2 * Unix SMB/CIFS implementation.
3 * client auto-generated by pidl. DO NOT MODIFY!
7 #include "librpc/gen_ndr/cli_lsa.h"
9 NTSTATUS
rpccli_lsa_Close(struct rpc_pipe_client
*cli
,
11 struct policy_handle
*handle
/* [in,out] [ref] */)
19 if (DEBUGLEVEL
>= 10) {
20 NDR_PRINT_IN_DEBUG(lsa_Close
, &r
);
23 status
= cli_do_rpc_ndr(cli
,
30 if (!NT_STATUS_IS_OK(status
)) {
34 if (DEBUGLEVEL
>= 10) {
35 NDR_PRINT_OUT_DEBUG(lsa_Close
, &r
);
38 if (NT_STATUS_IS_ERR(status
)) {
42 /* Return variables */
43 *handle
= *r
.out
.handle
;
49 NTSTATUS
rpccli_lsa_Delete(struct rpc_pipe_client
*cli
,
51 struct policy_handle
*handle
/* [in] [ref] */)
59 if (DEBUGLEVEL
>= 10) {
60 NDR_PRINT_IN_DEBUG(lsa_Delete
, &r
);
63 status
= cli_do_rpc_ndr(cli
,
70 if (!NT_STATUS_IS_OK(status
)) {
74 if (DEBUGLEVEL
>= 10) {
75 NDR_PRINT_OUT_DEBUG(lsa_Delete
, &r
);
78 if (NT_STATUS_IS_ERR(status
)) {
82 /* Return variables */
88 NTSTATUS
rpccli_lsa_EnumPrivs(struct rpc_pipe_client
*cli
,
90 struct policy_handle
*handle
/* [in] [ref] */,
91 uint32_t *resume_handle
/* [in,out] [ref] */,
92 struct lsa_PrivArray
*privs
/* [out] [ref] */,
93 uint32_t max_count
/* [in] */)
95 struct lsa_EnumPrivs r
;
100 r
.in
.resume_handle
= resume_handle
;
101 r
.in
.max_count
= max_count
;
103 if (DEBUGLEVEL
>= 10) {
104 NDR_PRINT_IN_DEBUG(lsa_EnumPrivs
, &r
);
107 status
= cli_do_rpc_ndr(cli
,
114 if (!NT_STATUS_IS_OK(status
)) {
118 if (DEBUGLEVEL
>= 10) {
119 NDR_PRINT_OUT_DEBUG(lsa_EnumPrivs
, &r
);
122 if (NT_STATUS_IS_ERR(status
)) {
126 /* Return variables */
127 *resume_handle
= *r
.out
.resume_handle
;
128 *privs
= *r
.out
.privs
;
134 NTSTATUS
rpccli_lsa_QuerySecurity(struct rpc_pipe_client
*cli
,
136 struct policy_handle
*handle
/* [in] [ref] */,
137 uint32_t sec_info
/* [in] */,
138 struct sec_desc_buf
**sdbuf
/* [out] [ref] */)
140 struct lsa_QuerySecurity r
;
144 r
.in
.handle
= handle
;
145 r
.in
.sec_info
= sec_info
;
147 if (DEBUGLEVEL
>= 10) {
148 NDR_PRINT_IN_DEBUG(lsa_QuerySecurity
, &r
);
151 status
= cli_do_rpc_ndr(cli
,
155 NDR_LSA_QUERYSECURITY
,
158 if (!NT_STATUS_IS_OK(status
)) {
162 if (DEBUGLEVEL
>= 10) {
163 NDR_PRINT_OUT_DEBUG(lsa_QuerySecurity
, &r
);
166 if (NT_STATUS_IS_ERR(status
)) {
170 /* Return variables */
171 *sdbuf
= *r
.out
.sdbuf
;
177 NTSTATUS
rpccli_lsa_SetSecObj(struct rpc_pipe_client
*cli
,
179 struct policy_handle
*handle
/* [in] [ref] */,
180 uint32_t sec_info
/* [in] */,
181 struct sec_desc_buf
*sdbuf
/* [in] [ref] */)
183 struct lsa_SetSecObj r
;
187 r
.in
.handle
= handle
;
188 r
.in
.sec_info
= sec_info
;
191 if (DEBUGLEVEL
>= 10) {
192 NDR_PRINT_IN_DEBUG(lsa_SetSecObj
, &r
);
195 status
= cli_do_rpc_ndr(cli
,
202 if (!NT_STATUS_IS_OK(status
)) {
206 if (DEBUGLEVEL
>= 10) {
207 NDR_PRINT_OUT_DEBUG(lsa_SetSecObj
, &r
);
210 if (NT_STATUS_IS_ERR(status
)) {
214 /* Return variables */
220 NTSTATUS
rpccli_lsa_ChangePassword(struct rpc_pipe_client
*cli
,
223 struct lsa_ChangePassword r
;
228 if (DEBUGLEVEL
>= 10) {
229 NDR_PRINT_IN_DEBUG(lsa_ChangePassword
, &r
);
232 status
= cli_do_rpc_ndr(cli
,
236 NDR_LSA_CHANGEPASSWORD
,
239 if (!NT_STATUS_IS_OK(status
)) {
243 if (DEBUGLEVEL
>= 10) {
244 NDR_PRINT_OUT_DEBUG(lsa_ChangePassword
, &r
);
247 if (NT_STATUS_IS_ERR(status
)) {
251 /* Return variables */
257 NTSTATUS
rpccli_lsa_OpenPolicy(struct rpc_pipe_client
*cli
,
259 uint16_t *system_name
/* [in] [unique] */,
260 struct lsa_ObjectAttribute
*attr
/* [in] [ref] */,
261 uint32_t access_mask
/* [in] */,
262 struct policy_handle
*handle
/* [out] [ref] */)
264 struct lsa_OpenPolicy r
;
268 r
.in
.system_name
= system_name
;
270 r
.in
.access_mask
= access_mask
;
272 if (DEBUGLEVEL
>= 10) {
273 NDR_PRINT_IN_DEBUG(lsa_OpenPolicy
, &r
);
276 status
= cli_do_rpc_ndr(cli
,
283 if (!NT_STATUS_IS_OK(status
)) {
287 if (DEBUGLEVEL
>= 10) {
288 NDR_PRINT_OUT_DEBUG(lsa_OpenPolicy
, &r
);
291 if (NT_STATUS_IS_ERR(status
)) {
295 /* Return variables */
296 *handle
= *r
.out
.handle
;
302 NTSTATUS
rpccli_lsa_QueryInfoPolicy(struct rpc_pipe_client
*cli
,
304 struct policy_handle
*handle
/* [in] [ref] */,
305 enum lsa_PolicyInfo level
/* [in] */,
306 union lsa_PolicyInformation
**info
/* [out] [ref,switch_is(level)] */)
308 struct lsa_QueryInfoPolicy r
;
312 r
.in
.handle
= handle
;
315 if (DEBUGLEVEL
>= 10) {
316 NDR_PRINT_IN_DEBUG(lsa_QueryInfoPolicy
, &r
);
319 status
= cli_do_rpc_ndr(cli
,
323 NDR_LSA_QUERYINFOPOLICY
,
326 if (!NT_STATUS_IS_OK(status
)) {
330 if (DEBUGLEVEL
>= 10) {
331 NDR_PRINT_OUT_DEBUG(lsa_QueryInfoPolicy
, &r
);
334 if (NT_STATUS_IS_ERR(status
)) {
338 /* Return variables */
345 NTSTATUS
rpccli_lsa_SetInfoPolicy(struct rpc_pipe_client
*cli
,
347 struct policy_handle
*handle
/* [in] [ref] */,
348 enum lsa_PolicyInfo level
/* [in] */,
349 union lsa_PolicyInformation
*info
/* [in] [ref,switch_is(level)] */)
351 struct lsa_SetInfoPolicy r
;
355 r
.in
.handle
= handle
;
359 if (DEBUGLEVEL
>= 10) {
360 NDR_PRINT_IN_DEBUG(lsa_SetInfoPolicy
, &r
);
363 status
= cli_do_rpc_ndr(cli
,
367 NDR_LSA_SETINFOPOLICY
,
370 if (!NT_STATUS_IS_OK(status
)) {
374 if (DEBUGLEVEL
>= 10) {
375 NDR_PRINT_OUT_DEBUG(lsa_SetInfoPolicy
, &r
);
378 if (NT_STATUS_IS_ERR(status
)) {
382 /* Return variables */
388 NTSTATUS
rpccli_lsa_ClearAuditLog(struct rpc_pipe_client
*cli
,
391 struct lsa_ClearAuditLog r
;
396 if (DEBUGLEVEL
>= 10) {
397 NDR_PRINT_IN_DEBUG(lsa_ClearAuditLog
, &r
);
400 status
= cli_do_rpc_ndr(cli
,
404 NDR_LSA_CLEARAUDITLOG
,
407 if (!NT_STATUS_IS_OK(status
)) {
411 if (DEBUGLEVEL
>= 10) {
412 NDR_PRINT_OUT_DEBUG(lsa_ClearAuditLog
, &r
);
415 if (NT_STATUS_IS_ERR(status
)) {
419 /* Return variables */
425 NTSTATUS
rpccli_lsa_CreateAccount(struct rpc_pipe_client
*cli
,
427 struct policy_handle
*handle
/* [in] [ref] */,
428 struct dom_sid2
*sid
/* [in] [ref] */,
429 uint32_t access_mask
/* [in] */,
430 struct policy_handle
*acct_handle
/* [out] [ref] */)
432 struct lsa_CreateAccount r
;
436 r
.in
.handle
= handle
;
438 r
.in
.access_mask
= access_mask
;
440 if (DEBUGLEVEL
>= 10) {
441 NDR_PRINT_IN_DEBUG(lsa_CreateAccount
, &r
);
444 status
= cli_do_rpc_ndr(cli
,
448 NDR_LSA_CREATEACCOUNT
,
451 if (!NT_STATUS_IS_OK(status
)) {
455 if (DEBUGLEVEL
>= 10) {
456 NDR_PRINT_OUT_DEBUG(lsa_CreateAccount
, &r
);
459 if (NT_STATUS_IS_ERR(status
)) {
463 /* Return variables */
464 *acct_handle
= *r
.out
.acct_handle
;
470 NTSTATUS
rpccli_lsa_EnumAccounts(struct rpc_pipe_client
*cli
,
472 struct policy_handle
*handle
/* [in] [ref] */,
473 uint32_t *resume_handle
/* [in,out] [ref] */,
474 struct lsa_SidArray
*sids
/* [out] [ref] */,
475 uint32_t num_entries
/* [in] [range(0,8192)] */)
477 struct lsa_EnumAccounts r
;
481 r
.in
.handle
= handle
;
482 r
.in
.resume_handle
= resume_handle
;
483 r
.in
.num_entries
= num_entries
;
485 if (DEBUGLEVEL
>= 10) {
486 NDR_PRINT_IN_DEBUG(lsa_EnumAccounts
, &r
);
489 status
= cli_do_rpc_ndr(cli
,
493 NDR_LSA_ENUMACCOUNTS
,
496 if (!NT_STATUS_IS_OK(status
)) {
500 if (DEBUGLEVEL
>= 10) {
501 NDR_PRINT_OUT_DEBUG(lsa_EnumAccounts
, &r
);
504 if (NT_STATUS_IS_ERR(status
)) {
508 /* Return variables */
509 *resume_handle
= *r
.out
.resume_handle
;
516 NTSTATUS
rpccli_lsa_CreateTrustedDomain(struct rpc_pipe_client
*cli
,
518 struct policy_handle
*handle
/* [in] [ref] */,
519 struct lsa_DomainInfo
*info
/* [in] [ref] */,
520 uint32_t access_mask
/* [in] */,
521 struct policy_handle
*trustdom_handle
/* [out] [ref] */)
523 struct lsa_CreateTrustedDomain r
;
527 r
.in
.handle
= handle
;
529 r
.in
.access_mask
= access_mask
;
531 if (DEBUGLEVEL
>= 10) {
532 NDR_PRINT_IN_DEBUG(lsa_CreateTrustedDomain
, &r
);
535 status
= cli_do_rpc_ndr(cli
,
539 NDR_LSA_CREATETRUSTEDDOMAIN
,
542 if (!NT_STATUS_IS_OK(status
)) {
546 if (DEBUGLEVEL
>= 10) {
547 NDR_PRINT_OUT_DEBUG(lsa_CreateTrustedDomain
, &r
);
550 if (NT_STATUS_IS_ERR(status
)) {
554 /* Return variables */
555 *trustdom_handle
= *r
.out
.trustdom_handle
;
561 NTSTATUS
rpccli_lsa_EnumTrustDom(struct rpc_pipe_client
*cli
,
563 struct policy_handle
*handle
/* [in] [ref] */,
564 uint32_t *resume_handle
/* [in,out] [ref] */,
565 struct lsa_DomainList
*domains
/* [out] [ref] */,
566 uint32_t max_size
/* [in] */)
568 struct lsa_EnumTrustDom r
;
572 r
.in
.handle
= handle
;
573 r
.in
.resume_handle
= resume_handle
;
574 r
.in
.max_size
= max_size
;
576 if (DEBUGLEVEL
>= 10) {
577 NDR_PRINT_IN_DEBUG(lsa_EnumTrustDom
, &r
);
580 status
= cli_do_rpc_ndr(cli
,
584 NDR_LSA_ENUMTRUSTDOM
,
587 if (!NT_STATUS_IS_OK(status
)) {
591 if (DEBUGLEVEL
>= 10) {
592 NDR_PRINT_OUT_DEBUG(lsa_EnumTrustDom
, &r
);
595 if (NT_STATUS_IS_ERR(status
)) {
599 /* Return variables */
600 *resume_handle
= *r
.out
.resume_handle
;
601 *domains
= *r
.out
.domains
;
607 NTSTATUS
rpccli_lsa_LookupNames(struct rpc_pipe_client
*cli
,
609 struct policy_handle
*handle
/* [in] [ref] */,
610 uint32_t num_names
/* [in] [range(0,1000)] */,
611 struct lsa_String
*names
/* [in] [size_is(num_names)] */,
612 struct lsa_RefDomainList
**domains
/* [out] [ref] */,
613 struct lsa_TransSidArray
*sids
/* [in,out] [ref] */,
614 enum lsa_LookupNamesLevel level
/* [in] */,
615 uint32_t *count
/* [in,out] [ref] */)
617 struct lsa_LookupNames r
;
621 r
.in
.handle
= handle
;
622 r
.in
.num_names
= num_names
;
628 if (DEBUGLEVEL
>= 10) {
629 NDR_PRINT_IN_DEBUG(lsa_LookupNames
, &r
);
632 status
= cli_do_rpc_ndr(cli
,
639 if (!NT_STATUS_IS_OK(status
)) {
643 if (DEBUGLEVEL
>= 10) {
644 NDR_PRINT_OUT_DEBUG(lsa_LookupNames
, &r
);
647 if (NT_STATUS_IS_ERR(status
)) {
651 /* Return variables */
652 *domains
= *r
.out
.domains
;
654 *count
= *r
.out
.count
;
660 NTSTATUS
rpccli_lsa_LookupSids(struct rpc_pipe_client
*cli
,
662 struct policy_handle
*handle
/* [in] [ref] */,
663 struct lsa_SidArray
*sids
/* [in] [ref] */,
664 struct lsa_RefDomainList
**domains
/* [out] [ref] */,
665 struct lsa_TransNameArray
*names
/* [in,out] [ref] */,
666 uint16_t level
/* [in] */,
667 uint32_t *count
/* [in,out] [ref] */)
669 struct lsa_LookupSids r
;
673 r
.in
.handle
= handle
;
679 if (DEBUGLEVEL
>= 10) {
680 NDR_PRINT_IN_DEBUG(lsa_LookupSids
, &r
);
683 status
= cli_do_rpc_ndr(cli
,
690 if (!NT_STATUS_IS_OK(status
)) {
694 if (DEBUGLEVEL
>= 10) {
695 NDR_PRINT_OUT_DEBUG(lsa_LookupSids
, &r
);
698 if (NT_STATUS_IS_ERR(status
)) {
702 /* Return variables */
703 *domains
= *r
.out
.domains
;
704 *names
= *r
.out
.names
;
705 *count
= *r
.out
.count
;
711 NTSTATUS
rpccli_lsa_CreateSecret(struct rpc_pipe_client
*cli
,
713 struct policy_handle
*handle
/* [in] [ref] */,
714 struct lsa_String name
/* [in] */,
715 uint32_t access_mask
/* [in] */,
716 struct policy_handle
*sec_handle
/* [out] [ref] */)
718 struct lsa_CreateSecret r
;
722 r
.in
.handle
= handle
;
724 r
.in
.access_mask
= access_mask
;
726 if (DEBUGLEVEL
>= 10) {
727 NDR_PRINT_IN_DEBUG(lsa_CreateSecret
, &r
);
730 status
= cli_do_rpc_ndr(cli
,
734 NDR_LSA_CREATESECRET
,
737 if (!NT_STATUS_IS_OK(status
)) {
741 if (DEBUGLEVEL
>= 10) {
742 NDR_PRINT_OUT_DEBUG(lsa_CreateSecret
, &r
);
745 if (NT_STATUS_IS_ERR(status
)) {
749 /* Return variables */
750 *sec_handle
= *r
.out
.sec_handle
;
756 NTSTATUS
rpccli_lsa_OpenAccount(struct rpc_pipe_client
*cli
,
758 struct policy_handle
*handle
/* [in] [ref] */,
759 struct dom_sid2
*sid
/* [in] [ref] */,
760 uint32_t access_mask
/* [in] */,
761 struct policy_handle
*acct_handle
/* [out] [ref] */)
763 struct lsa_OpenAccount r
;
767 r
.in
.handle
= handle
;
769 r
.in
.access_mask
= access_mask
;
771 if (DEBUGLEVEL
>= 10) {
772 NDR_PRINT_IN_DEBUG(lsa_OpenAccount
, &r
);
775 status
= cli_do_rpc_ndr(cli
,
782 if (!NT_STATUS_IS_OK(status
)) {
786 if (DEBUGLEVEL
>= 10) {
787 NDR_PRINT_OUT_DEBUG(lsa_OpenAccount
, &r
);
790 if (NT_STATUS_IS_ERR(status
)) {
794 /* Return variables */
795 *acct_handle
= *r
.out
.acct_handle
;
801 NTSTATUS
rpccli_lsa_EnumPrivsAccount(struct rpc_pipe_client
*cli
,
803 struct policy_handle
*handle
/* [in] [ref] */,
804 struct lsa_PrivilegeSet
**privs
/* [out] [ref] */)
806 struct lsa_EnumPrivsAccount r
;
810 r
.in
.handle
= handle
;
812 if (DEBUGLEVEL
>= 10) {
813 NDR_PRINT_IN_DEBUG(lsa_EnumPrivsAccount
, &r
);
816 status
= cli_do_rpc_ndr(cli
,
820 NDR_LSA_ENUMPRIVSACCOUNT
,
823 if (!NT_STATUS_IS_OK(status
)) {
827 if (DEBUGLEVEL
>= 10) {
828 NDR_PRINT_OUT_DEBUG(lsa_EnumPrivsAccount
, &r
);
831 if (NT_STATUS_IS_ERR(status
)) {
835 /* Return variables */
836 *privs
= *r
.out
.privs
;
842 NTSTATUS
rpccli_lsa_AddPrivilegesToAccount(struct rpc_pipe_client
*cli
,
844 struct policy_handle
*handle
/* [in] [ref] */,
845 struct lsa_PrivilegeSet
*privs
/* [in] [ref] */)
847 struct lsa_AddPrivilegesToAccount r
;
851 r
.in
.handle
= handle
;
854 if (DEBUGLEVEL
>= 10) {
855 NDR_PRINT_IN_DEBUG(lsa_AddPrivilegesToAccount
, &r
);
858 status
= cli_do_rpc_ndr(cli
,
862 NDR_LSA_ADDPRIVILEGESTOACCOUNT
,
865 if (!NT_STATUS_IS_OK(status
)) {
869 if (DEBUGLEVEL
>= 10) {
870 NDR_PRINT_OUT_DEBUG(lsa_AddPrivilegesToAccount
, &r
);
873 if (NT_STATUS_IS_ERR(status
)) {
877 /* Return variables */
883 NTSTATUS
rpccli_lsa_RemovePrivilegesFromAccount(struct rpc_pipe_client
*cli
,
885 struct policy_handle
*handle
/* [in] [ref] */,
886 uint8_t remove_all
/* [in] */,
887 struct lsa_PrivilegeSet
*privs
/* [in] [unique] */)
889 struct lsa_RemovePrivilegesFromAccount r
;
893 r
.in
.handle
= handle
;
894 r
.in
.remove_all
= remove_all
;
897 if (DEBUGLEVEL
>= 10) {
898 NDR_PRINT_IN_DEBUG(lsa_RemovePrivilegesFromAccount
, &r
);
901 status
= cli_do_rpc_ndr(cli
,
905 NDR_LSA_REMOVEPRIVILEGESFROMACCOUNT
,
908 if (!NT_STATUS_IS_OK(status
)) {
912 if (DEBUGLEVEL
>= 10) {
913 NDR_PRINT_OUT_DEBUG(lsa_RemovePrivilegesFromAccount
, &r
);
916 if (NT_STATUS_IS_ERR(status
)) {
920 /* Return variables */
926 NTSTATUS
rpccli_lsa_GetQuotasForAccount(struct rpc_pipe_client
*cli
,
929 struct lsa_GetQuotasForAccount r
;
934 if (DEBUGLEVEL
>= 10) {
935 NDR_PRINT_IN_DEBUG(lsa_GetQuotasForAccount
, &r
);
938 status
= cli_do_rpc_ndr(cli
,
942 NDR_LSA_GETQUOTASFORACCOUNT
,
945 if (!NT_STATUS_IS_OK(status
)) {
949 if (DEBUGLEVEL
>= 10) {
950 NDR_PRINT_OUT_DEBUG(lsa_GetQuotasForAccount
, &r
);
953 if (NT_STATUS_IS_ERR(status
)) {
957 /* Return variables */
963 NTSTATUS
rpccli_lsa_SetQuotasForAccount(struct rpc_pipe_client
*cli
,
966 struct lsa_SetQuotasForAccount r
;
971 if (DEBUGLEVEL
>= 10) {
972 NDR_PRINT_IN_DEBUG(lsa_SetQuotasForAccount
, &r
);
975 status
= cli_do_rpc_ndr(cli
,
979 NDR_LSA_SETQUOTASFORACCOUNT
,
982 if (!NT_STATUS_IS_OK(status
)) {
986 if (DEBUGLEVEL
>= 10) {
987 NDR_PRINT_OUT_DEBUG(lsa_SetQuotasForAccount
, &r
);
990 if (NT_STATUS_IS_ERR(status
)) {
994 /* Return variables */
1000 NTSTATUS
rpccli_lsa_GetSystemAccessAccount(struct rpc_pipe_client
*cli
,
1001 TALLOC_CTX
*mem_ctx
,
1002 struct policy_handle
*handle
/* [in] [ref] */,
1003 uint32_t *access_mask
/* [out] [ref] */)
1005 struct lsa_GetSystemAccessAccount r
;
1009 r
.in
.handle
= handle
;
1011 if (DEBUGLEVEL
>= 10) {
1012 NDR_PRINT_IN_DEBUG(lsa_GetSystemAccessAccount
, &r
);
1015 status
= cli_do_rpc_ndr(cli
,
1019 NDR_LSA_GETSYSTEMACCESSACCOUNT
,
1022 if (!NT_STATUS_IS_OK(status
)) {
1026 if (DEBUGLEVEL
>= 10) {
1027 NDR_PRINT_OUT_DEBUG(lsa_GetSystemAccessAccount
, &r
);
1030 if (NT_STATUS_IS_ERR(status
)) {
1034 /* Return variables */
1035 *access_mask
= *r
.out
.access_mask
;
1038 return r
.out
.result
;
1041 NTSTATUS
rpccli_lsa_SetSystemAccessAccount(struct rpc_pipe_client
*cli
,
1042 TALLOC_CTX
*mem_ctx
,
1043 struct policy_handle
*handle
/* [in] [ref] */,
1044 uint32_t access_mask
/* [in] */)
1046 struct lsa_SetSystemAccessAccount r
;
1050 r
.in
.handle
= handle
;
1051 r
.in
.access_mask
= access_mask
;
1053 if (DEBUGLEVEL
>= 10) {
1054 NDR_PRINT_IN_DEBUG(lsa_SetSystemAccessAccount
, &r
);
1057 status
= cli_do_rpc_ndr(cli
,
1061 NDR_LSA_SETSYSTEMACCESSACCOUNT
,
1064 if (!NT_STATUS_IS_OK(status
)) {
1068 if (DEBUGLEVEL
>= 10) {
1069 NDR_PRINT_OUT_DEBUG(lsa_SetSystemAccessAccount
, &r
);
1072 if (NT_STATUS_IS_ERR(status
)) {
1076 /* Return variables */
1079 return r
.out
.result
;
1082 NTSTATUS
rpccli_lsa_OpenTrustedDomain(struct rpc_pipe_client
*cli
,
1083 TALLOC_CTX
*mem_ctx
,
1084 struct policy_handle
*handle
/* [in] [ref] */,
1085 struct dom_sid2
*sid
/* [in] [ref] */,
1086 uint32_t access_mask
/* [in] */,
1087 struct policy_handle
*trustdom_handle
/* [out] [ref] */)
1089 struct lsa_OpenTrustedDomain r
;
1093 r
.in
.handle
= handle
;
1095 r
.in
.access_mask
= access_mask
;
1097 if (DEBUGLEVEL
>= 10) {
1098 NDR_PRINT_IN_DEBUG(lsa_OpenTrustedDomain
, &r
);
1101 status
= cli_do_rpc_ndr(cli
,
1105 NDR_LSA_OPENTRUSTEDDOMAIN
,
1108 if (!NT_STATUS_IS_OK(status
)) {
1112 if (DEBUGLEVEL
>= 10) {
1113 NDR_PRINT_OUT_DEBUG(lsa_OpenTrustedDomain
, &r
);
1116 if (NT_STATUS_IS_ERR(status
)) {
1120 /* Return variables */
1121 *trustdom_handle
= *r
.out
.trustdom_handle
;
1124 return r
.out
.result
;
1127 NTSTATUS
rpccli_lsa_QueryTrustedDomainInfo(struct rpc_pipe_client
*cli
,
1128 TALLOC_CTX
*mem_ctx
,
1129 struct policy_handle
*trustdom_handle
/* [in] [ref] */,
1130 enum lsa_TrustDomInfoEnum level
/* [in] */,
1131 union lsa_TrustedDomainInfo
**info
/* [out] [ref,switch_is(level)] */)
1133 struct lsa_QueryTrustedDomainInfo r
;
1137 r
.in
.trustdom_handle
= trustdom_handle
;
1140 if (DEBUGLEVEL
>= 10) {
1141 NDR_PRINT_IN_DEBUG(lsa_QueryTrustedDomainInfo
, &r
);
1144 status
= cli_do_rpc_ndr(cli
,
1148 NDR_LSA_QUERYTRUSTEDDOMAININFO
,
1151 if (!NT_STATUS_IS_OK(status
)) {
1155 if (DEBUGLEVEL
>= 10) {
1156 NDR_PRINT_OUT_DEBUG(lsa_QueryTrustedDomainInfo
, &r
);
1159 if (NT_STATUS_IS_ERR(status
)) {
1163 /* Return variables */
1164 *info
= *r
.out
.info
;
1167 return r
.out
.result
;
1170 NTSTATUS
rpccli_lsa_SetInformationTrustedDomain(struct rpc_pipe_client
*cli
,
1171 TALLOC_CTX
*mem_ctx
)
1173 struct lsa_SetInformationTrustedDomain r
;
1178 if (DEBUGLEVEL
>= 10) {
1179 NDR_PRINT_IN_DEBUG(lsa_SetInformationTrustedDomain
, &r
);
1182 status
= cli_do_rpc_ndr(cli
,
1186 NDR_LSA_SETINFORMATIONTRUSTEDDOMAIN
,
1189 if (!NT_STATUS_IS_OK(status
)) {
1193 if (DEBUGLEVEL
>= 10) {
1194 NDR_PRINT_OUT_DEBUG(lsa_SetInformationTrustedDomain
, &r
);
1197 if (NT_STATUS_IS_ERR(status
)) {
1201 /* Return variables */
1204 return r
.out
.result
;
1207 NTSTATUS
rpccli_lsa_OpenSecret(struct rpc_pipe_client
*cli
,
1208 TALLOC_CTX
*mem_ctx
,
1209 struct policy_handle
*handle
/* [in] [ref] */,
1210 struct lsa_String name
/* [in] */,
1211 uint32_t access_mask
/* [in] */,
1212 struct policy_handle
*sec_handle
/* [out] [ref] */)
1214 struct lsa_OpenSecret r
;
1218 r
.in
.handle
= handle
;
1220 r
.in
.access_mask
= access_mask
;
1222 if (DEBUGLEVEL
>= 10) {
1223 NDR_PRINT_IN_DEBUG(lsa_OpenSecret
, &r
);
1226 status
= cli_do_rpc_ndr(cli
,
1233 if (!NT_STATUS_IS_OK(status
)) {
1237 if (DEBUGLEVEL
>= 10) {
1238 NDR_PRINT_OUT_DEBUG(lsa_OpenSecret
, &r
);
1241 if (NT_STATUS_IS_ERR(status
)) {
1245 /* Return variables */
1246 *sec_handle
= *r
.out
.sec_handle
;
1249 return r
.out
.result
;
1252 NTSTATUS
rpccli_lsa_SetSecret(struct rpc_pipe_client
*cli
,
1253 TALLOC_CTX
*mem_ctx
,
1254 struct policy_handle
*sec_handle
/* [in] [ref] */,
1255 struct lsa_DATA_BUF
*new_val
/* [in] [unique] */,
1256 struct lsa_DATA_BUF
*old_val
/* [in] [unique] */)
1258 struct lsa_SetSecret r
;
1262 r
.in
.sec_handle
= sec_handle
;
1263 r
.in
.new_val
= new_val
;
1264 r
.in
.old_val
= old_val
;
1266 if (DEBUGLEVEL
>= 10) {
1267 NDR_PRINT_IN_DEBUG(lsa_SetSecret
, &r
);
1270 status
= cli_do_rpc_ndr(cli
,
1277 if (!NT_STATUS_IS_OK(status
)) {
1281 if (DEBUGLEVEL
>= 10) {
1282 NDR_PRINT_OUT_DEBUG(lsa_SetSecret
, &r
);
1285 if (NT_STATUS_IS_ERR(status
)) {
1289 /* Return variables */
1292 return r
.out
.result
;
1295 NTSTATUS
rpccli_lsa_QuerySecret(struct rpc_pipe_client
*cli
,
1296 TALLOC_CTX
*mem_ctx
,
1297 struct policy_handle
*sec_handle
/* [in] [ref] */,
1298 struct lsa_DATA_BUF_PTR
*new_val
/* [in,out] [unique] */,
1299 NTTIME
*new_mtime
/* [in,out] [unique] */,
1300 struct lsa_DATA_BUF_PTR
*old_val
/* [in,out] [unique] */,
1301 NTTIME
*old_mtime
/* [in,out] [unique] */)
1303 struct lsa_QuerySecret r
;
1307 r
.in
.sec_handle
= sec_handle
;
1308 r
.in
.new_val
= new_val
;
1309 r
.in
.new_mtime
= new_mtime
;
1310 r
.in
.old_val
= old_val
;
1311 r
.in
.old_mtime
= old_mtime
;
1313 if (DEBUGLEVEL
>= 10) {
1314 NDR_PRINT_IN_DEBUG(lsa_QuerySecret
, &r
);
1317 status
= cli_do_rpc_ndr(cli
,
1321 NDR_LSA_QUERYSECRET
,
1324 if (!NT_STATUS_IS_OK(status
)) {
1328 if (DEBUGLEVEL
>= 10) {
1329 NDR_PRINT_OUT_DEBUG(lsa_QuerySecret
, &r
);
1332 if (NT_STATUS_IS_ERR(status
)) {
1336 /* Return variables */
1337 if (new_val
&& r
.out
.new_val
) {
1338 *new_val
= *r
.out
.new_val
;
1340 if (new_mtime
&& r
.out
.new_mtime
) {
1341 *new_mtime
= *r
.out
.new_mtime
;
1343 if (old_val
&& r
.out
.old_val
) {
1344 *old_val
= *r
.out
.old_val
;
1346 if (old_mtime
&& r
.out
.old_mtime
) {
1347 *old_mtime
= *r
.out
.old_mtime
;
1351 return r
.out
.result
;
1354 NTSTATUS
rpccli_lsa_LookupPrivValue(struct rpc_pipe_client
*cli
,
1355 TALLOC_CTX
*mem_ctx
,
1356 struct policy_handle
*handle
/* [in] [ref] */,
1357 struct lsa_String
*name
/* [in] [ref] */,
1358 struct lsa_LUID
*luid
/* [out] [ref] */)
1360 struct lsa_LookupPrivValue r
;
1364 r
.in
.handle
= handle
;
1367 if (DEBUGLEVEL
>= 10) {
1368 NDR_PRINT_IN_DEBUG(lsa_LookupPrivValue
, &r
);
1371 status
= cli_do_rpc_ndr(cli
,
1375 NDR_LSA_LOOKUPPRIVVALUE
,
1378 if (!NT_STATUS_IS_OK(status
)) {
1382 if (DEBUGLEVEL
>= 10) {
1383 NDR_PRINT_OUT_DEBUG(lsa_LookupPrivValue
, &r
);
1386 if (NT_STATUS_IS_ERR(status
)) {
1390 /* Return variables */
1391 *luid
= *r
.out
.luid
;
1394 return r
.out
.result
;
1397 NTSTATUS
rpccli_lsa_LookupPrivName(struct rpc_pipe_client
*cli
,
1398 TALLOC_CTX
*mem_ctx
,
1399 struct policy_handle
*handle
/* [in] [ref] */,
1400 struct lsa_LUID
*luid
/* [in] [ref] */,
1401 struct lsa_StringLarge
**name
/* [out] [ref] */)
1403 struct lsa_LookupPrivName r
;
1407 r
.in
.handle
= handle
;
1410 if (DEBUGLEVEL
>= 10) {
1411 NDR_PRINT_IN_DEBUG(lsa_LookupPrivName
, &r
);
1414 status
= cli_do_rpc_ndr(cli
,
1418 NDR_LSA_LOOKUPPRIVNAME
,
1421 if (!NT_STATUS_IS_OK(status
)) {
1425 if (DEBUGLEVEL
>= 10) {
1426 NDR_PRINT_OUT_DEBUG(lsa_LookupPrivName
, &r
);
1429 if (NT_STATUS_IS_ERR(status
)) {
1433 /* Return variables */
1434 *name
= *r
.out
.name
;
1437 return r
.out
.result
;
1440 NTSTATUS
rpccli_lsa_LookupPrivDisplayName(struct rpc_pipe_client
*cli
,
1441 TALLOC_CTX
*mem_ctx
,
1442 struct policy_handle
*handle
/* [in] [ref] */,
1443 struct lsa_String
*name
/* [in] [ref] */,
1444 uint16_t language_id
/* [in] */,
1445 uint16_t language_id_sys
/* [in] */,
1446 struct lsa_StringLarge
**disp_name
/* [out] [ref] */,
1447 uint16_t *returned_language_id
/* [out] [ref] */)
1449 struct lsa_LookupPrivDisplayName r
;
1453 r
.in
.handle
= handle
;
1455 r
.in
.language_id
= language_id
;
1456 r
.in
.language_id_sys
= language_id_sys
;
1458 if (DEBUGLEVEL
>= 10) {
1459 NDR_PRINT_IN_DEBUG(lsa_LookupPrivDisplayName
, &r
);
1462 status
= cli_do_rpc_ndr(cli
,
1466 NDR_LSA_LOOKUPPRIVDISPLAYNAME
,
1469 if (!NT_STATUS_IS_OK(status
)) {
1473 if (DEBUGLEVEL
>= 10) {
1474 NDR_PRINT_OUT_DEBUG(lsa_LookupPrivDisplayName
, &r
);
1477 if (NT_STATUS_IS_ERR(status
)) {
1481 /* Return variables */
1482 *disp_name
= *r
.out
.disp_name
;
1483 *returned_language_id
= *r
.out
.returned_language_id
;
1486 return r
.out
.result
;
1489 NTSTATUS
rpccli_lsa_DeleteObject(struct rpc_pipe_client
*cli
,
1490 TALLOC_CTX
*mem_ctx
,
1491 struct policy_handle
*handle
/* [in,out] [ref] */)
1493 struct lsa_DeleteObject r
;
1497 r
.in
.handle
= handle
;
1499 if (DEBUGLEVEL
>= 10) {
1500 NDR_PRINT_IN_DEBUG(lsa_DeleteObject
, &r
);
1503 status
= cli_do_rpc_ndr(cli
,
1507 NDR_LSA_DELETEOBJECT
,
1510 if (!NT_STATUS_IS_OK(status
)) {
1514 if (DEBUGLEVEL
>= 10) {
1515 NDR_PRINT_OUT_DEBUG(lsa_DeleteObject
, &r
);
1518 if (NT_STATUS_IS_ERR(status
)) {
1522 /* Return variables */
1523 *handle
= *r
.out
.handle
;
1526 return r
.out
.result
;
1529 NTSTATUS
rpccli_lsa_EnumAccountsWithUserRight(struct rpc_pipe_client
*cli
,
1530 TALLOC_CTX
*mem_ctx
,
1531 struct policy_handle
*handle
/* [in] [ref] */,
1532 struct lsa_String
*name
/* [in] [unique] */,
1533 struct lsa_SidArray
*sids
/* [out] [ref] */)
1535 struct lsa_EnumAccountsWithUserRight r
;
1539 r
.in
.handle
= handle
;
1542 if (DEBUGLEVEL
>= 10) {
1543 NDR_PRINT_IN_DEBUG(lsa_EnumAccountsWithUserRight
, &r
);
1546 status
= cli_do_rpc_ndr(cli
,
1550 NDR_LSA_ENUMACCOUNTSWITHUSERRIGHT
,
1553 if (!NT_STATUS_IS_OK(status
)) {
1557 if (DEBUGLEVEL
>= 10) {
1558 NDR_PRINT_OUT_DEBUG(lsa_EnumAccountsWithUserRight
, &r
);
1561 if (NT_STATUS_IS_ERR(status
)) {
1565 /* Return variables */
1566 *sids
= *r
.out
.sids
;
1569 return r
.out
.result
;
1572 NTSTATUS
rpccli_lsa_EnumAccountRights(struct rpc_pipe_client
*cli
,
1573 TALLOC_CTX
*mem_ctx
,
1574 struct policy_handle
*handle
/* [in] [ref] */,
1575 struct dom_sid2
*sid
/* [in] [ref] */,
1576 struct lsa_RightSet
*rights
/* [out] [ref] */)
1578 struct lsa_EnumAccountRights r
;
1582 r
.in
.handle
= handle
;
1585 if (DEBUGLEVEL
>= 10) {
1586 NDR_PRINT_IN_DEBUG(lsa_EnumAccountRights
, &r
);
1589 status
= cli_do_rpc_ndr(cli
,
1593 NDR_LSA_ENUMACCOUNTRIGHTS
,
1596 if (!NT_STATUS_IS_OK(status
)) {
1600 if (DEBUGLEVEL
>= 10) {
1601 NDR_PRINT_OUT_DEBUG(lsa_EnumAccountRights
, &r
);
1604 if (NT_STATUS_IS_ERR(status
)) {
1608 /* Return variables */
1609 *rights
= *r
.out
.rights
;
1612 return r
.out
.result
;
1615 NTSTATUS
rpccli_lsa_AddAccountRights(struct rpc_pipe_client
*cli
,
1616 TALLOC_CTX
*mem_ctx
,
1617 struct policy_handle
*handle
/* [in] [ref] */,
1618 struct dom_sid2
*sid
/* [in] [ref] */,
1619 struct lsa_RightSet
*rights
/* [in] [ref] */)
1621 struct lsa_AddAccountRights r
;
1625 r
.in
.handle
= handle
;
1627 r
.in
.rights
= rights
;
1629 if (DEBUGLEVEL
>= 10) {
1630 NDR_PRINT_IN_DEBUG(lsa_AddAccountRights
, &r
);
1633 status
= cli_do_rpc_ndr(cli
,
1637 NDR_LSA_ADDACCOUNTRIGHTS
,
1640 if (!NT_STATUS_IS_OK(status
)) {
1644 if (DEBUGLEVEL
>= 10) {
1645 NDR_PRINT_OUT_DEBUG(lsa_AddAccountRights
, &r
);
1648 if (NT_STATUS_IS_ERR(status
)) {
1652 /* Return variables */
1655 return r
.out
.result
;
1658 NTSTATUS
rpccli_lsa_RemoveAccountRights(struct rpc_pipe_client
*cli
,
1659 TALLOC_CTX
*mem_ctx
,
1660 struct policy_handle
*handle
/* [in] [ref] */,
1661 struct dom_sid2
*sid
/* [in] [ref] */,
1662 uint8_t remove_all
/* [in] */,
1663 struct lsa_RightSet
*rights
/* [in] [ref] */)
1665 struct lsa_RemoveAccountRights r
;
1669 r
.in
.handle
= handle
;
1671 r
.in
.remove_all
= remove_all
;
1672 r
.in
.rights
= rights
;
1674 if (DEBUGLEVEL
>= 10) {
1675 NDR_PRINT_IN_DEBUG(lsa_RemoveAccountRights
, &r
);
1678 status
= cli_do_rpc_ndr(cli
,
1682 NDR_LSA_REMOVEACCOUNTRIGHTS
,
1685 if (!NT_STATUS_IS_OK(status
)) {
1689 if (DEBUGLEVEL
>= 10) {
1690 NDR_PRINT_OUT_DEBUG(lsa_RemoveAccountRights
, &r
);
1693 if (NT_STATUS_IS_ERR(status
)) {
1697 /* Return variables */
1700 return r
.out
.result
;
1703 NTSTATUS
rpccli_lsa_QueryTrustedDomainInfoBySid(struct rpc_pipe_client
*cli
,
1704 TALLOC_CTX
*mem_ctx
,
1705 struct policy_handle
*handle
/* [in] [ref] */,
1706 struct dom_sid2
*dom_sid
/* [in] [ref] */,
1707 enum lsa_TrustDomInfoEnum level
/* [in] */,
1708 union lsa_TrustedDomainInfo
**info
/* [out] [ref,switch_is(level)] */)
1710 struct lsa_QueryTrustedDomainInfoBySid r
;
1714 r
.in
.handle
= handle
;
1715 r
.in
.dom_sid
= dom_sid
;
1718 if (DEBUGLEVEL
>= 10) {
1719 NDR_PRINT_IN_DEBUG(lsa_QueryTrustedDomainInfoBySid
, &r
);
1722 status
= cli_do_rpc_ndr(cli
,
1726 NDR_LSA_QUERYTRUSTEDDOMAININFOBYSID
,
1729 if (!NT_STATUS_IS_OK(status
)) {
1733 if (DEBUGLEVEL
>= 10) {
1734 NDR_PRINT_OUT_DEBUG(lsa_QueryTrustedDomainInfoBySid
, &r
);
1737 if (NT_STATUS_IS_ERR(status
)) {
1741 /* Return variables */
1742 *info
= *r
.out
.info
;
1745 return r
.out
.result
;
1748 NTSTATUS
rpccli_lsa_SetTrustedDomainInfo(struct rpc_pipe_client
*cli
,
1749 TALLOC_CTX
*mem_ctx
)
1751 struct lsa_SetTrustedDomainInfo r
;
1756 if (DEBUGLEVEL
>= 10) {
1757 NDR_PRINT_IN_DEBUG(lsa_SetTrustedDomainInfo
, &r
);
1760 status
= cli_do_rpc_ndr(cli
,
1764 NDR_LSA_SETTRUSTEDDOMAININFO
,
1767 if (!NT_STATUS_IS_OK(status
)) {
1771 if (DEBUGLEVEL
>= 10) {
1772 NDR_PRINT_OUT_DEBUG(lsa_SetTrustedDomainInfo
, &r
);
1775 if (NT_STATUS_IS_ERR(status
)) {
1779 /* Return variables */
1782 return r
.out
.result
;
1785 NTSTATUS
rpccli_lsa_DeleteTrustedDomain(struct rpc_pipe_client
*cli
,
1786 TALLOC_CTX
*mem_ctx
,
1787 struct policy_handle
*handle
/* [in] [ref] */,
1788 struct dom_sid2
*dom_sid
/* [in] [ref] */)
1790 struct lsa_DeleteTrustedDomain r
;
1794 r
.in
.handle
= handle
;
1795 r
.in
.dom_sid
= dom_sid
;
1797 if (DEBUGLEVEL
>= 10) {
1798 NDR_PRINT_IN_DEBUG(lsa_DeleteTrustedDomain
, &r
);
1801 status
= cli_do_rpc_ndr(cli
,
1805 NDR_LSA_DELETETRUSTEDDOMAIN
,
1808 if (!NT_STATUS_IS_OK(status
)) {
1812 if (DEBUGLEVEL
>= 10) {
1813 NDR_PRINT_OUT_DEBUG(lsa_DeleteTrustedDomain
, &r
);
1816 if (NT_STATUS_IS_ERR(status
)) {
1820 /* Return variables */
1823 return r
.out
.result
;
1826 NTSTATUS
rpccli_lsa_StorePrivateData(struct rpc_pipe_client
*cli
,
1827 TALLOC_CTX
*mem_ctx
)
1829 struct lsa_StorePrivateData r
;
1834 if (DEBUGLEVEL
>= 10) {
1835 NDR_PRINT_IN_DEBUG(lsa_StorePrivateData
, &r
);
1838 status
= cli_do_rpc_ndr(cli
,
1842 NDR_LSA_STOREPRIVATEDATA
,
1845 if (!NT_STATUS_IS_OK(status
)) {
1849 if (DEBUGLEVEL
>= 10) {
1850 NDR_PRINT_OUT_DEBUG(lsa_StorePrivateData
, &r
);
1853 if (NT_STATUS_IS_ERR(status
)) {
1857 /* Return variables */
1860 return r
.out
.result
;
1863 NTSTATUS
rpccli_lsa_RetrievePrivateData(struct rpc_pipe_client
*cli
,
1864 TALLOC_CTX
*mem_ctx
)
1866 struct lsa_RetrievePrivateData r
;
1871 if (DEBUGLEVEL
>= 10) {
1872 NDR_PRINT_IN_DEBUG(lsa_RetrievePrivateData
, &r
);
1875 status
= cli_do_rpc_ndr(cli
,
1879 NDR_LSA_RETRIEVEPRIVATEDATA
,
1882 if (!NT_STATUS_IS_OK(status
)) {
1886 if (DEBUGLEVEL
>= 10) {
1887 NDR_PRINT_OUT_DEBUG(lsa_RetrievePrivateData
, &r
);
1890 if (NT_STATUS_IS_ERR(status
)) {
1894 /* Return variables */
1897 return r
.out
.result
;
1900 NTSTATUS
rpccli_lsa_OpenPolicy2(struct rpc_pipe_client
*cli
,
1901 TALLOC_CTX
*mem_ctx
,
1902 const char *system_name
/* [in] [unique,charset(UTF16)] */,
1903 struct lsa_ObjectAttribute
*attr
/* [in] [ref] */,
1904 uint32_t access_mask
/* [in] */,
1905 struct policy_handle
*handle
/* [out] [ref] */)
1907 struct lsa_OpenPolicy2 r
;
1911 r
.in
.system_name
= system_name
;
1913 r
.in
.access_mask
= access_mask
;
1915 if (DEBUGLEVEL
>= 10) {
1916 NDR_PRINT_IN_DEBUG(lsa_OpenPolicy2
, &r
);
1919 status
= cli_do_rpc_ndr(cli
,
1923 NDR_LSA_OPENPOLICY2
,
1926 if (!NT_STATUS_IS_OK(status
)) {
1930 if (DEBUGLEVEL
>= 10) {
1931 NDR_PRINT_OUT_DEBUG(lsa_OpenPolicy2
, &r
);
1934 if (NT_STATUS_IS_ERR(status
)) {
1938 /* Return variables */
1939 *handle
= *r
.out
.handle
;
1942 return r
.out
.result
;
1945 NTSTATUS
rpccli_lsa_GetUserName(struct rpc_pipe_client
*cli
,
1946 TALLOC_CTX
*mem_ctx
,
1947 const char *system_name
/* [in] [unique,charset(UTF16)] */,
1948 struct lsa_String
**account_name
/* [in,out] [ref] */,
1949 struct lsa_String
**authority_name
/* [in,out] [unique] */)
1951 struct lsa_GetUserName r
;
1955 r
.in
.system_name
= system_name
;
1956 r
.in
.account_name
= account_name
;
1957 r
.in
.authority_name
= authority_name
;
1959 if (DEBUGLEVEL
>= 10) {
1960 NDR_PRINT_IN_DEBUG(lsa_GetUserName
, &r
);
1963 status
= cli_do_rpc_ndr(cli
,
1967 NDR_LSA_GETUSERNAME
,
1970 if (!NT_STATUS_IS_OK(status
)) {
1974 if (DEBUGLEVEL
>= 10) {
1975 NDR_PRINT_OUT_DEBUG(lsa_GetUserName
, &r
);
1978 if (NT_STATUS_IS_ERR(status
)) {
1982 /* Return variables */
1983 *account_name
= *r
.out
.account_name
;
1984 if (authority_name
&& r
.out
.authority_name
) {
1985 *authority_name
= *r
.out
.authority_name
;
1989 return r
.out
.result
;
1992 NTSTATUS
rpccli_lsa_QueryInfoPolicy2(struct rpc_pipe_client
*cli
,
1993 TALLOC_CTX
*mem_ctx
,
1994 struct policy_handle
*handle
/* [in] [ref] */,
1995 enum lsa_PolicyInfo level
/* [in] */,
1996 union lsa_PolicyInformation
**info
/* [out] [ref,switch_is(level)] */)
1998 struct lsa_QueryInfoPolicy2 r
;
2002 r
.in
.handle
= handle
;
2005 if (DEBUGLEVEL
>= 10) {
2006 NDR_PRINT_IN_DEBUG(lsa_QueryInfoPolicy2
, &r
);
2009 status
= cli_do_rpc_ndr(cli
,
2013 NDR_LSA_QUERYINFOPOLICY2
,
2016 if (!NT_STATUS_IS_OK(status
)) {
2020 if (DEBUGLEVEL
>= 10) {
2021 NDR_PRINT_OUT_DEBUG(lsa_QueryInfoPolicy2
, &r
);
2024 if (NT_STATUS_IS_ERR(status
)) {
2028 /* Return variables */
2029 *info
= *r
.out
.info
;
2032 return r
.out
.result
;
2035 NTSTATUS
rpccli_lsa_SetInfoPolicy2(struct rpc_pipe_client
*cli
,
2036 TALLOC_CTX
*mem_ctx
,
2037 struct policy_handle
*handle
/* [in] [ref] */,
2038 enum lsa_PolicyInfo level
/* [in] */,
2039 union lsa_PolicyInformation
*info
/* [in] [ref,switch_is(level)] */)
2041 struct lsa_SetInfoPolicy2 r
;
2045 r
.in
.handle
= handle
;
2049 if (DEBUGLEVEL
>= 10) {
2050 NDR_PRINT_IN_DEBUG(lsa_SetInfoPolicy2
, &r
);
2053 status
= cli_do_rpc_ndr(cli
,
2057 NDR_LSA_SETINFOPOLICY2
,
2060 if (!NT_STATUS_IS_OK(status
)) {
2064 if (DEBUGLEVEL
>= 10) {
2065 NDR_PRINT_OUT_DEBUG(lsa_SetInfoPolicy2
, &r
);
2068 if (NT_STATUS_IS_ERR(status
)) {
2072 /* Return variables */
2075 return r
.out
.result
;
2078 NTSTATUS
rpccli_lsa_QueryTrustedDomainInfoByName(struct rpc_pipe_client
*cli
,
2079 TALLOC_CTX
*mem_ctx
,
2080 struct policy_handle
*handle
/* [in] [ref] */,
2081 struct lsa_String
*trusted_domain
/* [in] [ref] */,
2082 enum lsa_TrustDomInfoEnum level
/* [in] */,
2083 union lsa_TrustedDomainInfo
**info
/* [out] [ref,switch_is(level)] */)
2085 struct lsa_QueryTrustedDomainInfoByName r
;
2089 r
.in
.handle
= handle
;
2090 r
.in
.trusted_domain
= trusted_domain
;
2093 if (DEBUGLEVEL
>= 10) {
2094 NDR_PRINT_IN_DEBUG(lsa_QueryTrustedDomainInfoByName
, &r
);
2097 status
= cli_do_rpc_ndr(cli
,
2101 NDR_LSA_QUERYTRUSTEDDOMAININFOBYNAME
,
2104 if (!NT_STATUS_IS_OK(status
)) {
2108 if (DEBUGLEVEL
>= 10) {
2109 NDR_PRINT_OUT_DEBUG(lsa_QueryTrustedDomainInfoByName
, &r
);
2112 if (NT_STATUS_IS_ERR(status
)) {
2116 /* Return variables */
2117 *info
= *r
.out
.info
;
2120 return r
.out
.result
;
2123 NTSTATUS
rpccli_lsa_SetTrustedDomainInfoByName(struct rpc_pipe_client
*cli
,
2124 TALLOC_CTX
*mem_ctx
,
2125 struct policy_handle
*handle
/* [in] [ref] */,
2126 struct lsa_String trusted_domain
/* [in] */,
2127 enum lsa_TrustDomInfoEnum level
/* [in] */,
2128 union lsa_TrustedDomainInfo
*info
/* [in] [unique,switch_is(level)] */)
2130 struct lsa_SetTrustedDomainInfoByName r
;
2134 r
.in
.handle
= handle
;
2135 r
.in
.trusted_domain
= trusted_domain
;
2139 if (DEBUGLEVEL
>= 10) {
2140 NDR_PRINT_IN_DEBUG(lsa_SetTrustedDomainInfoByName
, &r
);
2143 status
= cli_do_rpc_ndr(cli
,
2147 NDR_LSA_SETTRUSTEDDOMAININFOBYNAME
,
2150 if (!NT_STATUS_IS_OK(status
)) {
2154 if (DEBUGLEVEL
>= 10) {
2155 NDR_PRINT_OUT_DEBUG(lsa_SetTrustedDomainInfoByName
, &r
);
2158 if (NT_STATUS_IS_ERR(status
)) {
2162 /* Return variables */
2165 return r
.out
.result
;
2168 NTSTATUS
rpccli_lsa_EnumTrustedDomainsEx(struct rpc_pipe_client
*cli
,
2169 TALLOC_CTX
*mem_ctx
,
2170 struct policy_handle
*handle
/* [in] [ref] */,
2171 uint32_t *resume_handle
/* [in,out] [ref] */,
2172 struct lsa_DomainListEx
*domains
/* [out] [ref] */,
2173 uint32_t max_size
/* [in] */)
2175 struct lsa_EnumTrustedDomainsEx r
;
2179 r
.in
.handle
= handle
;
2180 r
.in
.resume_handle
= resume_handle
;
2181 r
.in
.max_size
= max_size
;
2183 if (DEBUGLEVEL
>= 10) {
2184 NDR_PRINT_IN_DEBUG(lsa_EnumTrustedDomainsEx
, &r
);
2187 status
= cli_do_rpc_ndr(cli
,
2191 NDR_LSA_ENUMTRUSTEDDOMAINSEX
,
2194 if (!NT_STATUS_IS_OK(status
)) {
2198 if (DEBUGLEVEL
>= 10) {
2199 NDR_PRINT_OUT_DEBUG(lsa_EnumTrustedDomainsEx
, &r
);
2202 if (NT_STATUS_IS_ERR(status
)) {
2206 /* Return variables */
2207 *resume_handle
= *r
.out
.resume_handle
;
2208 *domains
= *r
.out
.domains
;
2211 return r
.out
.result
;
2214 NTSTATUS
rpccli_lsa_CreateTrustedDomainEx(struct rpc_pipe_client
*cli
,
2215 TALLOC_CTX
*mem_ctx
)
2217 struct lsa_CreateTrustedDomainEx r
;
2222 if (DEBUGLEVEL
>= 10) {
2223 NDR_PRINT_IN_DEBUG(lsa_CreateTrustedDomainEx
, &r
);
2226 status
= cli_do_rpc_ndr(cli
,
2230 NDR_LSA_CREATETRUSTEDDOMAINEX
,
2233 if (!NT_STATUS_IS_OK(status
)) {
2237 if (DEBUGLEVEL
>= 10) {
2238 NDR_PRINT_OUT_DEBUG(lsa_CreateTrustedDomainEx
, &r
);
2241 if (NT_STATUS_IS_ERR(status
)) {
2245 /* Return variables */
2248 return r
.out
.result
;
2251 NTSTATUS
rpccli_lsa_CloseTrustedDomainEx(struct rpc_pipe_client
*cli
,
2252 TALLOC_CTX
*mem_ctx
,
2253 struct policy_handle
*handle
/* [in,out] [ref] */)
2255 struct lsa_CloseTrustedDomainEx r
;
2259 r
.in
.handle
= handle
;
2261 if (DEBUGLEVEL
>= 10) {
2262 NDR_PRINT_IN_DEBUG(lsa_CloseTrustedDomainEx
, &r
);
2265 status
= cli_do_rpc_ndr(cli
,
2269 NDR_LSA_CLOSETRUSTEDDOMAINEX
,
2272 if (!NT_STATUS_IS_OK(status
)) {
2276 if (DEBUGLEVEL
>= 10) {
2277 NDR_PRINT_OUT_DEBUG(lsa_CloseTrustedDomainEx
, &r
);
2280 if (NT_STATUS_IS_ERR(status
)) {
2284 /* Return variables */
2285 *handle
= *r
.out
.handle
;
2288 return r
.out
.result
;
2291 NTSTATUS
rpccli_lsa_QueryDomainInformationPolicy(struct rpc_pipe_client
*cli
,
2292 TALLOC_CTX
*mem_ctx
,
2293 struct policy_handle
*handle
/* [in] [ref] */,
2294 uint16_t level
/* [in] */,
2295 union lsa_DomainInformationPolicy
**info
/* [out] [ref,switch_is(level)] */)
2297 struct lsa_QueryDomainInformationPolicy r
;
2301 r
.in
.handle
= handle
;
2304 if (DEBUGLEVEL
>= 10) {
2305 NDR_PRINT_IN_DEBUG(lsa_QueryDomainInformationPolicy
, &r
);
2308 status
= cli_do_rpc_ndr(cli
,
2312 NDR_LSA_QUERYDOMAININFORMATIONPOLICY
,
2315 if (!NT_STATUS_IS_OK(status
)) {
2319 if (DEBUGLEVEL
>= 10) {
2320 NDR_PRINT_OUT_DEBUG(lsa_QueryDomainInformationPolicy
, &r
);
2323 if (NT_STATUS_IS_ERR(status
)) {
2327 /* Return variables */
2328 *info
= *r
.out
.info
;
2331 return r
.out
.result
;
2334 NTSTATUS
rpccli_lsa_SetDomainInformationPolicy(struct rpc_pipe_client
*cli
,
2335 TALLOC_CTX
*mem_ctx
,
2336 struct policy_handle
*handle
/* [in] [ref] */,
2337 uint16_t level
/* [in] */,
2338 union lsa_DomainInformationPolicy
*info
/* [in] [unique,switch_is(level)] */)
2340 struct lsa_SetDomainInformationPolicy r
;
2344 r
.in
.handle
= handle
;
2348 if (DEBUGLEVEL
>= 10) {
2349 NDR_PRINT_IN_DEBUG(lsa_SetDomainInformationPolicy
, &r
);
2352 status
= cli_do_rpc_ndr(cli
,
2356 NDR_LSA_SETDOMAININFORMATIONPOLICY
,
2359 if (!NT_STATUS_IS_OK(status
)) {
2363 if (DEBUGLEVEL
>= 10) {
2364 NDR_PRINT_OUT_DEBUG(lsa_SetDomainInformationPolicy
, &r
);
2367 if (NT_STATUS_IS_ERR(status
)) {
2371 /* Return variables */
2374 return r
.out
.result
;
2377 NTSTATUS
rpccli_lsa_OpenTrustedDomainByName(struct rpc_pipe_client
*cli
,
2378 TALLOC_CTX
*mem_ctx
,
2379 struct policy_handle
*handle
/* [in] [ref] */,
2380 struct lsa_String name
/* [in] */,
2381 uint32_t access_mask
/* [in] */,
2382 struct policy_handle
*trustdom_handle
/* [out] [ref] */)
2384 struct lsa_OpenTrustedDomainByName r
;
2388 r
.in
.handle
= handle
;
2390 r
.in
.access_mask
= access_mask
;
2392 if (DEBUGLEVEL
>= 10) {
2393 NDR_PRINT_IN_DEBUG(lsa_OpenTrustedDomainByName
, &r
);
2396 status
= cli_do_rpc_ndr(cli
,
2400 NDR_LSA_OPENTRUSTEDDOMAINBYNAME
,
2403 if (!NT_STATUS_IS_OK(status
)) {
2407 if (DEBUGLEVEL
>= 10) {
2408 NDR_PRINT_OUT_DEBUG(lsa_OpenTrustedDomainByName
, &r
);
2411 if (NT_STATUS_IS_ERR(status
)) {
2415 /* Return variables */
2416 *trustdom_handle
= *r
.out
.trustdom_handle
;
2419 return r
.out
.result
;
2422 NTSTATUS
rpccli_lsa_TestCall(struct rpc_pipe_client
*cli
,
2423 TALLOC_CTX
*mem_ctx
)
2425 struct lsa_TestCall r
;
2430 if (DEBUGLEVEL
>= 10) {
2431 NDR_PRINT_IN_DEBUG(lsa_TestCall
, &r
);
2434 status
= cli_do_rpc_ndr(cli
,
2441 if (!NT_STATUS_IS_OK(status
)) {
2445 if (DEBUGLEVEL
>= 10) {
2446 NDR_PRINT_OUT_DEBUG(lsa_TestCall
, &r
);
2449 if (NT_STATUS_IS_ERR(status
)) {
2453 /* Return variables */
2456 return r
.out
.result
;
2459 NTSTATUS
rpccli_lsa_LookupSids2(struct rpc_pipe_client
*cli
,
2460 TALLOC_CTX
*mem_ctx
,
2461 struct policy_handle
*handle
/* [in] [ref] */,
2462 struct lsa_SidArray
*sids
/* [in] [ref] */,
2463 struct lsa_RefDomainList
**domains
/* [out] [ref] */,
2464 struct lsa_TransNameArray2
*names
/* [in,out] [ref] */,
2465 uint16_t level
/* [in] */,
2466 uint32_t *count
/* [in,out] [ref] */,
2467 uint32_t unknown1
/* [in] */,
2468 uint32_t unknown2
/* [in] */)
2470 struct lsa_LookupSids2 r
;
2474 r
.in
.handle
= handle
;
2479 r
.in
.unknown1
= unknown1
;
2480 r
.in
.unknown2
= unknown2
;
2482 if (DEBUGLEVEL
>= 10) {
2483 NDR_PRINT_IN_DEBUG(lsa_LookupSids2
, &r
);
2486 status
= cli_do_rpc_ndr(cli
,
2490 NDR_LSA_LOOKUPSIDS2
,
2493 if (!NT_STATUS_IS_OK(status
)) {
2497 if (DEBUGLEVEL
>= 10) {
2498 NDR_PRINT_OUT_DEBUG(lsa_LookupSids2
, &r
);
2501 if (NT_STATUS_IS_ERR(status
)) {
2505 /* Return variables */
2506 *domains
= *r
.out
.domains
;
2507 *names
= *r
.out
.names
;
2508 *count
= *r
.out
.count
;
2511 return r
.out
.result
;
2514 NTSTATUS
rpccli_lsa_LookupNames2(struct rpc_pipe_client
*cli
,
2515 TALLOC_CTX
*mem_ctx
,
2516 struct policy_handle
*handle
/* [in] [ref] */,
2517 uint32_t num_names
/* [in] [range(0,1000)] */,
2518 struct lsa_String
*names
/* [in] [size_is(num_names)] */,
2519 struct lsa_RefDomainList
**domains
/* [out] [ref] */,
2520 struct lsa_TransSidArray2
*sids
/* [in,out] [ref] */,
2521 enum lsa_LookupNamesLevel level
/* [in] */,
2522 uint32_t *count
/* [in,out] [ref] */,
2523 uint32_t unknown1
/* [in] */,
2524 uint32_t unknown2
/* [in] */)
2526 struct lsa_LookupNames2 r
;
2530 r
.in
.handle
= handle
;
2531 r
.in
.num_names
= num_names
;
2536 r
.in
.unknown1
= unknown1
;
2537 r
.in
.unknown2
= unknown2
;
2539 if (DEBUGLEVEL
>= 10) {
2540 NDR_PRINT_IN_DEBUG(lsa_LookupNames2
, &r
);
2543 status
= cli_do_rpc_ndr(cli
,
2547 NDR_LSA_LOOKUPNAMES2
,
2550 if (!NT_STATUS_IS_OK(status
)) {
2554 if (DEBUGLEVEL
>= 10) {
2555 NDR_PRINT_OUT_DEBUG(lsa_LookupNames2
, &r
);
2558 if (NT_STATUS_IS_ERR(status
)) {
2562 /* Return variables */
2563 *domains
= *r
.out
.domains
;
2564 *sids
= *r
.out
.sids
;
2565 *count
= *r
.out
.count
;
2568 return r
.out
.result
;
2571 NTSTATUS
rpccli_lsa_CreateTrustedDomainEx2(struct rpc_pipe_client
*cli
,
2572 TALLOC_CTX
*mem_ctx
)
2574 struct lsa_CreateTrustedDomainEx2 r
;
2579 if (DEBUGLEVEL
>= 10) {
2580 NDR_PRINT_IN_DEBUG(lsa_CreateTrustedDomainEx2
, &r
);
2583 status
= cli_do_rpc_ndr(cli
,
2587 NDR_LSA_CREATETRUSTEDDOMAINEX2
,
2590 if (!NT_STATUS_IS_OK(status
)) {
2594 if (DEBUGLEVEL
>= 10) {
2595 NDR_PRINT_OUT_DEBUG(lsa_CreateTrustedDomainEx2
, &r
);
2598 if (NT_STATUS_IS_ERR(status
)) {
2602 /* Return variables */
2605 return r
.out
.result
;
2608 NTSTATUS
rpccli_lsa_CREDRWRITE(struct rpc_pipe_client
*cli
,
2609 TALLOC_CTX
*mem_ctx
)
2611 struct lsa_CREDRWRITE r
;
2616 if (DEBUGLEVEL
>= 10) {
2617 NDR_PRINT_IN_DEBUG(lsa_CREDRWRITE
, &r
);
2620 status
= cli_do_rpc_ndr(cli
,
2627 if (!NT_STATUS_IS_OK(status
)) {
2631 if (DEBUGLEVEL
>= 10) {
2632 NDR_PRINT_OUT_DEBUG(lsa_CREDRWRITE
, &r
);
2635 if (NT_STATUS_IS_ERR(status
)) {
2639 /* Return variables */
2642 return r
.out
.result
;
2645 NTSTATUS
rpccli_lsa_CREDRREAD(struct rpc_pipe_client
*cli
,
2646 TALLOC_CTX
*mem_ctx
)
2648 struct lsa_CREDRREAD r
;
2653 if (DEBUGLEVEL
>= 10) {
2654 NDR_PRINT_IN_DEBUG(lsa_CREDRREAD
, &r
);
2657 status
= cli_do_rpc_ndr(cli
,
2664 if (!NT_STATUS_IS_OK(status
)) {
2668 if (DEBUGLEVEL
>= 10) {
2669 NDR_PRINT_OUT_DEBUG(lsa_CREDRREAD
, &r
);
2672 if (NT_STATUS_IS_ERR(status
)) {
2676 /* Return variables */
2679 return r
.out
.result
;
2682 NTSTATUS
rpccli_lsa_CREDRENUMERATE(struct rpc_pipe_client
*cli
,
2683 TALLOC_CTX
*mem_ctx
)
2685 struct lsa_CREDRENUMERATE r
;
2690 if (DEBUGLEVEL
>= 10) {
2691 NDR_PRINT_IN_DEBUG(lsa_CREDRENUMERATE
, &r
);
2694 status
= cli_do_rpc_ndr(cli
,
2698 NDR_LSA_CREDRENUMERATE
,
2701 if (!NT_STATUS_IS_OK(status
)) {
2705 if (DEBUGLEVEL
>= 10) {
2706 NDR_PRINT_OUT_DEBUG(lsa_CREDRENUMERATE
, &r
);
2709 if (NT_STATUS_IS_ERR(status
)) {
2713 /* Return variables */
2716 return r
.out
.result
;
2719 NTSTATUS
rpccli_lsa_CREDRWRITEDOMAINCREDENTIALS(struct rpc_pipe_client
*cli
,
2720 TALLOC_CTX
*mem_ctx
)
2722 struct lsa_CREDRWRITEDOMAINCREDENTIALS r
;
2727 if (DEBUGLEVEL
>= 10) {
2728 NDR_PRINT_IN_DEBUG(lsa_CREDRWRITEDOMAINCREDENTIALS
, &r
);
2731 status
= cli_do_rpc_ndr(cli
,
2735 NDR_LSA_CREDRWRITEDOMAINCREDENTIALS
,
2738 if (!NT_STATUS_IS_OK(status
)) {
2742 if (DEBUGLEVEL
>= 10) {
2743 NDR_PRINT_OUT_DEBUG(lsa_CREDRWRITEDOMAINCREDENTIALS
, &r
);
2746 if (NT_STATUS_IS_ERR(status
)) {
2750 /* Return variables */
2753 return r
.out
.result
;
2756 NTSTATUS
rpccli_lsa_CREDRREADDOMAINCREDENTIALS(struct rpc_pipe_client
*cli
,
2757 TALLOC_CTX
*mem_ctx
)
2759 struct lsa_CREDRREADDOMAINCREDENTIALS r
;
2764 if (DEBUGLEVEL
>= 10) {
2765 NDR_PRINT_IN_DEBUG(lsa_CREDRREADDOMAINCREDENTIALS
, &r
);
2768 status
= cli_do_rpc_ndr(cli
,
2772 NDR_LSA_CREDRREADDOMAINCREDENTIALS
,
2775 if (!NT_STATUS_IS_OK(status
)) {
2779 if (DEBUGLEVEL
>= 10) {
2780 NDR_PRINT_OUT_DEBUG(lsa_CREDRREADDOMAINCREDENTIALS
, &r
);
2783 if (NT_STATUS_IS_ERR(status
)) {
2787 /* Return variables */
2790 return r
.out
.result
;
2793 NTSTATUS
rpccli_lsa_CREDRDELETE(struct rpc_pipe_client
*cli
,
2794 TALLOC_CTX
*mem_ctx
)
2796 struct lsa_CREDRDELETE r
;
2801 if (DEBUGLEVEL
>= 10) {
2802 NDR_PRINT_IN_DEBUG(lsa_CREDRDELETE
, &r
);
2805 status
= cli_do_rpc_ndr(cli
,
2809 NDR_LSA_CREDRDELETE
,
2812 if (!NT_STATUS_IS_OK(status
)) {
2816 if (DEBUGLEVEL
>= 10) {
2817 NDR_PRINT_OUT_DEBUG(lsa_CREDRDELETE
, &r
);
2820 if (NT_STATUS_IS_ERR(status
)) {
2824 /* Return variables */
2827 return r
.out
.result
;
2830 NTSTATUS
rpccli_lsa_CREDRGETTARGETINFO(struct rpc_pipe_client
*cli
,
2831 TALLOC_CTX
*mem_ctx
)
2833 struct lsa_CREDRGETTARGETINFO r
;
2838 if (DEBUGLEVEL
>= 10) {
2839 NDR_PRINT_IN_DEBUG(lsa_CREDRGETTARGETINFO
, &r
);
2842 status
= cli_do_rpc_ndr(cli
,
2846 NDR_LSA_CREDRGETTARGETINFO
,
2849 if (!NT_STATUS_IS_OK(status
)) {
2853 if (DEBUGLEVEL
>= 10) {
2854 NDR_PRINT_OUT_DEBUG(lsa_CREDRGETTARGETINFO
, &r
);
2857 if (NT_STATUS_IS_ERR(status
)) {
2861 /* Return variables */
2864 return r
.out
.result
;
2867 NTSTATUS
rpccli_lsa_CREDRPROFILELOADED(struct rpc_pipe_client
*cli
,
2868 TALLOC_CTX
*mem_ctx
)
2870 struct lsa_CREDRPROFILELOADED r
;
2875 if (DEBUGLEVEL
>= 10) {
2876 NDR_PRINT_IN_DEBUG(lsa_CREDRPROFILELOADED
, &r
);
2879 status
= cli_do_rpc_ndr(cli
,
2883 NDR_LSA_CREDRPROFILELOADED
,
2886 if (!NT_STATUS_IS_OK(status
)) {
2890 if (DEBUGLEVEL
>= 10) {
2891 NDR_PRINT_OUT_DEBUG(lsa_CREDRPROFILELOADED
, &r
);
2894 if (NT_STATUS_IS_ERR(status
)) {
2898 /* Return variables */
2901 return r
.out
.result
;
2904 NTSTATUS
rpccli_lsa_LookupNames3(struct rpc_pipe_client
*cli
,
2905 TALLOC_CTX
*mem_ctx
,
2906 struct policy_handle
*handle
/* [in] [ref] */,
2907 uint32_t num_names
/* [in] [range(0,1000)] */,
2908 struct lsa_String
*names
/* [in] [size_is(num_names)] */,
2909 struct lsa_RefDomainList
**domains
/* [out] [ref] */,
2910 struct lsa_TransSidArray3
*sids
/* [in,out] [ref] */,
2911 enum lsa_LookupNamesLevel level
/* [in] */,
2912 uint32_t *count
/* [in,out] [ref] */,
2913 uint32_t unknown1
/* [in] */,
2914 uint32_t unknown2
/* [in] */)
2916 struct lsa_LookupNames3 r
;
2920 r
.in
.handle
= handle
;
2921 r
.in
.num_names
= num_names
;
2926 r
.in
.unknown1
= unknown1
;
2927 r
.in
.unknown2
= unknown2
;
2929 if (DEBUGLEVEL
>= 10) {
2930 NDR_PRINT_IN_DEBUG(lsa_LookupNames3
, &r
);
2933 status
= cli_do_rpc_ndr(cli
,
2937 NDR_LSA_LOOKUPNAMES3
,
2940 if (!NT_STATUS_IS_OK(status
)) {
2944 if (DEBUGLEVEL
>= 10) {
2945 NDR_PRINT_OUT_DEBUG(lsa_LookupNames3
, &r
);
2948 if (NT_STATUS_IS_ERR(status
)) {
2952 /* Return variables */
2953 *domains
= *r
.out
.domains
;
2954 *sids
= *r
.out
.sids
;
2955 *count
= *r
.out
.count
;
2958 return r
.out
.result
;
2961 NTSTATUS
rpccli_lsa_CREDRGETSESSIONTYPES(struct rpc_pipe_client
*cli
,
2962 TALLOC_CTX
*mem_ctx
)
2964 struct lsa_CREDRGETSESSIONTYPES r
;
2969 if (DEBUGLEVEL
>= 10) {
2970 NDR_PRINT_IN_DEBUG(lsa_CREDRGETSESSIONTYPES
, &r
);
2973 status
= cli_do_rpc_ndr(cli
,
2977 NDR_LSA_CREDRGETSESSIONTYPES
,
2980 if (!NT_STATUS_IS_OK(status
)) {
2984 if (DEBUGLEVEL
>= 10) {
2985 NDR_PRINT_OUT_DEBUG(lsa_CREDRGETSESSIONTYPES
, &r
);
2988 if (NT_STATUS_IS_ERR(status
)) {
2992 /* Return variables */
2995 return r
.out
.result
;
2998 NTSTATUS
rpccli_lsa_LSARREGISTERAUDITEVENT(struct rpc_pipe_client
*cli
,
2999 TALLOC_CTX
*mem_ctx
)
3001 struct lsa_LSARREGISTERAUDITEVENT r
;
3006 if (DEBUGLEVEL
>= 10) {
3007 NDR_PRINT_IN_DEBUG(lsa_LSARREGISTERAUDITEVENT
, &r
);
3010 status
= cli_do_rpc_ndr(cli
,
3014 NDR_LSA_LSARREGISTERAUDITEVENT
,
3017 if (!NT_STATUS_IS_OK(status
)) {
3021 if (DEBUGLEVEL
>= 10) {
3022 NDR_PRINT_OUT_DEBUG(lsa_LSARREGISTERAUDITEVENT
, &r
);
3025 if (NT_STATUS_IS_ERR(status
)) {
3029 /* Return variables */
3032 return r
.out
.result
;
3035 NTSTATUS
rpccli_lsa_LSARGENAUDITEVENT(struct rpc_pipe_client
*cli
,
3036 TALLOC_CTX
*mem_ctx
)
3038 struct lsa_LSARGENAUDITEVENT r
;
3043 if (DEBUGLEVEL
>= 10) {
3044 NDR_PRINT_IN_DEBUG(lsa_LSARGENAUDITEVENT
, &r
);
3047 status
= cli_do_rpc_ndr(cli
,
3051 NDR_LSA_LSARGENAUDITEVENT
,
3054 if (!NT_STATUS_IS_OK(status
)) {
3058 if (DEBUGLEVEL
>= 10) {
3059 NDR_PRINT_OUT_DEBUG(lsa_LSARGENAUDITEVENT
, &r
);
3062 if (NT_STATUS_IS_ERR(status
)) {
3066 /* Return variables */
3069 return r
.out
.result
;
3072 NTSTATUS
rpccli_lsa_LSARUNREGISTERAUDITEVENT(struct rpc_pipe_client
*cli
,
3073 TALLOC_CTX
*mem_ctx
)
3075 struct lsa_LSARUNREGISTERAUDITEVENT r
;
3080 if (DEBUGLEVEL
>= 10) {
3081 NDR_PRINT_IN_DEBUG(lsa_LSARUNREGISTERAUDITEVENT
, &r
);
3084 status
= cli_do_rpc_ndr(cli
,
3088 NDR_LSA_LSARUNREGISTERAUDITEVENT
,
3091 if (!NT_STATUS_IS_OK(status
)) {
3095 if (DEBUGLEVEL
>= 10) {
3096 NDR_PRINT_OUT_DEBUG(lsa_LSARUNREGISTERAUDITEVENT
, &r
);
3099 if (NT_STATUS_IS_ERR(status
)) {
3103 /* Return variables */
3106 return r
.out
.result
;
3109 NTSTATUS
rpccli_lsa_lsaRQueryForestTrustInformation(struct rpc_pipe_client
*cli
,
3110 TALLOC_CTX
*mem_ctx
,
3111 struct policy_handle
*handle
/* [in] [ref] */,
3112 struct lsa_String
*trusted_domain_name
/* [in] [ref] */,
3113 uint16_t unknown
/* [in] */,
3114 struct lsa_ForestTrustInformation
**forest_trust_info
/* [out] [ref] */)
3116 struct lsa_lsaRQueryForestTrustInformation r
;
3120 r
.in
.handle
= handle
;
3121 r
.in
.trusted_domain_name
= trusted_domain_name
;
3122 r
.in
.unknown
= unknown
;
3124 if (DEBUGLEVEL
>= 10) {
3125 NDR_PRINT_IN_DEBUG(lsa_lsaRQueryForestTrustInformation
, &r
);
3128 status
= cli_do_rpc_ndr(cli
,
3132 NDR_LSA_LSARQUERYFORESTTRUSTINFORMATION
,
3135 if (!NT_STATUS_IS_OK(status
)) {
3139 if (DEBUGLEVEL
>= 10) {
3140 NDR_PRINT_OUT_DEBUG(lsa_lsaRQueryForestTrustInformation
, &r
);
3143 if (NT_STATUS_IS_ERR(status
)) {
3147 /* Return variables */
3148 *forest_trust_info
= *r
.out
.forest_trust_info
;
3151 return r
.out
.result
;
3154 NTSTATUS
rpccli_lsa_LSARSETFORESTTRUSTINFORMATION(struct rpc_pipe_client
*cli
,
3155 TALLOC_CTX
*mem_ctx
)
3157 struct lsa_LSARSETFORESTTRUSTINFORMATION r
;
3162 if (DEBUGLEVEL
>= 10) {
3163 NDR_PRINT_IN_DEBUG(lsa_LSARSETFORESTTRUSTINFORMATION
, &r
);
3166 status
= cli_do_rpc_ndr(cli
,
3170 NDR_LSA_LSARSETFORESTTRUSTINFORMATION
,
3173 if (!NT_STATUS_IS_OK(status
)) {
3177 if (DEBUGLEVEL
>= 10) {
3178 NDR_PRINT_OUT_DEBUG(lsa_LSARSETFORESTTRUSTINFORMATION
, &r
);
3181 if (NT_STATUS_IS_ERR(status
)) {
3185 /* Return variables */
3188 return r
.out
.result
;
3191 NTSTATUS
rpccli_lsa_CREDRRENAME(struct rpc_pipe_client
*cli
,
3192 TALLOC_CTX
*mem_ctx
)
3194 struct lsa_CREDRRENAME r
;
3199 if (DEBUGLEVEL
>= 10) {
3200 NDR_PRINT_IN_DEBUG(lsa_CREDRRENAME
, &r
);
3203 status
= cli_do_rpc_ndr(cli
,
3207 NDR_LSA_CREDRRENAME
,
3210 if (!NT_STATUS_IS_OK(status
)) {
3214 if (DEBUGLEVEL
>= 10) {
3215 NDR_PRINT_OUT_DEBUG(lsa_CREDRRENAME
, &r
);
3218 if (NT_STATUS_IS_ERR(status
)) {
3222 /* Return variables */
3225 return r
.out
.result
;
3228 NTSTATUS
rpccli_lsa_LookupSids3(struct rpc_pipe_client
*cli
,
3229 TALLOC_CTX
*mem_ctx
,
3230 struct lsa_SidArray
*sids
/* [in] [ref] */,
3231 struct lsa_RefDomainList
**domains
/* [out] [ref] */,
3232 struct lsa_TransNameArray2
*names
/* [in,out] [ref] */,
3233 uint16_t level
/* [in] */,
3234 uint32_t *count
/* [in,out] [ref] */,
3235 uint32_t unknown1
/* [in] */,
3236 uint32_t unknown2
/* [in] */)
3238 struct lsa_LookupSids3 r
;
3246 r
.in
.unknown1
= unknown1
;
3247 r
.in
.unknown2
= unknown2
;
3249 if (DEBUGLEVEL
>= 10) {
3250 NDR_PRINT_IN_DEBUG(lsa_LookupSids3
, &r
);
3253 status
= cli_do_rpc_ndr(cli
,
3257 NDR_LSA_LOOKUPSIDS3
,
3260 if (!NT_STATUS_IS_OK(status
)) {
3264 if (DEBUGLEVEL
>= 10) {
3265 NDR_PRINT_OUT_DEBUG(lsa_LookupSids3
, &r
);
3268 if (NT_STATUS_IS_ERR(status
)) {
3272 /* Return variables */
3273 *domains
= *r
.out
.domains
;
3274 *names
= *r
.out
.names
;
3275 *count
= *r
.out
.count
;
3278 return r
.out
.result
;
3281 NTSTATUS
rpccli_lsa_LookupNames4(struct rpc_pipe_client
*cli
,
3282 TALLOC_CTX
*mem_ctx
,
3283 uint32_t num_names
/* [in] [range(0,1000)] */,
3284 struct lsa_String
*names
/* [in] [size_is(num_names)] */,
3285 struct lsa_RefDomainList
**domains
/* [out] [ref] */,
3286 struct lsa_TransSidArray3
*sids
/* [in,out] [ref] */,
3287 enum lsa_LookupNamesLevel level
/* [in] */,
3288 uint32_t *count
/* [in,out] [ref] */,
3289 uint32_t unknown1
/* [in] */,
3290 uint32_t unknown2
/* [in] */)
3292 struct lsa_LookupNames4 r
;
3296 r
.in
.num_names
= num_names
;
3301 r
.in
.unknown1
= unknown1
;
3302 r
.in
.unknown2
= unknown2
;
3304 if (DEBUGLEVEL
>= 10) {
3305 NDR_PRINT_IN_DEBUG(lsa_LookupNames4
, &r
);
3308 status
= cli_do_rpc_ndr(cli
,
3312 NDR_LSA_LOOKUPNAMES4
,
3315 if (!NT_STATUS_IS_OK(status
)) {
3319 if (DEBUGLEVEL
>= 10) {
3320 NDR_PRINT_OUT_DEBUG(lsa_LookupNames4
, &r
);
3323 if (NT_STATUS_IS_ERR(status
)) {
3327 /* Return variables */
3328 *domains
= *r
.out
.domains
;
3329 *sids
= *r
.out
.sids
;
3330 *count
= *r
.out
.count
;
3333 return r
.out
.result
;
3336 NTSTATUS
rpccli_lsa_LSAROPENPOLICYSCE(struct rpc_pipe_client
*cli
,
3337 TALLOC_CTX
*mem_ctx
)
3339 struct lsa_LSAROPENPOLICYSCE r
;
3344 if (DEBUGLEVEL
>= 10) {
3345 NDR_PRINT_IN_DEBUG(lsa_LSAROPENPOLICYSCE
, &r
);
3348 status
= cli_do_rpc_ndr(cli
,
3352 NDR_LSA_LSAROPENPOLICYSCE
,
3355 if (!NT_STATUS_IS_OK(status
)) {
3359 if (DEBUGLEVEL
>= 10) {
3360 NDR_PRINT_OUT_DEBUG(lsa_LSAROPENPOLICYSCE
, &r
);
3363 if (NT_STATUS_IS_ERR(status
)) {
3367 /* Return variables */
3370 return r
.out
.result
;
3373 NTSTATUS
rpccli_lsa_LSARADTREGISTERSECURITYEVENTSOURCE(struct rpc_pipe_client
*cli
,
3374 TALLOC_CTX
*mem_ctx
)
3376 struct lsa_LSARADTREGISTERSECURITYEVENTSOURCE r
;
3381 if (DEBUGLEVEL
>= 10) {
3382 NDR_PRINT_IN_DEBUG(lsa_LSARADTREGISTERSECURITYEVENTSOURCE
, &r
);
3385 status
= cli_do_rpc_ndr(cli
,
3389 NDR_LSA_LSARADTREGISTERSECURITYEVENTSOURCE
,
3392 if (!NT_STATUS_IS_OK(status
)) {
3396 if (DEBUGLEVEL
>= 10) {
3397 NDR_PRINT_OUT_DEBUG(lsa_LSARADTREGISTERSECURITYEVENTSOURCE
, &r
);
3400 if (NT_STATUS_IS_ERR(status
)) {
3404 /* Return variables */
3407 return r
.out
.result
;
3410 NTSTATUS
rpccli_lsa_LSARADTUNREGISTERSECURITYEVENTSOURCE(struct rpc_pipe_client
*cli
,
3411 TALLOC_CTX
*mem_ctx
)
3413 struct lsa_LSARADTUNREGISTERSECURITYEVENTSOURCE r
;
3418 if (DEBUGLEVEL
>= 10) {
3419 NDR_PRINT_IN_DEBUG(lsa_LSARADTUNREGISTERSECURITYEVENTSOURCE
, &r
);
3422 status
= cli_do_rpc_ndr(cli
,
3426 NDR_LSA_LSARADTUNREGISTERSECURITYEVENTSOURCE
,
3429 if (!NT_STATUS_IS_OK(status
)) {
3433 if (DEBUGLEVEL
>= 10) {
3434 NDR_PRINT_OUT_DEBUG(lsa_LSARADTUNREGISTERSECURITYEVENTSOURCE
, &r
);
3437 if (NT_STATUS_IS_ERR(status
)) {
3441 /* Return variables */
3444 return r
.out
.result
;
3447 NTSTATUS
rpccli_lsa_LSARADTREPORTSECURITYEVENT(struct rpc_pipe_client
*cli
,
3448 TALLOC_CTX
*mem_ctx
)
3450 struct lsa_LSARADTREPORTSECURITYEVENT r
;
3455 if (DEBUGLEVEL
>= 10) {
3456 NDR_PRINT_IN_DEBUG(lsa_LSARADTREPORTSECURITYEVENT
, &r
);
3459 status
= cli_do_rpc_ndr(cli
,
3463 NDR_LSA_LSARADTREPORTSECURITYEVENT
,
3466 if (!NT_STATUS_IS_OK(status
)) {
3470 if (DEBUGLEVEL
>= 10) {
3471 NDR_PRINT_OUT_DEBUG(lsa_LSARADTREPORTSECURITYEVENT
, &r
);
3474 if (NT_STATUS_IS_ERR(status
)) {
3478 /* Return variables */
3481 return r
.out
.result
;