generated by pidl. DO NOT MODIFY!
7 #include "../librpc/gen_ndr/cli_lsa.h"
9 NTSTATUS
rpccli_lsa_Close(struct rpc_pipe_client
*cli
,
11 struct policy_handle
*handle
/* [in,out] [ref] */)
19 if (DEBUGLEVEL
>= 10) {
20 NDR_PRINT_IN_DEBUG(lsa_Close
, &r
);
23 status
= cli
->dispatch(cli
,
29 if (!NT_STATUS_IS_OK(status
)) {
33 if (DEBUGLEVEL
>= 10) {
34 NDR_PRINT_OUT_DEBUG(lsa_Close
, &r
);
37 if (NT_STATUS_IS_ERR(status
)) {
41 /* Return variables */
42 *handle
= *r
.out
.handle
;
48 NTSTATUS
rpccli_lsa_Delete(struct rpc_pipe_client
*cli
,
50 struct policy_handle
*handle
/* [in] [ref] */)
58 if (DEBUGLEVEL
>= 10) {
59 NDR_PRINT_IN_DEBUG(lsa_Delete
, &r
);
62 status
= cli
->dispatch(cli
,
68 if (!NT_STATUS_IS_OK(status
)) {
72 if (DEBUGLEVEL
>= 10) {
73 NDR_PRINT_OUT_DEBUG(lsa_Delete
, &r
);
76 if (NT_STATUS_IS_ERR(status
)) {
80 /* Return variables */
86 NTSTATUS
rpccli_lsa_EnumPrivs(struct rpc_pipe_client
*cli
,
88 struct policy_handle
*handle
/* [in] [ref] */,
89 uint32_t *resume_handle
/* [in,out] [ref] */,
90 struct lsa_PrivArray
*privs
/* [out] [ref] */,
91 uint32_t max_count
/* [in] */)
93 struct lsa_EnumPrivs r
;
98 r
.in
.resume_handle
= resume_handle
;
99 r
.in
.max_count
= max_count
;
101 if (DEBUGLEVEL
>= 10) {
102 NDR_PRINT_IN_DEBUG(lsa_EnumPrivs
, &r
);
105 status
= cli
->dispatch(cli
,
111 if (!NT_STATUS_IS_OK(status
)) {
115 if (DEBUGLEVEL
>= 10) {
116 NDR_PRINT_OUT_DEBUG(lsa_EnumPrivs
, &r
);
119 if (NT_STATUS_IS_ERR(status
)) {
123 /* Return variables */
124 *resume_handle
= *r
.out
.resume_handle
;
125 *privs
= *r
.out
.privs
;
131 NTSTATUS
rpccli_lsa_QuerySecurity(struct rpc_pipe_client
*cli
,
133 struct policy_handle
*handle
/* [in] [ref] */,
134 uint32_t sec_info
/* [in] */,
135 struct sec_desc_buf
**sdbuf
/* [out] [ref] */)
137 struct lsa_QuerySecurity r
;
141 r
.in
.handle
= handle
;
142 r
.in
.sec_info
= sec_info
;
144 if (DEBUGLEVEL
>= 10) {
145 NDR_PRINT_IN_DEBUG(lsa_QuerySecurity
, &r
);
148 status
= cli
->dispatch(cli
,
151 NDR_LSA_QUERYSECURITY
,
154 if (!NT_STATUS_IS_OK(status
)) {
158 if (DEBUGLEVEL
>= 10) {
159 NDR_PRINT_OUT_DEBUG(lsa_QuerySecurity
, &r
);
162 if (NT_STATUS_IS_ERR(status
)) {
166 /* Return variables */
167 *sdbuf
= *r
.out
.sdbuf
;
173 NTSTATUS
rpccli_lsa_SetSecObj(struct rpc_pipe_client
*cli
,
175 struct policy_handle
*handle
/* [in] [ref] */,
176 uint32_t sec_info
/* [in] */,
177 struct sec_desc_buf
*sdbuf
/* [in] [ref] */)
179 struct lsa_SetSecObj r
;
183 r
.in
.handle
= handle
;
184 r
.in
.sec_info
= sec_info
;
187 if (DEBUGLEVEL
>= 10) {
188 NDR_PRINT_IN_DEBUG(lsa_SetSecObj
, &r
);
191 status
= cli
->dispatch(cli
,
197 if (!NT_STATUS_IS_OK(status
)) {
201 if (DEBUGLEVEL
>= 10) {
202 NDR_PRINT_OUT_DEBUG(lsa_SetSecObj
, &r
);
205 if (NT_STATUS_IS_ERR(status
)) {
209 /* Return variables */
215 NTSTATUS
rpccli_lsa_ChangePassword(struct rpc_pipe_client
*cli
,
218 struct lsa_ChangePassword r
;
223 if (DEBUGLEVEL
>= 10) {
224 NDR_PRINT_IN_DEBUG(lsa_ChangePassword
, &r
);
227 status
= cli
->dispatch(cli
,
230 NDR_LSA_CHANGEPASSWORD
,
233 if (!NT_STATUS_IS_OK(status
)) {
237 if (DEBUGLEVEL
>= 10) {
238 NDR_PRINT_OUT_DEBUG(lsa_ChangePassword
, &r
);
241 if (NT_STATUS_IS_ERR(status
)) {
245 /* Return variables */
251 NTSTATUS
rpccli_lsa_OpenPolicy(struct rpc_pipe_client
*cli
,
253 uint16_t *system_name
/* [in] [unique] */,
254 struct lsa_ObjectAttribute
*attr
/* [in] [ref] */,
255 uint32_t access_mask
/* [in] */,
256 struct policy_handle
*handle
/* [out] [ref] */)
258 struct lsa_OpenPolicy r
;
262 r
.in
.system_name
= system_name
;
264 r
.in
.access_mask
= access_mask
;
266 if (DEBUGLEVEL
>= 10) {
267 NDR_PRINT_IN_DEBUG(lsa_OpenPolicy
, &r
);
270 status
= cli
->dispatch(cli
,
276 if (!NT_STATUS_IS_OK(status
)) {
280 if (DEBUGLEVEL
>= 10) {
281 NDR_PRINT_OUT_DEBUG(lsa_OpenPolicy
, &r
);
284 if (NT_STATUS_IS_ERR(status
)) {
288 /* Return variables */
289 *handle
= *r
.out
.handle
;
295 NTSTATUS
rpccli_lsa_QueryInfoPolicy(struct rpc_pipe_client
*cli
,
297 struct policy_handle
*handle
/* [in] [ref] */,
298 enum lsa_PolicyInfo level
/* [in] */,
299 union lsa_PolicyInformation
**info
/* [out] [ref,switch_is(level)] */)
301 struct lsa_QueryInfoPolicy r
;
305 r
.in
.handle
= handle
;
308 if (DEBUGLEVEL
>= 10) {
309 NDR_PRINT_IN_DEBUG(lsa_QueryInfoPolicy
, &r
);
312 status
= cli
->dispatch(cli
,
315 NDR_LSA_QUERYINFOPOLICY
,
318 if (!NT_STATUS_IS_OK(status
)) {
322 if (DEBUGLEVEL
>= 10) {
323 NDR_PRINT_OUT_DEBUG(lsa_QueryInfoPolicy
, &r
);
326 if (NT_STATUS_IS_ERR(status
)) {
330 /* Return variables */
337 NTSTATUS
rpccli_lsa_SetInfoPolicy(struct rpc_pipe_client
*cli
,
339 struct policy_handle
*handle
/* [in] [ref] */,
340 enum lsa_PolicyInfo level
/* [in] */,
341 union lsa_PolicyInformation
*info
/* [in] [ref,switch_is(level)] */)
343 struct lsa_SetInfoPolicy r
;
347 r
.in
.handle
= handle
;
351 if (DEBUGLEVEL
>= 10) {
352 NDR_PRINT_IN_DEBUG(lsa_SetInfoPolicy
, &r
);
355 status
= cli
->dispatch(cli
,
358 NDR_LSA_SETINFOPOLICY
,
361 if (!NT_STATUS_IS_OK(status
)) {
365 if (DEBUGLEVEL
>= 10) {
366 NDR_PRINT_OUT_DEBUG(lsa_SetInfoPolicy
, &r
);
369 if (NT_STATUS_IS_ERR(status
)) {
373 /* Return variables */
379 NTSTATUS
rpccli_lsa_ClearAuditLog(struct rpc_pipe_client
*cli
,
382 struct lsa_ClearAuditLog r
;
387 if (DEBUGLEVEL
>= 10) {
388 NDR_PRINT_IN_DEBUG(lsa_ClearAuditLog
, &r
);
391 status
= cli
->dispatch(cli
,
394 NDR_LSA_CLEARAUDITLOG
,
397 if (!NT_STATUS_IS_OK(status
)) {
401 if (DEBUGLEVEL
>= 10) {
402 NDR_PRINT_OUT_DEBUG(lsa_ClearAuditLog
, &r
);
405 if (NT_STATUS_IS_ERR(status
)) {
409 /* Return variables */
415 NTSTATUS
rpccli_lsa_CreateAccount(struct rpc_pipe_client
*cli
,
417 struct policy_handle
*handle
/* [in] [ref] */,
418 struct dom_sid2
*sid
/* [in] [ref] */,
419 uint32_t access_mask
/* [in] */,
420 struct policy_handle
*acct_handle
/* [out] [ref] */)
422 struct lsa_CreateAccount r
;
426 r
.in
.handle
= handle
;
428 r
.in
.access_mask
= access_mask
;
430 if (DEBUGLEVEL
>= 10) {
431 NDR_PRINT_IN_DEBUG(lsa_CreateAccount
, &r
);
434 status
= cli
->dispatch(cli
,
437 NDR_LSA_CREATEACCOUNT
,
440 if (!NT_STATUS_IS_OK(status
)) {
444 if (DEBUGLEVEL
>= 10) {
445 NDR_PRINT_OUT_DEBUG(lsa_CreateAccount
, &r
);
448 if (NT_STATUS_IS_ERR(status
)) {
452 /* Return variables */
453 *acct_handle
= *r
.out
.acct_handle
;
459 NTSTATUS
rpccli_lsa_EnumAccounts(struct rpc_pipe_client
*cli
,
461 struct policy_handle
*handle
/* [in] [ref] */,
462 uint32_t *resume_handle
/* [in,out] [ref] */,
463 struct lsa_SidArray
*sids
/* [out] [ref] */,
464 uint32_t num_entries
/* [in] [range(0,8192)] */)
466 struct lsa_EnumAccounts r
;
470 r
.in
.handle
= handle
;
471 r
.in
.resume_handle
= resume_handle
;
472 r
.in
.num_entries
= num_entries
;
474 if (DEBUGLEVEL
>= 10) {
475 NDR_PRINT_IN_DEBUG(lsa_EnumAccounts
, &r
);
478 status
= cli
->dispatch(cli
,
481 NDR_LSA_ENUMACCOUNTS
,
484 if (!NT_STATUS_IS_OK(status
)) {
488 if (DEBUGLEVEL
>= 10) {
489 NDR_PRINT_OUT_DEBUG(lsa_EnumAccounts
, &r
);
492 if (NT_STATUS_IS_ERR(status
)) {
496 /* Return variables */
497 *resume_handle
= *r
.out
.resume_handle
;
504 NTSTATUS
rpccli_lsa_CreateTrustedDomain(struct rpc_pipe_client
*cli
,
506 struct policy_handle
*policy_handle
/* [in] [ref] */,
507 struct lsa_DomainInfo
*info
/* [in] [ref] */,
508 uint32_t access_mask
/* [in] */,
509 struct policy_handle
*trustdom_handle
/* [out] [ref] */)
511 struct lsa_CreateTrustedDomain r
;
515 r
.in
.policy_handle
= policy_handle
;
517 r
.in
.access_mask
= access_mask
;
519 if (DEBUGLEVEL
>= 10) {
520 NDR_PRINT_IN_DEBUG(lsa_CreateTrustedDomain
, &r
);
523 status
= cli
->dispatch(cli
,
526 NDR_LSA_CREATETRUSTEDDOMAIN
,
529 if (!NT_STATUS_IS_OK(status
)) {
533 if (DEBUGLEVEL
>= 10) {
534 NDR_PRINT_OUT_DEBUG(lsa_CreateTrustedDomain
, &r
);
537 if (NT_STATUS_IS_ERR(status
)) {
541 /* Return variables */
542 *trustdom_handle
= *r
.out
.trustdom_handle
;
548 NTSTATUS
rpccli_lsa_EnumTrustDom(struct rpc_pipe_client
*cli
,
550 struct policy_handle
*handle
/* [in] [ref] */,
551 uint32_t *resume_handle
/* [in,out] [ref] */,
552 struct lsa_DomainList
*domains
/* [out] [ref] */,
553 uint32_t max_size
/* [in] */)
555 struct lsa_EnumTrustDom r
;
559 r
.in
.handle
= handle
;
560 r
.in
.resume_handle
= resume_handle
;
561 r
.in
.max_size
= max_size
;
563 if (DEBUGLEVEL
>= 10) {
564 NDR_PRINT_IN_DEBUG(lsa_EnumTrustDom
, &r
);
567 status
= cli
->dispatch(cli
,
570 NDR_LSA_ENUMTRUSTDOM
,
573 if (!NT_STATUS_IS_OK(status
)) {
577 if (DEBUGLEVEL
>= 10) {
578 NDR_PRINT_OUT_DEBUG(lsa_EnumTrustDom
, &r
);
581 if (NT_STATUS_IS_ERR(status
)) {
585 /* Return variables */
586 *resume_handle
= *r
.out
.resume_handle
;
587 *domains
= *r
.out
.domains
;
593 NTSTATUS
rpccli_lsa_LookupNames(struct rpc_pipe_client
*cli
,
595 struct policy_handle
*handle
/* [in] [ref] */,
596 uint32_t num_names
/* [in] [range(0,1000)] */,
597 struct lsa_String
*names
/* [in] [size_is(num_names)] */,
598 struct lsa_RefDomainList
**domains
/* [out] [ref] */,
599 struct lsa_TransSidArray
*sids
/* [in,out] [ref] */,
600 enum lsa_LookupNamesLevel level
/* [in] */,
601 uint32_t *count
/* [in,out] [ref] */)
603 struct lsa_LookupNames r
;
607 r
.in
.handle
= handle
;
608 r
.in
.num_names
= num_names
;
614 if (DEBUGLEVEL
>= 10) {
615 NDR_PRINT_IN_DEBUG(lsa_LookupNames
, &r
);
618 status
= cli
->dispatch(cli
,
624 if (!NT_STATUS_IS_OK(status
)) {
628 if (DEBUGLEVEL
>= 10) {
629 NDR_PRINT_OUT_DEBUG(lsa_LookupNames
, &r
);
632 if (NT_STATUS_IS_ERR(status
)) {
636 /* Return variables */
637 *domains
= *r
.out
.domains
;
639 *count
= *r
.out
.count
;
645 NTSTATUS
rpccli_lsa_LookupSids(struct rpc_pipe_client
*cli
,
647 struct policy_handle
*handle
/* [in] [ref] */,
648 struct lsa_SidArray
*sids
/* [in] [ref] */,
649 struct lsa_RefDomainList
**domains
/* [out] [ref] */,
650 struct lsa_TransNameArray
*names
/* [in,out] [ref] */,
651 uint16_t level
/* [in] */,
652 uint32_t *count
/* [in,out] [ref] */)
654 struct lsa_LookupSids r
;
658 r
.in
.handle
= handle
;
664 if (DEBUGLEVEL
>= 10) {
665 NDR_PRINT_IN_DEBUG(lsa_LookupSids
, &r
);
668 status
= cli
->dispatch(cli
,
674 if (!NT_STATUS_IS_OK(status
)) {
678 if (DEBUGLEVEL
>= 10) {
679 NDR_PRINT_OUT_DEBUG(lsa_LookupSids
, &r
);
682 if (NT_STATUS_IS_ERR(status
)) {
686 /* Return variables */
687 *domains
= *r
.out
.domains
;
688 *names
= *r
.out
.names
;
689 *count
= *r
.out
.count
;
695 NTSTATUS
rpccli_lsa_CreateSecret(struct rpc_pipe_client
*cli
,
697 struct policy_handle
*handle
/* [in] [ref] */,
698 struct lsa_String name
/* [in] */,
699 uint32_t access_mask
/* [in] */,
700 struct policy_handle
*sec_handle
/* [out] [ref] */)
702 struct lsa_CreateSecret r
;
706 r
.in
.handle
= handle
;
708 r
.in
.access_mask
= access_mask
;
710 if (DEBUGLEVEL
>= 10) {
711 NDR_PRINT_IN_DEBUG(lsa_CreateSecret
, &r
);
714 status
= cli
->dispatch(cli
,
717 NDR_LSA_CREATESECRET
,
720 if (!NT_STATUS_IS_OK(status
)) {
724 if (DEBUGLEVEL
>= 10) {
725 NDR_PRINT_OUT_DEBUG(lsa_CreateSecret
, &r
);
728 if (NT_STATUS_IS_ERR(status
)) {
732 /* Return variables */
733 *sec_handle
= *r
.out
.sec_handle
;
739 NTSTATUS
rpccli_lsa_OpenAccount(struct rpc_pipe_client
*cli
,
741 struct policy_handle
*handle
/* [in] [ref] */,
742 struct dom_sid2
*sid
/* [in] [ref] */,
743 uint32_t access_mask
/* [in] */,
744 struct policy_handle
*acct_handle
/* [out] [ref] */)
746 struct lsa_OpenAccount r
;
750 r
.in
.handle
= handle
;
752 r
.in
.access_mask
= access_mask
;
754 if (DEBUGLEVEL
>= 10) {
755 NDR_PRINT_IN_DEBUG(lsa_OpenAccount
, &r
);
758 status
= cli
->dispatch(cli
,
764 if (!NT_STATUS_IS_OK(status
)) {
768 if (DEBUGLEVEL
>= 10) {
769 NDR_PRINT_OUT_DEBUG(lsa_OpenAccount
, &r
);
772 if (NT_STATUS_IS_ERR(status
)) {
776 /* Return variables */
777 *acct_handle
= *r
.out
.acct_handle
;
783 NTSTATUS
rpccli_lsa_EnumPrivsAccount(struct rpc_pipe_client
*cli
,
785 struct policy_handle
*handle
/* [in] [ref] */,
786 struct lsa_PrivilegeSet
**privs
/* [out] [ref] */)
788 struct lsa_EnumPrivsAccount r
;
792 r
.in
.handle
= handle
;
794 if (DEBUGLEVEL
>= 10) {
795 NDR_PRINT_IN_DEBUG(lsa_EnumPrivsAccount
, &r
);
798 status
= cli
->dispatch(cli
,
801 NDR_LSA_ENUMPRIVSACCOUNT
,
804 if (!NT_STATUS_IS_OK(status
)) {
808 if (DEBUGLEVEL
>= 10) {
809 NDR_PRINT_OUT_DEBUG(lsa_EnumPrivsAccount
, &r
);
812 if (NT_STATUS_IS_ERR(status
)) {
816 /* Return variables */
817 *privs
= *r
.out
.privs
;
823 NTSTATUS
rpccli_lsa_AddPrivilegesToAccount(struct rpc_pipe_client
*cli
,
825 struct policy_handle
*handle
/* [in] [ref] */,
826 struct lsa_PrivilegeSet
*privs
/* [in] [ref] */)
828 struct lsa_AddPrivilegesToAccount r
;
832 r
.in
.handle
= handle
;
835 if (DEBUGLEVEL
>= 10) {
836 NDR_PRINT_IN_DEBUG(lsa_AddPrivilegesToAccount
, &r
);
839 status
= cli
->dispatch(cli
,
842 NDR_LSA_ADDPRIVILEGESTOACCOUNT
,
845 if (!NT_STATUS_IS_OK(status
)) {
849 if (DEBUGLEVEL
>= 10) {
850 NDR_PRINT_OUT_DEBUG(lsa_AddPrivilegesToAccount
, &r
);
853 if (NT_STATUS_IS_ERR(status
)) {
857 /* Return variables */
863 NTSTATUS
rpccli_lsa_RemovePrivilegesFromAccount(struct rpc_pipe_client
*cli
,
865 struct policy_handle
*handle
/* [in] [ref] */,
866 uint8_t remove_all
/* [in] */,
867 struct lsa_PrivilegeSet
*privs
/* [in] [unique] */)
869 struct lsa_RemovePrivilegesFromAccount r
;
873 r
.in
.handle
= handle
;
874 r
.in
.remove_all
= remove_all
;
877 if (DEBUGLEVEL
>= 10) {
878 NDR_PRINT_IN_DEBUG(lsa_RemovePrivilegesFromAccount
, &r
);
881 status
= cli
->dispatch(cli
,
884 NDR_LSA_REMOVEPRIVILEGESFROMACCOUNT
,
887 if (!NT_STATUS_IS_OK(status
)) {
891 if (DEBUGLEVEL
>= 10) {
892 NDR_PRINT_OUT_DEBUG(lsa_RemovePrivilegesFromAccount
, &r
);
895 if (NT_STATUS_IS_ERR(status
)) {
899 /* Return variables */
905 NTSTATUS
rpccli_lsa_GetQuotasForAccount(struct rpc_pipe_client
*cli
,
908 struct lsa_GetQuotasForAccount r
;
913 if (DEBUGLEVEL
>= 10) {
914 NDR_PRINT_IN_DEBUG(lsa_GetQuotasForAccount
, &r
);
917 status
= cli
->dispatch(cli
,
920 NDR_LSA_GETQUOTASFORACCOUNT
,
923 if (!NT_STATUS_IS_OK(status
)) {
927 if (DEBUGLEVEL
>= 10) {
928 NDR_PRINT_OUT_DEBUG(lsa_GetQuotasForAccount
, &r
);
931 if (NT_STATUS_IS_ERR(status
)) {
935 /* Return variables */
941 NTSTATUS
rpccli_lsa_SetQuotasForAccount(struct rpc_pipe_client
*cli
,
944 struct lsa_SetQuotasForAccount r
;
949 if (DEBUGLEVEL
>= 10) {
950 NDR_PRINT_IN_DEBUG(lsa_SetQuotasForAccount
, &r
);
953 status
= cli
->dispatch(cli
,
956 NDR_LSA_SETQUOTASFORACCOUNT
,
959 if (!NT_STATUS_IS_OK(status
)) {
963 if (DEBUGLEVEL
>= 10) {
964 NDR_PRINT_OUT_DEBUG(lsa_SetQuotasForAccount
, &r
);
967 if (NT_STATUS_IS_ERR(status
)) {
971 /* Return variables */
977 NTSTATUS
rpccli_lsa_GetSystemAccessAccount(struct rpc_pipe_client
*cli
,
979 struct policy_handle
*handle
/* [in] [ref] */,
980 uint32_t *access_mask
/* [out] [ref] */)
982 struct lsa_GetSystemAccessAccount r
;
986 r
.in
.handle
= handle
;
988 if (DEBUGLEVEL
>= 10) {
989 NDR_PRINT_IN_DEBUG(lsa_GetSystemAccessAccount
, &r
);
992 status
= cli
->dispatch(cli
,
995 NDR_LSA_GETSYSTEMACCESSACCOUNT
,
998 if (!NT_STATUS_IS_OK(status
)) {
1002 if (DEBUGLEVEL
>= 10) {
1003 NDR_PRINT_OUT_DEBUG(lsa_GetSystemAccessAccount
, &r
);
1006 if (NT_STATUS_IS_ERR(status
)) {
1010 /* Return variables */
1011 *access_mask
= *r
.out
.access_mask
;
1014 return r
.out
.result
;
1017 NTSTATUS
rpccli_lsa_SetSystemAccessAccount(struct rpc_pipe_client
*cli
,
1018 TALLOC_CTX
*mem_ctx
,
1019 struct policy_handle
*handle
/* [in] [ref] */,
1020 uint32_t access_mask
/* [in] */)
1022 struct lsa_SetSystemAccessAccount r
;
1026 r
.in
.handle
= handle
;
1027 r
.in
.access_mask
= access_mask
;
1029 if (DEBUGLEVEL
>= 10) {
1030 NDR_PRINT_IN_DEBUG(lsa_SetSystemAccessAccount
, &r
);
1033 status
= cli
->dispatch(cli
,
1036 NDR_LSA_SETSYSTEMACCESSACCOUNT
,
1039 if (!NT_STATUS_IS_OK(status
)) {
1043 if (DEBUGLEVEL
>= 10) {
1044 NDR_PRINT_OUT_DEBUG(lsa_SetSystemAccessAccount
, &r
);
1047 if (NT_STATUS_IS_ERR(status
)) {
1051 /* Return variables */
1054 return r
.out
.result
;
1057 NTSTATUS
rpccli_lsa_OpenTrustedDomain(struct rpc_pipe_client
*cli
,
1058 TALLOC_CTX
*mem_ctx
,
1059 struct policy_handle
*handle
/* [in] [ref] */,
1060 struct dom_sid2
*sid
/* [in] [ref] */,
1061 uint32_t access_mask
/* [in] */,
1062 struct policy_handle
*trustdom_handle
/* [out] [ref] */)
1064 struct lsa_OpenTrustedDomain r
;
1068 r
.in
.handle
= handle
;
1070 r
.in
.access_mask
= access_mask
;
1072 if (DEBUGLEVEL
>= 10) {
1073 NDR_PRINT_IN_DEBUG(lsa_OpenTrustedDomain
, &r
);
1076 status
= cli
->dispatch(cli
,
1079 NDR_LSA_OPENTRUSTEDDOMAIN
,
1082 if (!NT_STATUS_IS_OK(status
)) {
1086 if (DEBUGLEVEL
>= 10) {
1087 NDR_PRINT_OUT_DEBUG(lsa_OpenTrustedDomain
, &r
);
1090 if (NT_STATUS_IS_ERR(status
)) {
1094 /* Return variables */
1095 *trustdom_handle
= *r
.out
.trustdom_handle
;
1098 return r
.out
.result
;
1101 NTSTATUS
rpccli_lsa_QueryTrustedDomainInfo(struct rpc_pipe_client
*cli
,
1102 TALLOC_CTX
*mem_ctx
,
1103 struct policy_handle
*trustdom_handle
/* [in] [ref] */,
1104 enum lsa_TrustDomInfoEnum level
/* [in] */,
1105 union lsa_TrustedDomainInfo
**info
/* [out] [ref,switch_is(level)] */)
1107 struct lsa_QueryTrustedDomainInfo r
;
1111 r
.in
.trustdom_handle
= trustdom_handle
;
1114 if (DEBUGLEVEL
>= 10) {
1115 NDR_PRINT_IN_DEBUG(lsa_QueryTrustedDomainInfo
, &r
);
1118 status
= cli
->dispatch(cli
,
1121 NDR_LSA_QUERYTRUSTEDDOMAININFO
,
1124 if (!NT_STATUS_IS_OK(status
)) {
1128 if (DEBUGLEVEL
>= 10) {
1129 NDR_PRINT_OUT_DEBUG(lsa_QueryTrustedDomainInfo
, &r
);
1132 if (NT_STATUS_IS_ERR(status
)) {
1136 /* Return variables */
1137 *info
= *r
.out
.info
;
1140 return r
.out
.result
;
1143 NTSTATUS
rpccli_lsa_SetInformationTrustedDomain(struct rpc_pipe_client
*cli
,
1144 TALLOC_CTX
*mem_ctx
,
1145 struct policy_handle
*trustdom_handle
/* [in] [ref] */,
1146 enum lsa_TrustDomInfoEnum level
/* [in] */,
1147 union lsa_TrustedDomainInfo
*info
/* [in] [ref,switch_is(level)] */)
1149 struct lsa_SetInformationTrustedDomain r
;
1153 r
.in
.trustdom_handle
= trustdom_handle
;
1157 if (DEBUGLEVEL
>= 10) {
1158 NDR_PRINT_IN_DEBUG(lsa_SetInformationTrustedDomain
, &r
);
1161 status
= cli
->dispatch(cli
,
1164 NDR_LSA_SETINFORMATIONTRUSTEDDOMAIN
,
1167 if (!NT_STATUS_IS_OK(status
)) {
1171 if (DEBUGLEVEL
>= 10) {
1172 NDR_PRINT_OUT_DEBUG(lsa_SetInformationTrustedDomain
, &r
);
1175 if (NT_STATUS_IS_ERR(status
)) {
1179 /* Return variables */
1182 return r
.out
.result
;
1185 NTSTATUS
rpccli_lsa_OpenSecret(struct rpc_pipe_client
*cli
,
1186 TALLOC_CTX
*mem_ctx
,
1187 struct policy_handle
*handle
/* [in] [ref] */,
1188 struct lsa_String name
/* [in] */,
1189 uint32_t access_mask
/* [in] */,
1190 struct policy_handle
*sec_handle
/* [out] [ref] */)
1192 struct lsa_OpenSecret r
;
1196 r
.in
.handle
= handle
;
1198 r
.in
.access_mask
= access_mask
;
1200 if (DEBUGLEVEL
>= 10) {
1201 NDR_PRINT_IN_DEBUG(lsa_OpenSecret
, &r
);
1204 status
= cli
->dispatch(cli
,
1210 if (!NT_STATUS_IS_OK(status
)) {
1214 if (DEBUGLEVEL
>= 10) {
1215 NDR_PRINT_OUT_DEBUG(lsa_OpenSecret
, &r
);
1218 if (NT_STATUS_IS_ERR(status
)) {
1222 /* Return variables */
1223 *sec_handle
= *r
.out
.sec_handle
;
1226 return r
.out
.result
;
1229 NTSTATUS
rpccli_lsa_SetSecret(struct rpc_pipe_client
*cli
,
1230 TALLOC_CTX
*mem_ctx
,
1231 struct policy_handle
*sec_handle
/* [in] [ref] */,
1232 struct lsa_DATA_BUF
*new_val
/* [in] [unique] */,
1233 struct lsa_DATA_BUF
*old_val
/* [in] [unique] */)
1235 struct lsa_SetSecret r
;
1239 r
.in
.sec_handle
= sec_handle
;
1240 r
.in
.new_val
= new_val
;
1241 r
.in
.old_val
= old_val
;
1243 if (DEBUGLEVEL
>= 10) {
1244 NDR_PRINT_IN_DEBUG(lsa_SetSecret
, &r
);
1247 status
= cli
->dispatch(cli
,
1253 if (!NT_STATUS_IS_OK(status
)) {
1257 if (DEBUGLEVEL
>= 10) {
1258 NDR_PRINT_OUT_DEBUG(lsa_SetSecret
, &r
);
1261 if (NT_STATUS_IS_ERR(status
)) {
1265 /* Return variables */
1268 return r
.out
.result
;
1271 NTSTATUS
rpccli_lsa_QuerySecret(struct rpc_pipe_client
*cli
,
1272 TALLOC_CTX
*mem_ctx
,
1273 struct policy_handle
*sec_handle
/* [in] [ref] */,
1274 struct lsa_DATA_BUF_PTR
*new_val
/* [in,out] [unique] */,
1275 NTTIME
*new_mtime
/* [in,out] [unique] */,
1276 struct lsa_DATA_BUF_PTR
*old_val
/* [in,out] [unique] */,
1277 NTTIME
*old_mtime
/* [in,out] [unique] */)
1279 struct lsa_QuerySecret r
;
1283 r
.in
.sec_handle
= sec_handle
;
1284 r
.in
.new_val
= new_val
;
1285 r
.in
.new_mtime
= new_mtime
;
1286 r
.in
.old_val
= old_val
;
1287 r
.in
.old_mtime
= old_mtime
;
1289 if (DEBUGLEVEL
>= 10) {
1290 NDR_PRINT_IN_DEBUG(lsa_QuerySecret
, &r
);
1293 status
= cli
->dispatch(cli
,
1296 NDR_LSA_QUERYSECRET
,
1299 if (!NT_STATUS_IS_OK(status
)) {
1303 if (DEBUGLEVEL
>= 10) {
1304 NDR_PRINT_OUT_DEBUG(lsa_QuerySecret
, &r
);
1307 if (NT_STATUS_IS_ERR(status
)) {
1311 /* Return variables */
1312 if (new_val
&& r
.out
.new_val
) {
1313 *new_val
= *r
.out
.new_val
;
1315 if (new_mtime
&& r
.out
.new_mtime
) {
1316 *new_mtime
= *r
.out
.new_mtime
;
1318 if (old_val
&& r
.out
.old_val
) {
1319 *old_val
= *r
.out
.old_val
;
1321 if (old_mtime
&& r
.out
.old_mtime
) {
1322 *old_mtime
= *r
.out
.old_mtime
;
1326 return r
.out
.result
;
1329 NTSTATUS
rpccli_lsa_LookupPrivValue(struct rpc_pipe_client
*cli
,
1330 TALLOC_CTX
*mem_ctx
,
1331 struct policy_handle
*handle
/* [in] [ref] */,
1332 struct lsa_String
*name
/* [in] [ref] */,
1333 struct lsa_LUID
*luid
/* [out] [ref] */)
1335 struct lsa_LookupPrivValue r
;
1339 r
.in
.handle
= handle
;
1342 if (DEBUGLEVEL
>= 10) {
1343 NDR_PRINT_IN_DEBUG(lsa_LookupPrivValue
, &r
);
1346 status
= cli
->dispatch(cli
,
1349 NDR_LSA_LOOKUPPRIVVALUE
,
1352 if (!NT_STATUS_IS_OK(status
)) {
1356 if (DEBUGLEVEL
>= 10) {
1357 NDR_PRINT_OUT_DEBUG(lsa_LookupPrivValue
, &r
);
1360 if (NT_STATUS_IS_ERR(status
)) {
1364 /* Return variables */
1365 *luid
= *r
.out
.luid
;
1368 return r
.out
.result
;
1371 NTSTATUS
rpccli_lsa_LookupPrivName(struct rpc_pipe_client
*cli
,
1372 TALLOC_CTX
*mem_ctx
,
1373 struct policy_handle
*handle
/* [in] [ref] */,
1374 struct lsa_LUID
*luid
/* [in] [ref] */,
1375 struct lsa_StringLarge
**name
/* [out] [ref] */)
1377 struct lsa_LookupPrivName r
;
1381 r
.in
.handle
= handle
;
1384 if (DEBUGLEVEL
>= 10) {
1385 NDR_PRINT_IN_DEBUG(lsa_LookupPrivName
, &r
);
1388 status
= cli
->dispatch(cli
,
1391 NDR_LSA_LOOKUPPRIVNAME
,
1394 if (!NT_STATUS_IS_OK(status
)) {
1398 if (DEBUGLEVEL
>= 10) {
1399 NDR_PRINT_OUT_DEBUG(lsa_LookupPrivName
, &r
);
1402 if (NT_STATUS_IS_ERR(status
)) {
1406 /* Return variables */
1407 *name
= *r
.out
.name
;
1410 return r
.out
.result
;
1413 NTSTATUS
rpccli_lsa_LookupPrivDisplayName(struct rpc_pipe_client
*cli
,
1414 TALLOC_CTX
*mem_ctx
,
1415 struct policy_handle
*handle
/* [in] [ref] */,
1416 struct lsa_String
*name
/* [in] [ref] */,
1417 uint16_t language_id
/* [in] */,
1418 uint16_t language_id_sys
/* [in] */,
1419 struct lsa_StringLarge
**disp_name
/* [out] [ref] */,
1420 uint16_t *returned_language_id
/* [out] [ref] */)
1422 struct lsa_LookupPrivDisplayName r
;
1426 r
.in
.handle
= handle
;
1428 r
.in
.language_id
= language_id
;
1429 r
.in
.language_id_sys
= language_id_sys
;
1431 if (DEBUGLEVEL
>= 10) {
1432 NDR_PRINT_IN_DEBUG(lsa_LookupPrivDisplayName
, &r
);
1435 status
= cli
->dispatch(cli
,
1438 NDR_LSA_LOOKUPPRIVDISPLAYNAME
,
1441 if (!NT_STATUS_IS_OK(status
)) {
1445 if (DEBUGLEVEL
>= 10) {
1446 NDR_PRINT_OUT_DEBUG(lsa_LookupPrivDisplayName
, &r
);
1449 if (NT_STATUS_IS_ERR(status
)) {
1453 /* Return variables */
1454 *disp_name
= *r
.out
.disp_name
;
1455 *returned_language_id
= *r
.out
.returned_language_id
;
1458 return r
.out
.result
;
1461 NTSTATUS
rpccli_lsa_DeleteObject(struct rpc_pipe_client
*cli
,
1462 TALLOC_CTX
*mem_ctx
,
1463 struct policy_handle
*handle
/* [in,out] [ref] */)
1465 struct lsa_DeleteObject r
;
1469 r
.in
.handle
= handle
;
1471 if (DEBUGLEVEL
>= 10) {
1472 NDR_PRINT_IN_DEBUG(lsa_DeleteObject
, &r
);
1475 status
= cli
->dispatch(cli
,
1478 NDR_LSA_DELETEOBJECT
,
1481 if (!NT_STATUS_IS_OK(status
)) {
1485 if (DEBUGLEVEL
>= 10) {
1486 NDR_PRINT_OUT_DEBUG(lsa_DeleteObject
, &r
);
1489 if (NT_STATUS_IS_ERR(status
)) {
1493 /* Return variables */
1494 *handle
= *r
.out
.handle
;
1497 return r
.out
.result
;
1500 NTSTATUS
rpccli_lsa_EnumAccountsWithUserRight(struct rpc_pipe_client
*cli
,
1501 TALLOC_CTX
*mem_ctx
,
1502 struct policy_handle
*handle
/* [in] [ref] */,
1503 struct lsa_String
*name
/* [in] [unique] */,
1504 struct lsa_SidArray
*sids
/* [out] [ref] */)
1506 struct lsa_EnumAccountsWithUserRight r
;
1510 r
.in
.handle
= handle
;
1513 if (DEBUGLEVEL
>= 10) {
1514 NDR_PRINT_IN_DEBUG(lsa_EnumAccountsWithUserRight
, &r
);
1517 status
= cli
->dispatch(cli
,
1520 NDR_LSA_ENUMACCOUNTSWITHUSERRIGHT
,
1523 if (!NT_STATUS_IS_OK(status
)) {
1527 if (DEBUGLEVEL
>= 10) {
1528 NDR_PRINT_OUT_DEBUG(lsa_EnumAccountsWithUserRight
, &r
);
1531 if (NT_STATUS_IS_ERR(status
)) {
1535 /* Return variables */
1536 *sids
= *r
.out
.sids
;
1539 return r
.out
.result
;
1542 NTSTATUS
rpccli_lsa_EnumAccountRights(struct rpc_pipe_client
*cli
,
1543 TALLOC_CTX
*mem_ctx
,
1544 struct policy_handle
*handle
/* [in] [ref] */,
1545 struct dom_sid2
*sid
/* [in] [ref] */,
1546 struct lsa_RightSet
*rights
/* [out] [ref] */)
1548 struct lsa_EnumAccountRights r
;
1552 r
.in
.handle
= handle
;
1555 if (DEBUGLEVEL
>= 10) {
1556 NDR_PRINT_IN_DEBUG(lsa_EnumAccountRights
, &r
);
1559 status
= cli
->dispatch(cli
,
1562 NDR_LSA_ENUMACCOUNTRIGHTS
,
1565 if (!NT_STATUS_IS_OK(status
)) {
1569 if (DEBUGLEVEL
>= 10) {
1570 NDR_PRINT_OUT_DEBUG(lsa_EnumAccountRights
, &r
);
1573 if (NT_STATUS_IS_ERR(status
)) {
1577 /* Return variables */
1578 *rights
= *r
.out
.rights
;
1581 return r
.out
.result
;
1584 NTSTATUS
rpccli_lsa_AddAccountRights(struct rpc_pipe_client
*cli
,
1585 TALLOC_CTX
*mem_ctx
,
1586 struct policy_handle
*handle
/* [in] [ref] */,
1587 struct dom_sid2
*sid
/* [in] [ref] */,
1588 struct lsa_RightSet
*rights
/* [in] [ref] */)
1590 struct lsa_AddAccountRights r
;
1594 r
.in
.handle
= handle
;
1596 r
.in
.rights
= rights
;
1598 if (DEBUGLEVEL
>= 10) {
1599 NDR_PRINT_IN_DEBUG(lsa_AddAccountRights
, &r
);
1602 status
= cli
->dispatch(cli
,
1605 NDR_LSA_ADDACCOUNTRIGHTS
,
1608 if (!NT_STATUS_IS_OK(status
)) {
1612 if (DEBUGLEVEL
>= 10) {
1613 NDR_PRINT_OUT_DEBUG(lsa_AddAccountRights
, &r
);
1616 if (NT_STATUS_IS_ERR(status
)) {
1620 /* Return variables */
1623 return r
.out
.result
;
1626 NTSTATUS
rpccli_lsa_RemoveAccountRights(struct rpc_pipe_client
*cli
,
1627 TALLOC_CTX
*mem_ctx
,
1628 struct policy_handle
*handle
/* [in] [ref] */,
1629 struct dom_sid2
*sid
/* [in] [ref] */,
1630 uint8_t remove_all
/* [in] */,
1631 struct lsa_RightSet
*rights
/* [in] [ref] */)
1633 struct lsa_RemoveAccountRights r
;
1637 r
.in
.handle
= handle
;
1639 r
.in
.remove_all
= remove_all
;
1640 r
.in
.rights
= rights
;
1642 if (DEBUGLEVEL
>= 10) {
1643 NDR_PRINT_IN_DEBUG(lsa_RemoveAccountRights
, &r
);
1646 status
= cli
->dispatch(cli
,
1649 NDR_LSA_REMOVEACCOUNTRIGHTS
,
1652 if (!NT_STATUS_IS_OK(status
)) {
1656 if (DEBUGLEVEL
>= 10) {
1657 NDR_PRINT_OUT_DEBUG(lsa_RemoveAccountRights
, &r
);
1660 if (NT_STATUS_IS_ERR(status
)) {
1664 /* Return variables */
1667 return r
.out
.result
;
1670 NTSTATUS
rpccli_lsa_QueryTrustedDomainInfoBySid(struct rpc_pipe_client
*cli
,
1671 TALLOC_CTX
*mem_ctx
,
1672 struct policy_handle
*handle
/* [in] [ref] */,
1673 struct dom_sid2
*dom_sid
/* [in] [ref] */,
1674 enum lsa_TrustDomInfoEnum level
/* [in] */,
1675 union lsa_TrustedDomainInfo
**info
/* [out] [ref,switch_is(level)] */)
1677 struct lsa_QueryTrustedDomainInfoBySid r
;
1681 r
.in
.handle
= handle
;
1682 r
.in
.dom_sid
= dom_sid
;
1685 if (DEBUGLEVEL
>= 10) {
1686 NDR_PRINT_IN_DEBUG(lsa_QueryTrustedDomainInfoBySid
, &r
);
1689 status
= cli
->dispatch(cli
,
1692 NDR_LSA_QUERYTRUSTEDDOMAININFOBYSID
,
1695 if (!NT_STATUS_IS_OK(status
)) {
1699 if (DEBUGLEVEL
>= 10) {
1700 NDR_PRINT_OUT_DEBUG(lsa_QueryTrustedDomainInfoBySid
, &r
);
1703 if (NT_STATUS_IS_ERR(status
)) {
1707 /* Return variables */
1708 *info
= *r
.out
.info
;
1711 return r
.out
.result
;
1714 NTSTATUS
rpccli_lsa_SetTrustedDomainInfo(struct rpc_pipe_client
*cli
,
1715 TALLOC_CTX
*mem_ctx
,
1716 struct policy_handle
*handle
/* [in] [ref] */,
1717 struct dom_sid2
*dom_sid
/* [in] [ref] */,
1718 enum lsa_TrustDomInfoEnum level
/* [in] */,
1719 union lsa_TrustedDomainInfo
*info
/* [in] [ref,switch_is(level)] */)
1721 struct lsa_SetTrustedDomainInfo r
;
1725 r
.in
.handle
= handle
;
1726 r
.in
.dom_sid
= dom_sid
;
1730 if (DEBUGLEVEL
>= 10) {
1731 NDR_PRINT_IN_DEBUG(lsa_SetTrustedDomainInfo
, &r
);
1734 status
= cli
->dispatch(cli
,
1737 NDR_LSA_SETTRUSTEDDOMAININFO
,
1740 if (!NT_STATUS_IS_OK(status
)) {
1744 if (DEBUGLEVEL
>= 10) {
1745 NDR_PRINT_OUT_DEBUG(lsa_SetTrustedDomainInfo
, &r
);
1748 if (NT_STATUS_IS_ERR(status
)) {
1752 /* Return variables */
1755 return r
.out
.result
;
1758 NTSTATUS
rpccli_lsa_DeleteTrustedDomain(struct rpc_pipe_client
*cli
,
1759 TALLOC_CTX
*mem_ctx
,
1760 struct policy_handle
*handle
/* [in] [ref] */,
1761 struct dom_sid2
*dom_sid
/* [in] [ref] */)
1763 struct lsa_DeleteTrustedDomain r
;
1767 r
.in
.handle
= handle
;
1768 r
.in
.dom_sid
= dom_sid
;
1770 if (DEBUGLEVEL
>= 10) {
1771 NDR_PRINT_IN_DEBUG(lsa_DeleteTrustedDomain
, &r
);
1774 status
= cli
->dispatch(cli
,
1777 NDR_LSA_DELETETRUSTEDDOMAIN
,
1780 if (!NT_STATUS_IS_OK(status
)) {
1784 if (DEBUGLEVEL
>= 10) {
1785 NDR_PRINT_OUT_DEBUG(lsa_DeleteTrustedDomain
, &r
);
1788 if (NT_STATUS_IS_ERR(status
)) {
1792 /* Return variables */
1795 return r
.out
.result
;
1798 NTSTATUS
rpccli_lsa_StorePrivateData(struct rpc_pipe_client
*cli
,
1799 TALLOC_CTX
*mem_ctx
)
1801 struct lsa_StorePrivateData r
;
1806 if (DEBUGLEVEL
>= 10) {
1807 NDR_PRINT_IN_DEBUG(lsa_StorePrivateData
, &r
);
1810 status
= cli
->dispatch(cli
,
1813 NDR_LSA_STOREPRIVATEDATA
,
1816 if (!NT_STATUS_IS_OK(status
)) {
1820 if (DEBUGLEVEL
>= 10) {
1821 NDR_PRINT_OUT_DEBUG(lsa_StorePrivateData
, &r
);
1824 if (NT_STATUS_IS_ERR(status
)) {
1828 /* Return variables */
1831 return r
.out
.result
;
1834 NTSTATUS
rpccli_lsa_RetrievePrivateData(struct rpc_pipe_client
*cli
,
1835 TALLOC_CTX
*mem_ctx
)
1837 struct lsa_RetrievePrivateData r
;
1842 if (DEBUGLEVEL
>= 10) {
1843 NDR_PRINT_IN_DEBUG(lsa_RetrievePrivateData
, &r
);
1846 status
= cli
->dispatch(cli
,
1849 NDR_LSA_RETRIEVEPRIVATEDATA
,
1852 if (!NT_STATUS_IS_OK(status
)) {
1856 if (DEBUGLEVEL
>= 10) {
1857 NDR_PRINT_OUT_DEBUG(lsa_RetrievePrivateData
, &r
);
1860 if (NT_STATUS_IS_ERR(status
)) {
1864 /* Return variables */
1867 return r
.out
.result
;
1870 NTSTATUS
rpccli_lsa_OpenPolicy2(struct rpc_pipe_client
*cli
,
1871 TALLOC_CTX
*mem_ctx
,
1872 const char *system_name
/* [in] [unique,charset(UTF16)] */,
1873 struct lsa_ObjectAttribute
*attr
/* [in] [ref] */,
1874 uint32_t access_mask
/* [in] */,
1875 struct policy_handle
*handle
/* [out] [ref] */)
1877 struct lsa_OpenPolicy2 r
;
1881 r
.in
.system_name
= system_name
;
1883 r
.in
.access_mask
= access_mask
;
1885 if (DEBUGLEVEL
>= 10) {
1886 NDR_PRINT_IN_DEBUG(lsa_OpenPolicy2
, &r
);
1889 status
= cli
->dispatch(cli
,
1892 NDR_LSA_OPENPOLICY2
,
1895 if (!NT_STATUS_IS_OK(status
)) {
1899 if (DEBUGLEVEL
>= 10) {
1900 NDR_PRINT_OUT_DEBUG(lsa_OpenPolicy2
, &r
);
1903 if (NT_STATUS_IS_ERR(status
)) {
1907 /* Return variables */
1908 *handle
= *r
.out
.handle
;
1911 return r
.out
.result
;
1914 NTSTATUS
rpccli_lsa_GetUserName(struct rpc_pipe_client
*cli
,
1915 TALLOC_CTX
*mem_ctx
,
1916 const char *system_name
/* [in] [unique,charset(UTF16)] */,
1917 struct lsa_String
**account_name
/* [in,out] [ref] */,
1918 struct lsa_String
**authority_name
/* [in,out] [unique] */)
1920 struct lsa_GetUserName r
;
1924 r
.in
.system_name
= system_name
;
1925 r
.in
.account_name
= account_name
;
1926 r
.in
.authority_name
= authority_name
;
1928 if (DEBUGLEVEL
>= 10) {
1929 NDR_PRINT_IN_DEBUG(lsa_GetUserName
, &r
);
1932 status
= cli
->dispatch(cli
,
1935 NDR_LSA_GETUSERNAME
,
1938 if (!NT_STATUS_IS_OK(status
)) {
1942 if (DEBUGLEVEL
>= 10) {
1943 NDR_PRINT_OUT_DEBUG(lsa_GetUserName
, &r
);
1946 if (NT_STATUS_IS_ERR(status
)) {
1950 /* Return variables */
1951 *account_name
= *r
.out
.account_name
;
1952 if (authority_name
&& r
.out
.authority_name
) {
1953 *authority_name
= *r
.out
.authority_name
;
1957 return r
.out
.result
;
1960 NTSTATUS
rpccli_lsa_QueryInfoPolicy2(struct rpc_pipe_client
*cli
,
1961 TALLOC_CTX
*mem_ctx
,
1962 struct policy_handle
*handle
/* [in] [ref] */,
1963 enum lsa_PolicyInfo level
/* [in] */,
1964 union lsa_PolicyInformation
**info
/* [out] [ref,switch_is(level)] */)
1966 struct lsa_QueryInfoPolicy2 r
;
1970 r
.in
.handle
= handle
;
1973 if (DEBUGLEVEL
>= 10) {
1974 NDR_PRINT_IN_DEBUG(lsa_QueryInfoPolicy2
, &r
);
1977 status
= cli
->dispatch(cli
,
1980 NDR_LSA_QUERYINFOPOLICY2
,
1983 if (!NT_STATUS_IS_OK(status
)) {
1987 if (DEBUGLEVEL
>= 10) {
1988 NDR_PRINT_OUT_DEBUG(lsa_QueryInfoPolicy2
, &r
);
1991 if (NT_STATUS_IS_ERR(status
)) {
1995 /* Return variables */
1996 *info
= *r
.out
.info
;
1999 return r
.out
.result
;
2002 NTSTATUS
rpccli_lsa_SetInfoPolicy2(struct rpc_pipe_client
*cli
,
2003 TALLOC_CTX
*mem_ctx
,
2004 struct policy_handle
*handle
/* [in] [ref] */,
2005 enum lsa_PolicyInfo level
/* [in] */,
2006 union lsa_PolicyInformation
*info
/* [in] [ref,switch_is(level)] */)
2008 struct lsa_SetInfoPolicy2 r
;
2012 r
.in
.handle
= handle
;
2016 if (DEBUGLEVEL
>= 10) {
2017 NDR_PRINT_IN_DEBUG(lsa_SetInfoPolicy2
, &r
);
2020 status
= cli
->dispatch(cli
,
2023 NDR_LSA_SETINFOPOLICY2
,
2026 if (!NT_STATUS_IS_OK(status
)) {
2030 if (DEBUGLEVEL
>= 10) {
2031 NDR_PRINT_OUT_DEBUG(lsa_SetInfoPolicy2
, &r
);
2034 if (NT_STATUS_IS_ERR(status
)) {
2038 /* Return variables */
2041 return r
.out
.result
;
2044 NTSTATUS
rpccli_lsa_QueryTrustedDomainInfoByName(struct rpc_pipe_client
*cli
,
2045 TALLOC_CTX
*mem_ctx
,
2046 struct policy_handle
*handle
/* [in] [ref] */,
2047 struct lsa_String
*trusted_domain
/* [in] [ref] */,
2048 enum lsa_TrustDomInfoEnum level
/* [in] */,
2049 union lsa_TrustedDomainInfo
**info
/* [out] [ref,switch_is(level)] */)
2051 struct lsa_QueryTrustedDomainInfoByName r
;
2055 r
.in
.handle
= handle
;
2056 r
.in
.trusted_domain
= trusted_domain
;
2059 if (DEBUGLEVEL
>= 10) {
2060 NDR_PRINT_IN_DEBUG(lsa_QueryTrustedDomainInfoByName
, &r
);
2063 status
= cli
->dispatch(cli
,
2066 NDR_LSA_QUERYTRUSTEDDOMAININFOBYNAME
,
2069 if (!NT_STATUS_IS_OK(status
)) {
2073 if (DEBUGLEVEL
>= 10) {
2074 NDR_PRINT_OUT_DEBUG(lsa_QueryTrustedDomainInfoByName
, &r
);
2077 if (NT_STATUS_IS_ERR(status
)) {
2081 /* Return variables */
2082 *info
= *r
.out
.info
;
2085 return r
.out
.result
;
2088 NTSTATUS
rpccli_lsa_SetTrustedDomainInfoByName(struct rpc_pipe_client
*cli
,
2089 TALLOC_CTX
*mem_ctx
,
2090 struct policy_handle
*handle
/* [in] [ref] */,
2091 struct lsa_String trusted_domain
/* [in] */,
2092 enum lsa_TrustDomInfoEnum level
/* [in] */,
2093 union lsa_TrustedDomainInfo
*info
/* [in] [unique,switch_is(level)] */)
2095 struct lsa_SetTrustedDomainInfoByName r
;
2099 r
.in
.handle
= handle
;
2100 r
.in
.trusted_domain
= trusted_domain
;
2104 if (DEBUGLEVEL
>= 10) {
2105 NDR_PRINT_IN_DEBUG(lsa_SetTrustedDomainInfoByName
, &r
);
2108 status
= cli
->dispatch(cli
,
2111 NDR_LSA_SETTRUSTEDDOMAININFOBYNAME
,
2114 if (!NT_STATUS_IS_OK(status
)) {
2118 if (DEBUGLEVEL
>= 10) {
2119 NDR_PRINT_OUT_DEBUG(lsa_SetTrustedDomainInfoByName
, &r
);
2122 if (NT_STATUS_IS_ERR(status
)) {
2126 /* Return variables */
2129 return r
.out
.result
;
2132 NTSTATUS
rpccli_lsa_EnumTrustedDomainsEx(struct rpc_pipe_client
*cli
,
2133 TALLOC_CTX
*mem_ctx
,
2134 struct policy_handle
*handle
/* [in] [ref] */,
2135 uint32_t *resume_handle
/* [in,out] [ref] */,
2136 struct lsa_DomainListEx
*domains
/* [out] [ref] */,
2137 uint32_t max_size
/* [in] */)
2139 struct lsa_EnumTrustedDomainsEx r
;
2143 r
.in
.handle
= handle
;
2144 r
.in
.resume_handle
= resume_handle
;
2145 r
.in
.max_size
= max_size
;
2147 if (DEBUGLEVEL
>= 10) {
2148 NDR_PRINT_IN_DEBUG(lsa_EnumTrustedDomainsEx
, &r
);
2151 status
= cli
->dispatch(cli
,
2154 NDR_LSA_ENUMTRUSTEDDOMAINSEX
,
2157 if (!NT_STATUS_IS_OK(status
)) {
2161 if (DEBUGLEVEL
>= 10) {
2162 NDR_PRINT_OUT_DEBUG(lsa_EnumTrustedDomainsEx
, &r
);
2165 if (NT_STATUS_IS_ERR(status
)) {
2169 /* Return variables */
2170 *resume_handle
= *r
.out
.resume_handle
;
2171 *domains
= *r
.out
.domains
;
2174 return r
.out
.result
;
2177 NTSTATUS
rpccli_lsa_CreateTrustedDomainEx(struct rpc_pipe_client
*cli
,
2178 TALLOC_CTX
*mem_ctx
,
2179 struct policy_handle
*policy_handle
/* [in] [ref] */,
2180 struct lsa_TrustDomainInfoInfoEx
*info
/* [in] [ref] */,
2181 struct lsa_TrustDomainInfoAuthInfoInternal
*auth_info
/* [in] [ref] */,
2182 uint32_t access_mask
/* [in] */,
2183 struct policy_handle
*trustdom_handle
/* [out] [ref] */)
2185 struct lsa_CreateTrustedDomainEx r
;
2189 r
.in
.policy_handle
= policy_handle
;
2191 r
.in
.auth_info
= auth_info
;
2192 r
.in
.access_mask
= access_mask
;
2194 if (DEBUGLEVEL
>= 10) {
2195 NDR_PRINT_IN_DEBUG(lsa_CreateTrustedDomainEx
, &r
);
2198 status
= cli
->dispatch(cli
,
2201 NDR_LSA_CREATETRUSTEDDOMAINEX
,
2204 if (!NT_STATUS_IS_OK(status
)) {
2208 if (DEBUGLEVEL
>= 10) {
2209 NDR_PRINT_OUT_DEBUG(lsa_CreateTrustedDomainEx
, &r
);
2212 if (NT_STATUS_IS_ERR(status
)) {
2216 /* Return variables */
2217 *trustdom_handle
= *r
.out
.trustdom_handle
;
2220 return r
.out
.result
;
2223 NTSTATUS
rpccli_lsa_CloseTrustedDomainEx(struct rpc_pipe_client
*cli
,
2224 TALLOC_CTX
*mem_ctx
,
2225 struct policy_handle
*handle
/* [in,out] [ref] */)
2227 struct lsa_CloseTrustedDomainEx r
;
2231 r
.in
.handle
= handle
;
2233 if (DEBUGLEVEL
>= 10) {
2234 NDR_PRINT_IN_DEBUG(lsa_CloseTrustedDomainEx
, &r
);
2237 status
= cli
->dispatch(cli
,
2240 NDR_LSA_CLOSETRUSTEDDOMAINEX
,
2243 if (!NT_STATUS_IS_OK(status
)) {
2247 if (DEBUGLEVEL
>= 10) {
2248 NDR_PRINT_OUT_DEBUG(lsa_CloseTrustedDomainEx
, &r
);
2251 if (NT_STATUS_IS_ERR(status
)) {
2255 /* Return variables */
2256 *handle
= *r
.out
.handle
;
2259 return r
.out
.result
;
2262 NTSTATUS
rpccli_lsa_QueryDomainInformationPolicy(struct rpc_pipe_client
*cli
,
2263 TALLOC_CTX
*mem_ctx
,
2264 struct policy_handle
*handle
/* [in] [ref] */,
2265 uint16_t level
/* [in] */,
2266 union lsa_DomainInformationPolicy
**info
/* [out] [ref,switch_is(level)] */)
2268 struct lsa_QueryDomainInformationPolicy r
;
2272 r
.in
.handle
= handle
;
2275 if (DEBUGLEVEL
>= 10) {
2276 NDR_PRINT_IN_DEBUG(lsa_QueryDomainInformationPolicy
, &r
);
2279 status
= cli
->dispatch(cli
,
2282 NDR_LSA_QUERYDOMAININFORMATIONPOLICY
,
2285 if (!NT_STATUS_IS_OK(status
)) {
2289 if (DEBUGLEVEL
>= 10) {
2290 NDR_PRINT_OUT_DEBUG(lsa_QueryDomainInformationPolicy
, &r
);
2293 if (NT_STATUS_IS_ERR(status
)) {
2297 /* Return variables */
2298 *info
= *r
.out
.info
;
2301 return r
.out
.result
;
2304 NTSTATUS
rpccli_lsa_SetDomainInformationPolicy(struct rpc_pipe_client
*cli
,
2305 TALLOC_CTX
*mem_ctx
,
2306 struct policy_handle
*handle
/* [in] [ref] */,
2307 uint16_t level
/* [in] */,
2308 union lsa_DomainInformationPolicy
*info
/* [in] [unique,switch_is(level)] */)
2310 struct lsa_SetDomainInformationPolicy r
;
2314 r
.in
.handle
= handle
;
2318 if (DEBUGLEVEL
>= 10) {
2319 NDR_PRINT_IN_DEBUG(lsa_SetDomainInformationPolicy
, &r
);
2322 status
= cli
->dispatch(cli
,
2325 NDR_LSA_SETDOMAININFORMATIONPOLICY
,
2328 if (!NT_STATUS_IS_OK(status
)) {
2332 if (DEBUGLEVEL
>= 10) {
2333 NDR_PRINT_OUT_DEBUG(lsa_SetDomainInformationPolicy
, &r
);
2336 if (NT_STATUS_IS_ERR(status
)) {
2340 /* Return variables */
2343 return r
.out
.result
;
2346 NTSTATUS
rpccli_lsa_OpenTrustedDomainByName(struct rpc_pipe_client
*cli
,
2347 TALLOC_CTX
*mem_ctx
,
2348 struct policy_handle
*handle
/* [in] [ref] */,
2349 struct lsa_String name
/* [in] */,
2350 uint32_t access_mask
/* [in] */,
2351 struct policy_handle
*trustdom_handle
/* [out] [ref] */)
2353 struct lsa_OpenTrustedDomainByName r
;
2357 r
.in
.handle
= handle
;
2359 r
.in
.access_mask
= access_mask
;
2361 if (DEBUGLEVEL
>= 10) {
2362 NDR_PRINT_IN_DEBUG(lsa_OpenTrustedDomainByName
, &r
);
2365 status
= cli
->dispatch(cli
,
2368 NDR_LSA_OPENTRUSTEDDOMAINBYNAME
,
2371 if (!NT_STATUS_IS_OK(status
)) {
2375 if (DEBUGLEVEL
>= 10) {
2376 NDR_PRINT_OUT_DEBUG(lsa_OpenTrustedDomainByName
, &r
);
2379 if (NT_STATUS_IS_ERR(status
)) {
2383 /* Return variables */
2384 *trustdom_handle
= *r
.out
.trustdom_handle
;
2387 return r
.out
.result
;
2390 NTSTATUS
rpccli_lsa_TestCall(struct rpc_pipe_client
*cli
,
2391 TALLOC_CTX
*mem_ctx
)
2393 struct lsa_TestCall r
;
2398 if (DEBUGLEVEL
>= 10) {
2399 NDR_PRINT_IN_DEBUG(lsa_TestCall
, &r
);
2402 status
= cli
->dispatch(cli
,
2408 if (!NT_STATUS_IS_OK(status
)) {
2412 if (DEBUGLEVEL
>= 10) {
2413 NDR_PRINT_OUT_DEBUG(lsa_TestCall
, &r
);
2416 if (NT_STATUS_IS_ERR(status
)) {
2420 /* Return variables */
2423 return r
.out
.result
;
2426 NTSTATUS
rpccli_lsa_LookupSids2(struct rpc_pipe_client
*cli
,
2427 TALLOC_CTX
*mem_ctx
,
2428 struct policy_handle
*handle
/* [in] [ref] */,
2429 struct lsa_SidArray
*sids
/* [in] [ref] */,
2430 struct lsa_RefDomainList
**domains
/* [out] [ref] */,
2431 struct lsa_TransNameArray2
*names
/* [in,out] [ref] */,
2432 uint16_t level
/* [in] */,
2433 uint32_t *count
/* [in,out] [ref] */,
2434 uint32_t unknown1
/* [in] */,
2435 uint32_t unknown2
/* [in] */)
2437 struct lsa_LookupSids2 r
;
2441 r
.in
.handle
= handle
;
2446 r
.in
.unknown1
= unknown1
;
2447 r
.in
.unknown2
= unknown2
;
2449 if (DEBUGLEVEL
>= 10) {
2450 NDR_PRINT_IN_DEBUG(lsa_LookupSids2
, &r
);
2453 status
= cli
->dispatch(cli
,
2456 NDR_LSA_LOOKUPSIDS2
,
2459 if (!NT_STATUS_IS_OK(status
)) {
2463 if (DEBUGLEVEL
>= 10) {
2464 NDR_PRINT_OUT_DEBUG(lsa_LookupSids2
, &r
);
2467 if (NT_STATUS_IS_ERR(status
)) {
2471 /* Return variables */
2472 *domains
= *r
.out
.domains
;
2473 *names
= *r
.out
.names
;
2474 *count
= *r
.out
.count
;
2477 return r
.out
.result
;
2480 NTSTATUS
rpccli_lsa_LookupNames2(struct rpc_pipe_client
*cli
,
2481 TALLOC_CTX
*mem_ctx
,
2482 struct policy_handle
*handle
/* [in] [ref] */,
2483 uint32_t num_names
/* [in] [range(0,1000)] */,
2484 struct lsa_String
*names
/* [in] [size_is(num_names)] */,
2485 struct lsa_RefDomainList
**domains
/* [out] [ref] */,
2486 struct lsa_TransSidArray2
*sids
/* [in,out] [ref] */,
2487 enum lsa_LookupNamesLevel level
/* [in] */,
2488 uint32_t *count
/* [in,out] [ref] */,
2489 uint32_t lookup_options
/* [in] */,
2490 uint32_t client_revision
/* [in] */)
2492 struct lsa_LookupNames2 r
;
2496 r
.in
.handle
= handle
;
2497 r
.in
.num_names
= num_names
;
2502 r
.in
.lookup_options
= lookup_options
;
2503 r
.in
.client_revision
= client_revision
;
2505 if (DEBUGLEVEL
>= 10) {
2506 NDR_PRINT_IN_DEBUG(lsa_LookupNames2
, &r
);
2509 status
= cli
->dispatch(cli
,
2512 NDR_LSA_LOOKUPNAMES2
,
2515 if (!NT_STATUS_IS_OK(status
)) {
2519 if (DEBUGLEVEL
>= 10) {
2520 NDR_PRINT_OUT_DEBUG(lsa_LookupNames2
, &r
);
2523 if (NT_STATUS_IS_ERR(status
)) {
2527 /* Return variables */
2528 *domains
= *r
.out
.domains
;
2529 *sids
= *r
.out
.sids
;
2530 *count
= *r
.out
.count
;
2533 return r
.out
.result
;
2536 NTSTATUS
rpccli_lsa_CreateTrustedDomainEx2(struct rpc_pipe_client
*cli
,
2537 TALLOC_CTX
*mem_ctx
,
2538 struct policy_handle
*policy_handle
/* [in] [ref] */,
2539 struct lsa_TrustDomainInfoInfoEx
*info
/* [in] [ref] */,
2540 struct lsa_TrustDomainInfoAuthInfoInternal
*auth_info
/* [in] [ref] */,
2541 uint32_t access_mask
/* [in] */,
2542 struct policy_handle
*trustdom_handle
/* [out] [ref] */)
2544 struct lsa_CreateTrustedDomainEx2 r
;
2548 r
.in
.policy_handle
= policy_handle
;
2550 r
.in
.auth_info
= auth_info
;
2551 r
.in
.access_mask
= access_mask
;
2553 if (DEBUGLEVEL
>= 10) {
2554 NDR_PRINT_IN_DEBUG(lsa_CreateTrustedDomainEx2
, &r
);
2557 status
= cli
->dispatch(cli
,
2560 NDR_LSA_CREATETRUSTEDDOMAINEX2
,
2563 if (!NT_STATUS_IS_OK(status
)) {
2567 if (DEBUGLEVEL
>= 10) {
2568 NDR_PRINT_OUT_DEBUG(lsa_CreateTrustedDomainEx2
, &r
);
2571 if (NT_STATUS_IS_ERR(status
)) {
2575 /* Return variables */
2576 *trustdom_handle
= *r
.out
.trustdom_handle
;
2579 return r
.out
.result
;
2582 NTSTATUS
rpccli_lsa_CREDRWRITE(struct rpc_pipe_client
*cli
,
2583 TALLOC_CTX
*mem_ctx
)
2585 struct lsa_CREDRWRITE r
;
2590 if (DEBUGLEVEL
>= 10) {
2591 NDR_PRINT_IN_DEBUG(lsa_CREDRWRITE
, &r
);
2594 status
= cli
->dispatch(cli
,
2600 if (!NT_STATUS_IS_OK(status
)) {
2604 if (DEBUGLEVEL
>= 10) {
2605 NDR_PRINT_OUT_DEBUG(lsa_CREDRWRITE
, &r
);
2608 if (NT_STATUS_IS_ERR(status
)) {
2612 /* Return variables */
2615 return r
.out
.result
;
2618 NTSTATUS
rpccli_lsa_CREDRREAD(struct rpc_pipe_client
*cli
,
2619 TALLOC_CTX
*mem_ctx
)
2621 struct lsa_CREDRREAD r
;
2626 if (DEBUGLEVEL
>= 10) {
2627 NDR_PRINT_IN_DEBUG(lsa_CREDRREAD
, &r
);
2630 status
= cli
->dispatch(cli
,
2636 if (!NT_STATUS_IS_OK(status
)) {
2640 if (DEBUGLEVEL
>= 10) {
2641 NDR_PRINT_OUT_DEBUG(lsa_CREDRREAD
, &r
);
2644 if (NT_STATUS_IS_ERR(status
)) {
2648 /* Return variables */
2651 return r
.out
.result
;
2654 NTSTATUS
rpccli_lsa_CREDRENUMERATE(struct rpc_pipe_client
*cli
,
2655 TALLOC_CTX
*mem_ctx
)
2657 struct lsa_CREDRENUMERATE r
;
2662 if (DEBUGLEVEL
>= 10) {
2663 NDR_PRINT_IN_DEBUG(lsa_CREDRENUMERATE
, &r
);
2666 status
= cli
->dispatch(cli
,
2669 NDR_LSA_CREDRENUMERATE
,
2672 if (!NT_STATUS_IS_OK(status
)) {
2676 if (DEBUGLEVEL
>= 10) {
2677 NDR_PRINT_OUT_DEBUG(lsa_CREDRENUMERATE
, &r
);
2680 if (NT_STATUS_IS_ERR(status
)) {
2684 /* Return variables */
2687 return r
.out
.result
;
2690 NTSTATUS
rpccli_lsa_CREDRWRITEDOMAINCREDENTIALS(struct rpc_pipe_client
*cli
,
2691 TALLOC_CTX
*mem_ctx
)
2693 struct lsa_CREDRWRITEDOMAINCREDENTIALS r
;
2698 if (DEBUGLEVEL
>= 10) {
2699 NDR_PRINT_IN_DEBUG(lsa_CREDRWRITEDOMAINCREDENTIALS
, &r
);
2702 status
= cli
->dispatch(cli
,
2705 NDR_LSA_CREDRWRITEDOMAINCREDENTIALS
,
2708 if (!NT_STATUS_IS_OK(status
)) {
2712 if (DEBUGLEVEL
>= 10) {
2713 NDR_PRINT_OUT_DEBUG(lsa_CREDRWRITEDOMAINCREDENTIALS
, &r
);
2716 if (NT_STATUS_IS_ERR(status
)) {
2720 /* Return variables */
2723 return r
.out
.result
;
2726 NTSTATUS
rpccli_lsa_CREDRREADDOMAINCREDENTIALS(struct rpc_pipe_client
*cli
,
2727 TALLOC_CTX
*mem_ctx
)
2729 struct lsa_CREDRREADDOMAINCREDENTIALS r
;
2734 if (DEBUGLEVEL
>= 10) {
2735 NDR_PRINT_IN_DEBUG(lsa_CREDRREADDOMAINCREDENTIALS
, &r
);
2738 status
= cli
->dispatch(cli
,
2741 NDR_LSA_CREDRREADDOMAINCREDENTIALS
,
2744 if (!NT_STATUS_IS_OK(status
)) {
2748 if (DEBUGLEVEL
>= 10) {
2749 NDR_PRINT_OUT_DEBUG(lsa_CREDRREADDOMAINCREDENTIALS
, &r
);
2752 if (NT_STATUS_IS_ERR(status
)) {
2756 /* Return variables */
2759 return r
.out
.result
;
2762 NTSTATUS
rpccli_lsa_CREDRDELETE(struct rpc_pipe_client
*cli
,
2763 TALLOC_CTX
*mem_ctx
)
2765 struct lsa_CREDRDELETE r
;
2770 if (DEBUGLEVEL
>= 10) {
2771 NDR_PRINT_IN_DEBUG(lsa_CREDRDELETE
, &r
);
2774 status
= cli
->dispatch(cli
,
2777 NDR_LSA_CREDRDELETE
,
2780 if (!NT_STATUS_IS_OK(status
)) {
2784 if (DEBUGLEVEL
>= 10) {
2785 NDR_PRINT_OUT_DEBUG(lsa_CREDRDELETE
, &r
);
2788 if (NT_STATUS_IS_ERR(status
)) {
2792 /* Return variables */
2795 return r
.out
.result
;
2798 NTSTATUS
rpccli_lsa_CREDRGETTARGETINFO(struct rpc_pipe_client
*cli
,
2799 TALLOC_CTX
*mem_ctx
)
2801 struct lsa_CREDRGETTARGETINFO r
;
2806 if (DEBUGLEVEL
>= 10) {
2807 NDR_PRINT_IN_DEBUG(lsa_CREDRGETTARGETINFO
, &r
);
2810 status
= cli
->dispatch(cli
,
2813 NDR_LSA_CREDRGETTARGETINFO
,
2816 if (!NT_STATUS_IS_OK(status
)) {
2820 if (DEBUGLEVEL
>= 10) {
2821 NDR_PRINT_OUT_DEBUG(lsa_CREDRGETTARGETINFO
, &r
);
2824 if (NT_STATUS_IS_ERR(status
)) {
2828 /* Return variables */
2831 return r
.out
.result
;
2834 NTSTATUS
rpccli_lsa_CREDRPROFILELOADED(struct rpc_pipe_client
*cli
,
2835 TALLOC_CTX
*mem_ctx
)
2837 struct lsa_CREDRPROFILELOADED r
;
2842 if (DEBUGLEVEL
>= 10) {
2843 NDR_PRINT_IN_DEBUG(lsa_CREDRPROFILELOADED
, &r
);
2846 status
= cli
->dispatch(cli
,
2849 NDR_LSA_CREDRPROFILELOADED
,
2852 if (!NT_STATUS_IS_OK(status
)) {
2856 if (DEBUGLEVEL
>= 10) {
2857 NDR_PRINT_OUT_DEBUG(lsa_CREDRPROFILELOADED
, &r
);
2860 if (NT_STATUS_IS_ERR(status
)) {
2864 /* Return variables */
2867 return r
.out
.result
;
2870 NTSTATUS
rpccli_lsa_LookupNames3(struct rpc_pipe_client
*cli
,
2871 TALLOC_CTX
*mem_ctx
,
2872 struct policy_handle
*handle
/* [in] [ref] */,
2873 uint32_t num_names
/* [in] [range(0,1000)] */,
2874 struct lsa_String
*names
/* [in] [size_is(num_names)] */,
2875 struct lsa_RefDomainList
**domains
/* [out] [ref] */,
2876 struct lsa_TransSidArray3
*sids
/* [in,out] [ref] */,
2877 enum lsa_LookupNamesLevel level
/* [in] */,
2878 uint32_t *count
/* [in,out] [ref] */,
2879 uint32_t lookup_options
/* [in] */,
2880 uint32_t client_revision
/* [in] */)
2882 struct lsa_LookupNames3 r
;
2886 r
.in
.handle
= handle
;
2887 r
.in
.num_names
= num_names
;
2892 r
.in
.lookup_options
= lookup_options
;
2893 r
.in
.client_revision
= client_revision
;
2895 if (DEBUGLEVEL
>= 10) {
2896 NDR_PRINT_IN_DEBUG(lsa_LookupNames3
, &r
);
2899 status
= cli
->dispatch(cli
,
2902 NDR_LSA_LOOKUPNAMES3
,
2905 if (!NT_STATUS_IS_OK(status
)) {
2909 if (DEBUGLEVEL
>= 10) {
2910 NDR_PRINT_OUT_DEBUG(lsa_LookupNames3
, &r
);
2913 if (NT_STATUS_IS_ERR(status
)) {
2917 /* Return variables */
2918 *domains
= *r
.out
.domains
;
2919 *sids
= *r
.out
.sids
;
2920 *count
= *r
.out
.count
;
2923 return r
.out
.result
;
2926 NTSTATUS
rpccli_lsa_CREDRGETSESSIONTYPES(struct rpc_pipe_client
*cli
,
2927 TALLOC_CTX
*mem_ctx
)
2929 struct lsa_CREDRGETSESSIONTYPES r
;
2934 if (DEBUGLEVEL
>= 10) {
2935 NDR_PRINT_IN_DEBUG(lsa_CREDRGETSESSIONTYPES
, &r
);
2938 status
= cli
->dispatch(cli
,
2941 NDR_LSA_CREDRGETSESSIONTYPES
,
2944 if (!NT_STATUS_IS_OK(status
)) {
2948 if (DEBUGLEVEL
>= 10) {
2949 NDR_PRINT_OUT_DEBUG(lsa_CREDRGETSESSIONTYPES
, &r
);
2952 if (NT_STATUS_IS_ERR(status
)) {
2956 /* Return variables */
2959 return r
.out
.result
;
2962 NTSTATUS
rpccli_lsa_LSARREGISTERAUDITEVENT(struct rpc_pipe_client
*cli
,
2963 TALLOC_CTX
*mem_ctx
)
2965 struct lsa_LSARREGISTERAUDITEVENT r
;
2970 if (DEBUGLEVEL
>= 10) {
2971 NDR_PRINT_IN_DEBUG(lsa_LSARREGISTERAUDITEVENT
, &r
);
2974 status
= cli
->dispatch(cli
,
2977 NDR_LSA_LSARREGISTERAUDITEVENT
,
2980 if (!NT_STATUS_IS_OK(status
)) {
2984 if (DEBUGLEVEL
>= 10) {
2985 NDR_PRINT_OUT_DEBUG(lsa_LSARREGISTERAUDITEVENT
, &r
);
2988 if (NT_STATUS_IS_ERR(status
)) {
2992 /* Return variables */
2995 return r
.out
.result
;
2998 NTSTATUS
rpccli_lsa_LSARGENAUDITEVENT(struct rpc_pipe_client
*cli
,
2999 TALLOC_CTX
*mem_ctx
)
3001 struct lsa_LSARGENAUDITEVENT r
;
3006 if (DEBUGLEVEL
>= 10) {
3007 NDR_PRINT_IN_DEBUG(lsa_LSARGENAUDITEVENT
, &r
);
3010 status
= cli
->dispatch(cli
,
3013 NDR_LSA_LSARGENAUDITEVENT
,
3016 if (!NT_STATUS_IS_OK(status
)) {
3020 if (DEBUGLEVEL
>= 10) {
3021 NDR_PRINT_OUT_DEBUG(lsa_LSARGENAUDITEVENT
, &r
);
3024 if (NT_STATUS_IS_ERR(status
)) {
3028 /* Return variables */
3031 return r
.out
.result
;
3034 NTSTATUS
rpccli_lsa_LSARUNREGISTERAUDITEVENT(struct rpc_pipe_client
*cli
,
3035 TALLOC_CTX
*mem_ctx
)
3037 struct lsa_LSARUNREGISTERAUDITEVENT r
;
3042 if (DEBUGLEVEL
>= 10) {
3043 NDR_PRINT_IN_DEBUG(lsa_LSARUNREGISTERAUDITEVENT
, &r
);
3046 status
= cli
->dispatch(cli
,
3049 NDR_LSA_LSARUNREGISTERAUDITEVENT
,
3052 if (!NT_STATUS_IS_OK(status
)) {
3056 if (DEBUGLEVEL
>= 10) {
3057 NDR_PRINT_OUT_DEBUG(lsa_LSARUNREGISTERAUDITEVENT
, &r
);
3060 if (NT_STATUS_IS_ERR(status
)) {
3064 /* Return variables */
3067 return r
.out
.result
;
3070 NTSTATUS
rpccli_lsa_lsaRQueryForestTrustInformation(struct rpc_pipe_client
*cli
,
3071 TALLOC_CTX
*mem_ctx
,
3072 struct policy_handle
*handle
/* [in] [ref] */,
3073 struct lsa_String
*trusted_domain_name
/* [in] [ref] */,
3074 uint16_t unknown
/* [in] */,
3075 struct lsa_ForestTrustInformation
**forest_trust_info
/* [out] [ref] */)
3077 struct lsa_lsaRQueryForestTrustInformation r
;
3081 r
.in
.handle
= handle
;
3082 r
.in
.trusted_domain_name
= trusted_domain_name
;
3083 r
.in
.unknown
= unknown
;
3085 if (DEBUGLEVEL
>= 10) {
3086 NDR_PRINT_IN_DEBUG(lsa_lsaRQueryForestTrustInformation
, &r
);
3089 status
= cli
->dispatch(cli
,
3092 NDR_LSA_LSARQUERYFORESTTRUSTINFORMATION
,
3095 if (!NT_STATUS_IS_OK(status
)) {
3099 if (DEBUGLEVEL
>= 10) {
3100 NDR_PRINT_OUT_DEBUG(lsa_lsaRQueryForestTrustInformation
, &r
);
3103 if (NT_STATUS_IS_ERR(status
)) {
3107 /* Return variables */
3108 *forest_trust_info
= *r
.out
.forest_trust_info
;
3111 return r
.out
.result
;
3114 NTSTATUS
rpccli_lsa_LSARSETFORESTTRUSTINFORMATION(struct rpc_pipe_client
*cli
,
3115 TALLOC_CTX
*mem_ctx
)
3117 struct lsa_LSARSETFORESTTRUSTINFORMATION r
;
3122 if (DEBUGLEVEL
>= 10) {
3123 NDR_PRINT_IN_DEBUG(lsa_LSARSETFORESTTRUSTINFORMATION
, &r
);
3126 status
= cli
->dispatch(cli
,
3129 NDR_LSA_LSARSETFORESTTRUSTINFORMATION
,
3132 if (!NT_STATUS_IS_OK(status
)) {
3136 if (DEBUGLEVEL
>= 10) {
3137 NDR_PRINT_OUT_DEBUG(lsa_LSARSETFORESTTRUSTINFORMATION
, &r
);
3140 if (NT_STATUS_IS_ERR(status
)) {
3144 /* Return variables */
3147 return r
.out
.result
;
3150 NTSTATUS
rpccli_lsa_CREDRRENAME(struct rpc_pipe_client
*cli
,
3151 TALLOC_CTX
*mem_ctx
)
3153 struct lsa_CREDRRENAME r
;
3158 if (DEBUGLEVEL
>= 10) {
3159 NDR_PRINT_IN_DEBUG(lsa_CREDRRENAME
, &r
);
3162 status
= cli
->dispatch(cli
,
3165 NDR_LSA_CREDRRENAME
,
3168 if (!NT_STATUS_IS_OK(status
)) {
3172 if (DEBUGLEVEL
>= 10) {
3173 NDR_PRINT_OUT_DEBUG(lsa_CREDRRENAME
, &r
);
3176 if (NT_STATUS_IS_ERR(status
)) {
3180 /* Return variables */
3183 return r
.out
.result
;
3186 NTSTATUS
rpccli_lsa_LookupSids3(struct rpc_pipe_client
*cli
,
3187 TALLOC_CTX
*mem_ctx
,
3188 struct lsa_SidArray
*sids
/* [in] [ref] */,
3189 struct lsa_RefDomainList
**domains
/* [out] [ref] */,
3190 struct lsa_TransNameArray2
*names
/* [in,out] [ref] */,
3191 uint16_t level
/* [in] */,
3192 uint32_t *count
/* [in,out] [ref] */,
3193 uint32_t unknown1
/* [in] */,
3194 uint32_t unknown2
/* [in] */)
3196 struct lsa_LookupSids3 r
;
3204 r
.in
.unknown1
= unknown1
;
3205 r
.in
.unknown2
= unknown2
;
3207 if (DEBUGLEVEL
>= 10) {
3208 NDR_PRINT_IN_DEBUG(lsa_LookupSids3
, &r
);
3211 status
= cli
->dispatch(cli
,
3214 NDR_LSA_LOOKUPSIDS3
,
3217 if (!NT_STATUS_IS_OK(status
)) {
3221 if (DEBUGLEVEL
>= 10) {
3222 NDR_PRINT_OUT_DEBUG(lsa_LookupSids3
, &r
);
3225 if (NT_STATUS_IS_ERR(status
)) {
3229 /* Return variables */
3230 *domains
= *r
.out
.domains
;
3231 *names
= *r
.out
.names
;
3232 *count
= *r
.out
.count
;
3235 return r
.out
.result
;
3238 NTSTATUS
rpccli_lsa_LookupNames4(struct rpc_pipe_client
*cli
,
3239 TALLOC_CTX
*mem_ctx
,
3240 uint32_t num_names
/* [in] [range(0,1000)] */,
3241 struct lsa_String
*names
/* [in] [size_is(num_names)] */,
3242 struct lsa_RefDomainList
**domains
/* [out] [ref] */,
3243 struct lsa_TransSidArray3
*sids
/* [in,out] [ref] */,
3244 enum lsa_LookupNamesLevel level
/* [in] */,
3245 uint32_t *count
/* [in,out] [ref] */,
3246 uint32_t lookup_options
/* [in] */,
3247 uint32_t client_revision
/* [in] */)
3249 struct lsa_LookupNames4 r
;
3253 r
.in
.num_names
= num_names
;
3258 r
.in
.lookup_options
= lookup_options
;
3259 r
.in
.client_revision
= client_revision
;
3261 if (DEBUGLEVEL
>= 10) {
3262 NDR_PRINT_IN_DEBUG(lsa_LookupNames4
, &r
);
3265 status
= cli
->dispatch(cli
,
3268 NDR_LSA_LOOKUPNAMES4
,
3271 if (!NT_STATUS_IS_OK(status
)) {
3275 if (DEBUGLEVEL
>= 10) {
3276 NDR_PRINT_OUT_DEBUG(lsa_LookupNames4
, &r
);
3279 if (NT_STATUS_IS_ERR(status
)) {
3283 /* Return variables */
3284 *domains
= *r
.out
.domains
;
3285 *sids
= *r
.out
.sids
;
3286 *count
= *r
.out
.count
;
3289 return r
.out
.result
;
3292 NTSTATUS
rpccli_lsa_LSAROPENPOLICYSCE(struct rpc_pipe_client
*cli
,
3293 TALLOC_CTX
*mem_ctx
)
3295 struct lsa_LSAROPENPOLICYSCE r
;
3300 if (DEBUGLEVEL
>= 10) {
3301 NDR_PRINT_IN_DEBUG(lsa_LSAROPENPOLICYSCE
, &r
);
3304 status
= cli
->dispatch(cli
,
3307 NDR_LSA_LSAROPENPOLICYSCE
,
3310 if (!NT_STATUS_IS_OK(status
)) {
3314 if (DEBUGLEVEL
>= 10) {
3315 NDR_PRINT_OUT_DEBUG(lsa_LSAROPENPOLICYSCE
, &r
);
3318 if (NT_STATUS_IS_ERR(status
)) {
3322 /* Return variables */
3325 return r
.out
.result
;
3328 NTSTATUS
rpccli_lsa_LSARADTREGISTERSECURITYEVENTSOURCE(struct rpc_pipe_client
*cli
,
3329 TALLOC_CTX
*mem_ctx
)
3331 struct lsa_LSARADTREGISTERSECURITYEVENTSOURCE r
;
3336 if (DEBUGLEVEL
>= 10) {
3337 NDR_PRINT_IN_DEBUG(lsa_LSARADTREGISTERSECURITYEVENTSOURCE
, &r
);
3340 status
= cli
->dispatch(cli
,
3343 NDR_LSA_LSARADTREGISTERSECURITYEVENTSOURCE
,
3346 if (!NT_STATUS_IS_OK(status
)) {
3350 if (DEBUGLEVEL
>= 10) {
3351 NDR_PRINT_OUT_DEBUG(lsa_LSARADTREGISTERSECURITYEVENTSOURCE
, &r
);
3354 if (NT_STATUS_IS_ERR(status
)) {
3358 /* Return variables */
3361 return r
.out
.result
;
3364 NTSTATUS
rpccli_lsa_LSARADTUNREGISTERSECURITYEVENTSOURCE(struct rpc_pipe_client
*cli
,
3365 TALLOC_CTX
*mem_ctx
)
3367 struct lsa_LSARADTUNREGISTERSECURITYEVENTSOURCE r
;
3372 if (DEBUGLEVEL
>= 10) {
3373 NDR_PRINT_IN_DEBUG(lsa_LSARADTUNREGISTERSECURITYEVENTSOURCE
, &r
);
3376 status
= cli
->dispatch(cli
,
3379 NDR_LSA_LSARADTUNREGISTERSECURITYEVENTSOURCE
,
3382 if (!NT_STATUS_IS_OK(status
)) {
3386 if (DEBUGLEVEL
>= 10) {
3387 NDR_PRINT_OUT_DEBUG(lsa_LSARADTUNREGISTERSECURITYEVENTSOURCE
, &r
);
3390 if (NT_STATUS_IS_ERR(status
)) {
3394 /* Return variables */
3397 return r
.out
.result
;
3400 NTSTATUS
rpccli_lsa_LSARADTREPORTSECURITYEVENT(struct rpc_pipe_client
*cli
,
3401 TALLOC_CTX
*mem_ctx
)
3403 struct lsa_LSARADTREPORTSECURITYEVENT r
;
3408 if (DEBUGLEVEL
>= 10) {
3409 NDR_PRINT_IN_DEBUG(lsa_LSARADTREPORTSECURITYEVENT
, &r
);
3412 status
= cli
->dispatch(cli
,
3415 NDR_LSA_LSARADTREPORTSECURITYEVENT
,
3418 if (!NT_STATUS_IS_OK(status
)) {
3422 if (DEBUGLEVEL
>= 10) {
3423 NDR_PRINT_OUT_DEBUG(lsa_LSARADTREPORTSECURITYEVENT
, &r
);
3426 if (NT_STATUS_IS_ERR(status
)) {
3430 /* Return variables */
3433 return r
.out
.result
;