4 lsa interface definition
7 import
"misc.idl", "security.idl";
9 [ uuid("12345778-1234-abcd-ef00-0123456789ab"),
11 endpoint("ncacn_np:[\\pipe\\lsarpc]","ncacn_np:[\\pipe\\netlogon]","ncacn_np:[\\pipe\\lsass]", "ncacn_ip_tcp:", "ncalrpc:"),
12 pointer_default(unique),
13 helpstring("Local Security Authority")
16 typedef bitmap security_secinfo security_secinfo
;
17 typedef bitmap kerb_EncTypes kerb_EncTypes
;
19 typedef [public] struct {
20 [value
(2*strlen_m
(string))] uint16 length
;
21 [value
(2*strlen_m
(string))] uint16 size
;
22 [charset
(UTF16
),size_is(size
/2),length_is(length
/2)] uint16
*string;
25 typedef [public] struct {
26 [value
(2*strlen_m
(string))] uint16 length
;
27 [value
(2*strlen_m_term
(string))] uint16 size
;
28 [charset
(UTF16
),size_is(size
/2),length_is(length
/2)] uint16
*string;
31 typedef [public] struct {
33 [size_is(count
)] lsa_String
*names
;
36 typedef [public] struct {
37 [value
(strlen_m
(string))] uint16 length
;
38 [value
(strlen_m
(string))] uint16 size
;
39 [charset
(DOS
),size_is(size
),length_is(length
)] uint8
*string;
42 typedef [public] struct {
43 [value
(strlen_m
(string))] uint16 length
;
44 [value
(strlen_m_term
(string))] uint16 size
;
45 [charset
(DOS
),size_is(size
),length_is(length
)] uint8
*string;
46 } lsa_AsciiStringLarge
;
48 typedef [public] struct {
51 [size_is(size
/2),length_is(length
/2)] uint16
*array
;
57 [in,out] policy_handle
*handle
63 [public] NTSTATUS lsa_Delete
(
64 [in] policy_handle
*handle
82 [size_is(count
)] lsa_PrivEntry
*privs
;
85 [public] NTSTATUS lsa_EnumPrivs
(
86 [in] policy_handle
*handle,
87 [in,out,ref] uint32
*resume_handle
,
88 [out,ref] lsa_PrivArray
*privs
,
94 NTSTATUS lsa_QuerySecurity
(
95 [in] policy_handle
*handle,
96 [in] security_secinfo sec_info
,
97 [out,ref] sec_desc_buf
**sdbuf
102 NTSTATUS lsa_SetSecObj
(
103 [in] policy_handle
*handle,
104 [in] security_secinfo sec_info
,
105 [in,ref] sec_desc_buf
*sdbuf
110 [todo
] NTSTATUS lsa_ChangePassword
();
116 uint3264 len
; /* ignored */
117 uint16 impersonation_level
;
119 uint8 effective_only
;
123 uint3264 len
; /* ignored */
125 [string,charset
(UTF16
)] uint16
*object_name
;
127 security_descriptor
*sec_desc
;
128 lsa_QosInfo
*sec_qos
;
129 } lsa_ObjectAttribute
;
131 typedef [public,bitmap32bit
] bitmap
{
132 LSA_POLICY_VIEW_LOCAL_INFORMATION
= 0x00000001,
133 LSA_POLICY_VIEW_AUDIT_INFORMATION
= 0x00000002,
134 LSA_POLICY_GET_PRIVATE_INFORMATION
= 0x00000004,
135 LSA_POLICY_TRUST_ADMIN
= 0x00000008,
136 LSA_POLICY_CREATE_ACCOUNT
= 0x00000010,
137 LSA_POLICY_CREATE_SECRET
= 0x00000020,
138 LSA_POLICY_CREATE_PRIVILEGE
= 0x00000040,
139 LSA_POLICY_SET_DEFAULT_QUOTA_LIMITS
= 0x00000080,
140 LSA_POLICY_SET_AUDIT_REQUIREMENTS
= 0x00000100,
141 LSA_POLICY_AUDIT_LOG_ADMIN
= 0x00000200,
142 LSA_POLICY_SERVER_ADMIN
= 0x00000400,
143 LSA_POLICY_LOOKUP_NAMES
= 0x00000800,
144 LSA_POLICY_NOTIFICATION
= 0x00001000
145 } lsa_PolicyAccessMask
;
147 const int LSA_POLICY_ALL_ACCESS
=
148 (STANDARD_RIGHTS_REQUIRED_ACCESS |
149 LSA_POLICY_VIEW_LOCAL_INFORMATION |
150 LSA_POLICY_VIEW_AUDIT_INFORMATION |
151 LSA_POLICY_GET_PRIVATE_INFORMATION |
152 LSA_POLICY_TRUST_ADMIN |
153 LSA_POLICY_CREATE_ACCOUNT |
154 LSA_POLICY_CREATE_SECRET |
155 LSA_POLICY_CREATE_PRIVILEGE |
156 LSA_POLICY_SET_DEFAULT_QUOTA_LIMITS |
157 LSA_POLICY_SET_AUDIT_REQUIREMENTS |
158 LSA_POLICY_AUDIT_LOG_ADMIN |
159 LSA_POLICY_SERVER_ADMIN |
160 LSA_POLICY_LOOKUP_NAMES
);
162 const int LSA_POLICY_READ
=
163 (STANDARD_RIGHTS_READ_ACCESS |
164 LSA_POLICY_VIEW_LOCAL_INFORMATION |
165 LSA_POLICY_VIEW_AUDIT_INFORMATION |
166 LSA_POLICY_GET_PRIVATE_INFORMATION
);
168 const int LSA_POLICY_WRITE
=
169 (STANDARD_RIGHTS_READ_ACCESS |
170 LSA_POLICY_TRUST_ADMIN |
171 LSA_POLICY_CREATE_ACCOUNT |
172 LSA_POLICY_CREATE_SECRET |
173 LSA_POLICY_CREATE_PRIVILEGE |
174 LSA_POLICY_SET_DEFAULT_QUOTA_LIMITS |
175 LSA_POLICY_SET_AUDIT_REQUIREMENTS |
176 LSA_POLICY_AUDIT_LOG_ADMIN |
177 LSA_POLICY_SERVER_ADMIN
);
179 const int LSA_POLICY_EXECUTE
=
180 (STANDARD_RIGHTS_EXECUTE_ACCESS |
181 LSA_POLICY_VIEW_LOCAL_INFORMATION |
182 LSA_POLICY_LOOKUP_NAMES
);
184 typedef [public,bitmap32bit
] bitmap
{
185 LSA_ACCOUNT_VIEW
= 0x00000001,
186 LSA_ACCOUNT_ADJUST_PRIVILEGES
= 0x00000002,
187 LSA_ACCOUNT_ADJUST_QUOTAS
= 0x00000004,
188 LSA_ACCOUNT_ADJUST_SYSTEM_ACCESS
= 0x00000008
189 } lsa_AccountAccessMask
;
191 const int LSA_ACCOUNT_ALL_ACCESS
=
192 (STANDARD_RIGHTS_REQUIRED_ACCESS |
194 LSA_ACCOUNT_ADJUST_PRIVILEGES |
195 LSA_ACCOUNT_ADJUST_QUOTAS |
196 LSA_ACCOUNT_ADJUST_SYSTEM_ACCESS
);
198 const int LSA_ACCOUNT_READ
=
199 (STANDARD_RIGHTS_READ_ACCESS |
202 const int LSA_ACCOUNT_WRITE
=
203 (STANDARD_RIGHTS_READ_ACCESS |
204 LSA_ACCOUNT_ADJUST_PRIVILEGES |
205 LSA_ACCOUNT_ADJUST_QUOTAS |
206 LSA_ACCOUNT_ADJUST_SYSTEM_ACCESS
);
208 const int LSA_ACCOUNT_EXECUTE
=
209 (STANDARD_RIGHTS_EXECUTE_ACCESS
);
211 typedef [public,bitmap32bit
] bitmap
{
212 LSA_SECRET_SET_VALUE
= 0x00000001,
213 LSA_SECRET_QUERY_VALUE
= 0x00000002
214 } lsa_SecretAccessMask
;
216 const int LSA_SECRET_ALL_ACCESS
=
217 (LSA_SECRET_QUERY_VALUE |
218 LSA_SECRET_SET_VALUE |
220 STANDARD_RIGHTS_READ_ACCESS |
222 SEC_STD_WRITE_OWNER
); /* 0x000F0003 */
224 const int LSA_SECRET_READ
=
225 (LSA_SECRET_QUERY_VALUE |
226 STANDARD_RIGHTS_READ_ACCESS
); /* 0x00020002 */
228 const int LSA_SECRET_WRITE
=
229 (LSA_SECRET_SET_VALUE |
230 STANDARD_RIGHTS_READ_ACCESS
); /* 0x00020001 */
232 const int LSA_SECRET_EXECUTE
=
233 (STANDARD_RIGHTS_READ_ACCESS
); /* 0x00020000 */
235 typedef [public,bitmap32bit
] bitmap
{
236 LSA_TRUSTED_QUERY_DOMAIN_NAME
= 0x00000001,
237 LSA_TRUSTED_QUERY_CONTROLLERS
= 0x00000002,
238 LSA_TRUSTED_SET_CONTROLLERS
= 0x00000004,
239 LSA_TRUSTED_QUERY_POSIX
= 0x00000008,
240 LSA_TRUSTED_SET_POSIX
= 0x00000010,
241 LSA_TRUSTED_SET_AUTH
= 0x00000020,
242 LSA_TRUSTED_QUERY_AUTH
= 0x00000040
243 } lsa_TrustedAccessMask
;
245 const int LSA_TRUSTED_DOMAIN_ALL_ACCESS
=
246 (LSA_TRUSTED_QUERY_DOMAIN_NAME |
247 LSA_TRUSTED_QUERY_CONTROLLERS |
248 LSA_TRUSTED_SET_CONTROLLERS |
249 LSA_TRUSTED_QUERY_POSIX |
250 LSA_TRUSTED_SET_POSIX |
251 LSA_TRUSTED_SET_AUTH |
252 LSA_TRUSTED_QUERY_AUTH |
254 STANDARD_RIGHTS_READ_ACCESS |
256 SEC_STD_WRITE_OWNER
); /* 0x000F007F */
258 const int LSA_TRUSTED_DOMAIN_READ
=
259 (LSA_TRUSTED_QUERY_DOMAIN_NAME |
260 STANDARD_RIGHTS_READ_ACCESS
); /* 0x00020001 */
262 const int LSA_TRUSTED_DOMAIN_WRITE
=
263 (LSA_TRUSTED_SET_CONTROLLERS |
264 LSA_TRUSTED_SET_POSIX |
265 LSA_TRUSTED_SET_AUTH |
266 STANDARD_RIGHTS_READ_ACCESS
); /* 0x00020034 */
268 const int LSA_TRUSTED_DOMAIN_EXECUTE
=
269 (LSA_TRUSTED_QUERY_DOMAIN_NAME |
270 LSA_TRUSTED_QUERY_POSIX |
271 STANDARD_RIGHTS_READ_ACCESS
); /* 0x0002000C */
274 /* notice the screwup with the system_name - thats why MS created
276 [public] NTSTATUS lsa_OpenPolicy
(
277 [in,unique] uint16
*system_name
,
278 [in] lsa_ObjectAttribute
*attr
,
279 [in] lsa_PolicyAccessMask access_mask
,
280 [out] policy_handle
*handle
290 uint32 maximum_log_size
;
291 hyper retention_time
;
292 uint8 shutdown_in_progress
;
293 hyper time_to_shutdown
;
294 uint32 next_audit_record
;
297 typedef [v1_enum] enum {
298 LSA_AUDIT_POLICY_NONE
=0,
299 LSA_AUDIT_POLICY_SUCCESS
=1,
300 LSA_AUDIT_POLICY_FAILURE
=2,
301 LSA_AUDIT_POLICY_ALL
=(LSA_AUDIT_POLICY_SUCCESS|LSA_AUDIT_POLICY_FAILURE
),
302 LSA_AUDIT_POLICY_CLEAR
=4
303 } lsa_PolicyAuditPolicy
;
306 LSA_AUDIT_CATEGORY_SYSTEM
= 0,
307 LSA_AUDIT_CATEGORY_LOGON
= 1,
308 LSA_AUDIT_CATEGORY_FILE_AND_OBJECT_ACCESS
= 2,
309 LSA_AUDIT_CATEGORY_USE_OF_USER_RIGHTS
= 3,
310 LSA_AUDIT_CATEGORY_PROCCESS_TRACKING
= 4,
311 LSA_AUDIT_CATEGORY_SECURITY_POLICY_CHANGES
= 5,
312 LSA_AUDIT_CATEGORY_ACCOUNT_MANAGEMENT
= 6,
313 LSA_AUDIT_CATEGORY_DIRECTORY_SERVICE_ACCESS
= 7, /* only in win2k/2k3 */
314 LSA_AUDIT_CATEGORY_ACCOUNT_LOGON
= 8 /* only in win2k/2k3 */
315 } lsa_PolicyAuditEventType
;
318 uint32 auditing_mode
;
319 [size_is(count
)] lsa_PolicyAuditPolicy
*settings
;
321 } lsa_AuditEventsInfo
;
324 lsa_StringLarge name
;
332 typedef [v1_enum] enum {
344 } lsa_ReplicaSourceInfo
;
348 uint32 non_paged_pool
;
353 } lsa_DefaultQuotaInfo
;
357 NTTIME_hyper db_create_time
;
358 } lsa_ModificationInfo
;
361 uint8 shutdown_on_full
;
362 } lsa_AuditFullSetInfo
;
365 uint8 shutdown_on_full
;
367 } lsa_AuditFullQueryInfo
;
370 /* it's important that we use the lsa_StringLarge here,
371 * because otherwise windows clients result with such dns hostnames
372 * e.g. w2k3-client.samba4.samba.orgsamba4.samba.org
374 * w2k3-client.samba4.samba.org
376 lsa_StringLarge name
;
377 lsa_StringLarge dns_domain
;
378 lsa_StringLarge dns_forest
;
384 LSA_POLICY_INFO_AUDIT_LOG
=1,
385 LSA_POLICY_INFO_AUDIT_EVENTS
=2,
386 LSA_POLICY_INFO_DOMAIN
=3,
387 LSA_POLICY_INFO_PD
=4,
388 LSA_POLICY_INFO_ACCOUNT_DOMAIN
=5,
389 LSA_POLICY_INFO_ROLE
=6,
390 LSA_POLICY_INFO_REPLICA
=7,
391 LSA_POLICY_INFO_QUOTA
=8,
392 LSA_POLICY_INFO_MOD
=9,
393 LSA_POLICY_INFO_AUDIT_FULL_SET
=10,
394 LSA_POLICY_INFO_AUDIT_FULL_QUERY
=11,
395 LSA_POLICY_INFO_DNS
=12,
396 LSA_POLICY_INFO_DNS_INT
=13,
397 LSA_POLICY_INFO_L_ACCOUNT_DOMAIN
=14
400 typedef [switch_type(uint16
)] union {
401 [case(LSA_POLICY_INFO_AUDIT_LOG
)] lsa_AuditLogInfo audit_log
;
402 [case(LSA_POLICY_INFO_AUDIT_EVENTS
)] lsa_AuditEventsInfo audit_events
;
403 [case(LSA_POLICY_INFO_DOMAIN
)] lsa_DomainInfo domain
;
404 [case(LSA_POLICY_INFO_PD
)] lsa_PDAccountInfo pd
;
405 [case(LSA_POLICY_INFO_ACCOUNT_DOMAIN
)] lsa_DomainInfo account_domain
;
406 [case(LSA_POLICY_INFO_ROLE
)] lsa_ServerRole role
;
407 [case(LSA_POLICY_INFO_REPLICA
)] lsa_ReplicaSourceInfo replica
;
408 [case(LSA_POLICY_INFO_QUOTA
)] lsa_DefaultQuotaInfo quota
;
409 [case(LSA_POLICY_INFO_MOD
)] lsa_ModificationInfo mod
;
410 [case(LSA_POLICY_INFO_AUDIT_FULL_SET
)] lsa_AuditFullSetInfo auditfullset
;
411 [case(LSA_POLICY_INFO_AUDIT_FULL_QUERY
)] lsa_AuditFullQueryInfo auditfullquery
;
412 [case(LSA_POLICY_INFO_DNS
)] lsa_DnsDomainInfo dns
;
413 [case(LSA_POLICY_INFO_DNS_INT
)] lsa_DnsDomainInfo dns
;
414 [case(LSA_POLICY_INFO_L_ACCOUNT_DOMAIN
)] lsa_DomainInfo l_account_domain
;
415 } lsa_PolicyInformation
;
417 NTSTATUS lsa_QueryInfoPolicy
(
418 [in] policy_handle
*handle,
419 [in] lsa_PolicyInfo level
,
420 [out,ref,switch_is(level
)] lsa_PolicyInformation
**info
425 NTSTATUS lsa_SetInfoPolicy
(
426 [in] policy_handle
*handle,
427 [in] lsa_PolicyInfo level
,
428 [in,switch_is(level
)] lsa_PolicyInformation
*info
433 [todo
] NTSTATUS lsa_ClearAuditLog
();
437 [public] NTSTATUS lsa_CreateAccount
(
438 [in] policy_handle
*handle,
439 [in,ref] dom_sid2
*sid
,
440 [in] lsa_AccountAccessMask access_mask
,
441 [out] policy_handle
*acct_handle
445 /* NOTE: This only returns accounts that have at least
453 typedef [public] struct {
454 [range(0,20480)] uint32 num_sids
;
455 [size_is(num_sids
)] lsa_SidPtr
*sids
;
458 [public] NTSTATUS lsa_EnumAccounts
(
459 [in] policy_handle
*handle,
460 [in,out,ref] uint32
*resume_handle
,
461 [out,ref] lsa_SidArray
*sids
,
462 [in,range(0,8192)] uint32 num_entries
465 /*************************************************/
468 [public] NTSTATUS lsa_CreateTrustedDomain
(
469 [in] policy_handle
*policy_handle
,
470 [in] lsa_DomainInfo
*info
,
471 [in] lsa_TrustedAccessMask access_mask
,
472 [out] policy_handle
*trustdom_handle
479 /* w2k3 treats max_size as max_domains*60 */
480 const int LSA_ENUM_TRUST_DOMAIN_MULTIPLIER
= 60;
484 [size_is(count
)] lsa_DomainInfo
*domains
;
487 NTSTATUS lsa_EnumTrustDom
(
488 [in] policy_handle
*handle,
489 [in,out,ref] uint32
*resume_handle
,
490 [out,ref] lsa_DomainList
*domains
,
497 typedef [public] enum {
498 SID_NAME_USE_NONE
= 0,/* NOTUSED */
499 SID_NAME_USER
= 1, /* user */
500 SID_NAME_DOM_GRP
= 2, /* domain group */
501 SID_NAME_DOMAIN
= 3, /* domain: don't know what this is */
502 SID_NAME_ALIAS
= 4, /* local group */
503 SID_NAME_WKN_GRP
= 5, /* well-known group */
504 SID_NAME_DELETED
= 6, /* deleted account: needed for c2 rating */
505 SID_NAME_INVALID
= 7, /* invalid account */
506 SID_NAME_UNKNOWN
= 8, /* oops. */
507 SID_NAME_COMPUTER
= 9 /* machine */
511 lsa_SidType sid_type
;
517 [range(0,1000)] uint32 count
;
518 [size_is(count
)] lsa_TranslatedSid
*sids
;
521 const int LSA_REF_DOMAIN_LIST_MULTIPLIER
= 32;
523 [range(0,1000)] uint32 count
;
524 [size_is(count
)] lsa_DomainInfo
*domains
;
528 /* Level 1: Ask everywhere
529 * Level 2: Ask domain and trusted domains, no builtin and wkn
530 * Level 3: Only ask domain
531 * Level 4: W2k3ad: Only ask AD trusts
532 * Level 5: Only ask transitive forest trusts
537 LSA_LOOKUP_NAMES_ALL
= 1,
538 LSA_LOOKUP_NAMES_DOMAINS_ONLY
= 2,
539 LSA_LOOKUP_NAMES_PRIMARY_DOMAIN_ONLY
= 3,
540 LSA_LOOKUP_NAMES_UPLEVEL_TRUSTS_ONLY
= 4,
541 LSA_LOOKUP_NAMES_FOREST_TRUSTS_ONLY
= 5,
542 LSA_LOOKUP_NAMES_UPLEVEL_TRUSTS_ONLY2
= 6,
543 LSA_LOOKUP_NAMES_RODC_REFERRAL_TO_FULL_DC
= 7
544 } lsa_LookupNamesLevel
;
546 [public] NTSTATUS lsa_LookupNames
(
547 [in] policy_handle
*handle,
548 [in,range(0,1000)] uint32 num_names
,
549 [in,size_is(num_names
)] lsa_String names
[],
550 [out,ref] lsa_RefDomainList
**domains
,
551 [in,out,ref] lsa_TransSidArray
*sids
,
552 [in] lsa_LookupNamesLevel level
,
553 [in,out,ref] uint32
*count
561 lsa_SidType sid_type
;
564 } lsa_TranslatedName
;
567 [range(0,20480)] uint32 count
;
568 [size_is(count
)] lsa_TranslatedName
*names
;
569 } lsa_TransNameArray
;
571 [public] NTSTATUS lsa_LookupSids
(
572 [in] policy_handle
*handle,
573 [in,ref] lsa_SidArray
*sids
,
574 [out,ref] lsa_RefDomainList
**domains
,
575 [in,out,ref] lsa_TransNameArray
*names
,
576 [in] lsa_LookupNamesLevel level
,
577 [in,out,ref] uint32
*count
582 [public] NTSTATUS lsa_CreateSecret
(
583 [in] policy_handle
*handle,
584 [in] lsa_String name
,
585 [in] lsa_SecretAccessMask access_mask
,
586 [out] policy_handle
*sec_handle
590 /*****************************************/
592 NTSTATUS lsa_OpenAccount
(
593 [in] policy_handle
*handle,
594 [in,ref] dom_sid2
*sid
,
595 [in] lsa_AccountAccessMask access_mask
,
596 [out] policy_handle
*acct_handle
600 /****************************************/
609 [range(0,1000)] uint32 count
;
611 [size_is(count
)] lsa_LUIDAttribute set
[*];
614 NTSTATUS lsa_EnumPrivsAccount
(
615 [in] policy_handle
*handle,
616 [out,ref] lsa_PrivilegeSet
**privs
620 /****************************************/
622 NTSTATUS lsa_AddPrivilegesToAccount
(
623 [in] policy_handle
*handle,
624 [in,ref] lsa_PrivilegeSet
*privs
628 /****************************************/
630 NTSTATUS lsa_RemovePrivilegesFromAccount
(
631 [in] policy_handle
*handle,
632 [in] uint8 remove_all
,
633 [in,unique] lsa_PrivilegeSet
*privs
637 [todo
] NTSTATUS lsa_GetQuotasForAccount
();
640 [todo
] NTSTATUS lsa_SetQuotasForAccount
();
642 typedef [bitmap32bit
] bitmap
{
643 LSA_POLICY_MODE_INTERACTIVE
= 0x00000001,
644 LSA_POLICY_MODE_NETWORK
= 0x00000002,
645 LSA_POLICY_MODE_BATCH
= 0x00000004,
646 LSA_POLICY_MODE_SERVICE
= 0x00000010,
647 LSA_POLICY_MODE_PROXY
= 0x00000020,
648 LSA_POLICY_MODE_DENY_INTERACTIVE
= 0x00000040,
649 LSA_POLICY_MODE_DENY_NETWORK
= 0x00000080,
650 LSA_POLICY_MODE_DENY_BATCH
= 0x00000100,
651 LSA_POLICY_MODE_DENY_SERVICE
= 0x00000200,
652 LSA_POLICY_MODE_REMOTE_INTERACTIVE
= 0x00000400,
653 LSA_POLICY_MODE_DENY_REMOTE_INTERACTIVE
= 0x00000800,
654 LSA_POLICY_MODE_ALL
= 0x00000FF7,
655 LSA_POLICY_MODE_ALL_NT4
= 0x00000037
656 } lsa_SystemAccessModeFlags
;
659 NTSTATUS lsa_GetSystemAccessAccount
(
660 [in] policy_handle
*handle,
661 [out,ref] lsa_AccountAccessMask
*access_mask
665 NTSTATUS lsa_SetSystemAccessAccount
(
666 [in] policy_handle
*handle,
667 [in] lsa_AccountAccessMask access_mask
671 NTSTATUS lsa_OpenTrustedDomain
(
672 [in] policy_handle
*handle,
674 [in] lsa_TrustedAccessMask access_mask
,
675 [out] policy_handle
*trustdom_handle
678 typedef [flag
(NDR_PAHEX
)] struct {
681 [size_is(size
),length_is(length
)] uint8
*data
;
684 typedef [flag
(NDR_PAHEX
)] struct {
685 [range(0,65536)] uint32 size
;
686 [size_is(size
)] uint8
*data
;
690 LSA_TRUSTED_DOMAIN_INFO_NAME
= 1,
691 LSA_TRUSTED_DOMAIN_INFO_CONTROLLERS
= 2,
692 LSA_TRUSTED_DOMAIN_INFO_POSIX_OFFSET
= 3,
693 LSA_TRUSTED_DOMAIN_INFO_PASSWORD
= 4,
694 LSA_TRUSTED_DOMAIN_INFO_BASIC
= 5,
695 LSA_TRUSTED_DOMAIN_INFO_INFO_EX
= 6,
696 LSA_TRUSTED_DOMAIN_INFO_AUTH_INFO
= 7,
697 LSA_TRUSTED_DOMAIN_INFO_FULL_INFO
= 8,
698 LSA_TRUSTED_DOMAIN_INFO_AUTH_INFO_INTERNAL
= 9,
699 LSA_TRUSTED_DOMAIN_INFO_FULL_INFO_INTERNAL
= 10,
700 LSA_TRUSTED_DOMAIN_INFO_INFO_EX2_INTERNAL
= 11,
701 LSA_TRUSTED_DOMAIN_INFO_FULL_INFO_2_INTERNAL
= 12,
702 LSA_TRUSTED_DOMAIN_SUPPORTED_ENCRYPTION_TYPES
= 13
703 } lsa_TrustDomInfoEnum
;
705 typedef [public,bitmap32bit
] bitmap
{
706 LSA_TRUST_DIRECTION_INBOUND
= 0x00000001,
707 LSA_TRUST_DIRECTION_OUTBOUND
= 0x00000002
708 } lsa_TrustDirection
;
710 typedef [v1_enum] enum {
711 LSA_TRUST_TYPE_DOWNLEVEL
= 0x00000001,
712 LSA_TRUST_TYPE_UPLEVEL
= 0x00000002,
713 LSA_TRUST_TYPE_MIT
= 0x00000003
716 typedef [public,bitmap32bit
] bitmap
{
717 LSA_TRUST_ATTRIBUTE_NON_TRANSITIVE
= 0x00000001,
718 LSA_TRUST_ATTRIBUTE_UPLEVEL_ONLY
= 0x00000002,
719 LSA_TRUST_ATTRIBUTE_QUARANTINED_DOMAIN
= 0x00000004,
720 LSA_TRUST_ATTRIBUTE_FOREST_TRANSITIVE
= 0x00000008,
721 LSA_TRUST_ATTRIBUTE_CROSS_ORGANIZATION
= 0x00000010,
722 LSA_TRUST_ATTRIBUTE_WITHIN_FOREST
= 0x00000020,
723 LSA_TRUST_ATTRIBUTE_TREAT_AS_EXTERNAL
= 0x00000040,
724 LSA_TRUST_ATTRIBUTE_USES_RC4_ENCRYPTION
= 0x00000080
725 } lsa_TrustAttributes
;
728 lsa_StringLarge netbios_name
;
729 } lsa_TrustDomainInfoName
;
734 [size_is(entries
)] lsa_StringLarge
*netbios_names
;
735 } lsa_TrustDomainInfoControllers
;
739 } lsa_TrustDomainInfoPosixOffset
;
742 lsa_DATA_BUF
*password
;
743 lsa_DATA_BUF
*old_password
;
744 } lsa_TrustDomainInfoPassword
;
747 lsa_String netbios_name
;
749 } lsa_TrustDomainInfoBasic
;
752 lsa_StringLarge domain_name
;
753 lsa_StringLarge netbios_name
;
755 lsa_TrustDirection trust_direction
;
756 lsa_TrustType trust_type
;
757 lsa_TrustAttributes trust_attributes
;
758 } lsa_TrustDomainInfoInfoEx
;
760 typedef [public,v1_enum] enum {
761 TRUST_AUTH_TYPE_NONE
= 0,
762 TRUST_AUTH_TYPE_NT4OWF
= 1,
763 TRUST_AUTH_TYPE_CLEAR
= 2,
764 TRUST_AUTH_TYPE_VERSION
= 3
768 NTTIME_hyper last_update_time
;
769 lsa_TrustAuthType AuthType
;
771 } lsa_TrustDomainInfoBuffer
;
773 typedef [public] struct {
774 uint32 incoming_count
;
775 lsa_TrustDomainInfoBuffer
*incoming_current_auth_info
;
776 lsa_TrustDomainInfoBuffer
*incoming_previous_auth_info
;
777 uint32 outgoing_count
;
778 lsa_TrustDomainInfoBuffer
*outgoing_current_auth_info
;
779 lsa_TrustDomainInfoBuffer
*outgoing_previous_auth_info
;
780 } lsa_TrustDomainInfoAuthInfo
;
783 lsa_TrustDomainInfoInfoEx info_ex
;
784 lsa_TrustDomainInfoPosixOffset posix_offset
;
785 lsa_TrustDomainInfoAuthInfo auth_info
;
786 } lsa_TrustDomainInfoFullInfo
;
789 lsa_DATA_BUF2 auth_blob
;
790 } lsa_TrustDomainInfoAuthInfoInternal
;
793 lsa_TrustDomainInfoInfoEx info_ex
;
794 lsa_TrustDomainInfoPosixOffset posix_offset
;
795 lsa_TrustDomainInfoAuthInfoInternal auth_info
;
796 } lsa_TrustDomainInfoFullInfoInternal
;
799 lsa_TrustDomainInfoInfoEx info_ex
;
800 uint32 forest_trust_length
;
801 [size_is(forest_trust_length
)] uint8
*forest_trust_data
;
802 } lsa_TrustDomainInfoInfoEx2Internal
;
805 lsa_TrustDomainInfoInfoEx2Internal info
;
806 lsa_TrustDomainInfoPosixOffset posix_offset
;
807 lsa_TrustDomainInfoAuthInfo auth_info
;
808 } lsa_TrustDomainInfoFullInfo2Internal
;
811 kerb_EncTypes enc_types
;
812 } lsa_TrustDomainInfoSupportedEncTypes
;
814 typedef [switch_type(lsa_TrustDomInfoEnum
)] union {
815 [case(LSA_TRUSTED_DOMAIN_INFO_NAME
)]
816 lsa_TrustDomainInfoName name
;
817 [case(LSA_TRUSTED_DOMAIN_INFO_CONTROLLERS
)]
818 lsa_TrustDomainInfoControllers controllers
;
819 [case(LSA_TRUSTED_DOMAIN_INFO_POSIX_OFFSET
)]
820 lsa_TrustDomainInfoPosixOffset posix_offset
;
821 [case(LSA_TRUSTED_DOMAIN_INFO_PASSWORD
)]
822 lsa_TrustDomainInfoPassword password
;
823 [case(LSA_TRUSTED_DOMAIN_INFO_BASIC
)]
824 lsa_TrustDomainInfoBasic info_basic
;
825 [case(LSA_TRUSTED_DOMAIN_INFO_INFO_EX
)]
826 lsa_TrustDomainInfoInfoEx info_ex
;
827 [case(LSA_TRUSTED_DOMAIN_INFO_AUTH_INFO
)]
828 lsa_TrustDomainInfoAuthInfo auth_info
;
829 [case(LSA_TRUSTED_DOMAIN_INFO_FULL_INFO
)]
830 lsa_TrustDomainInfoFullInfo full_info
;
831 [case(LSA_TRUSTED_DOMAIN_INFO_AUTH_INFO_INTERNAL
)]
832 lsa_TrustDomainInfoAuthInfoInternal auth_info_internal
;
833 [case(LSA_TRUSTED_DOMAIN_INFO_FULL_INFO_INTERNAL
)]
834 lsa_TrustDomainInfoFullInfoInternal full_info_internal
;
835 [case(LSA_TRUSTED_DOMAIN_INFO_INFO_EX2_INTERNAL
)]
836 lsa_TrustDomainInfoInfoEx2Internal info_ex2_internal
;
837 [case(LSA_TRUSTED_DOMAIN_INFO_FULL_INFO_2_INTERNAL
)]
838 lsa_TrustDomainInfoFullInfo2Internal full_info2_internal
;
839 [case(LSA_TRUSTED_DOMAIN_SUPPORTED_ENCRYPTION_TYPES
)]
840 lsa_TrustDomainInfoSupportedEncTypes enc_types
;
841 } lsa_TrustedDomainInfo
;
844 NTSTATUS lsa_QueryTrustedDomainInfo
(
845 [in] policy_handle
*trustdom_handle
,
846 [in] lsa_TrustDomInfoEnum level
,
847 [out,switch_is(level
),ref] lsa_TrustedDomainInfo
**info
851 NTSTATUS lsa_SetInformationTrustedDomain
(
852 [in] policy_handle
*trustdom_handle
,
853 [in] lsa_TrustDomInfoEnum level
,
854 [in,switch_is(level
)] lsa_TrustedDomainInfo
*info
858 [public] NTSTATUS lsa_OpenSecret
(
859 [in] policy_handle
*handle,
860 [in] lsa_String name
,
861 [in] lsa_SecretAccessMask access_mask
,
862 [out] policy_handle
*sec_handle
867 [public] NTSTATUS lsa_SetSecret
(
868 [in] policy_handle
*sec_handle
,
869 [in,unique] lsa_DATA_BUF
*new_val
,
870 [in,unique] lsa_DATA_BUF
*old_val
878 [public] NTSTATUS lsa_QuerySecret
(
879 [in] policy_handle
*sec_handle
,
880 [in,out,unique] lsa_DATA_BUF_PTR
*new_val
,
881 [in,out,unique] NTTIME_hyper
*new_mtime
,
882 [in,out,unique] lsa_DATA_BUF_PTR
*old_val
,
883 [in,out,unique] NTTIME_hyper
*old_mtime
887 NTSTATUS lsa_LookupPrivValue
(
888 [in] policy_handle
*handle,
889 [in,ref] lsa_String
*name
,
890 [out,ref] lsa_LUID
*luid
895 NTSTATUS lsa_LookupPrivName
(
896 [in] policy_handle
*handle,
897 [in,ref] lsa_LUID
*luid
,
898 [out,ref] lsa_StringLarge
**name
902 /*******************/
904 NTSTATUS lsa_LookupPrivDisplayName
(
905 [in] policy_handle
*handle,
906 [in,ref] lsa_String
*name
,
907 [in] uint16 language_id
,
908 [in] uint16 language_id_sys
,
909 [out,ref] lsa_StringLarge
**disp_name
,
910 /* see http://www.microsoft.com/globaldev/nlsweb/ for
911 language definitions */
912 [out,ref] uint16
*returned_language_id
915 /*******************/
917 NTSTATUS lsa_DeleteObject
(
918 [in,out] policy_handle
*handle
921 /*******************/
923 NTSTATUS lsa_EnumAccountsWithUserRight
(
924 [in] policy_handle
*handle,
925 [in,unique] lsa_String
*name
,
926 [out] lsa_SidArray
*sids
931 [string,charset
(UTF16
)] uint16
*name
;
932 } lsa_RightAttribute
;
935 [range(0,256)] uint32 count
;
936 [size_is(count
)] lsa_StringLarge
*names
;
939 NTSTATUS lsa_EnumAccountRights
(
940 [in] policy_handle
*handle,
941 [in,ref] dom_sid2
*sid
,
942 [out,ref] lsa_RightSet
*rights
946 /**********************/
948 NTSTATUS lsa_AddAccountRights
(
949 [in] policy_handle
*handle,
950 [in,ref] dom_sid2
*sid
,
951 [in,ref] lsa_RightSet
*rights
954 /**********************/
956 NTSTATUS lsa_RemoveAccountRights
(
957 [in] policy_handle
*handle,
958 [in,ref] dom_sid2
*sid
,
959 [in] uint8 remove_all
,
960 [in,ref] lsa_RightSet
*rights
964 NTSTATUS lsa_QueryTrustedDomainInfoBySid
(
965 [in] policy_handle
*handle,
966 [in,ref] dom_sid2
*dom_sid
,
967 [in] lsa_TrustDomInfoEnum level
,
968 [out,switch_is(level
),ref] lsa_TrustedDomainInfo
**info
972 NTSTATUS lsa_SetTrustedDomainInfo
(
973 [in] policy_handle
*handle,
974 [in] dom_sid2
*dom_sid
,
975 [in] lsa_TrustDomInfoEnum level
,
976 [in,switch_is(level
)] lsa_TrustedDomainInfo
*info
980 NTSTATUS lsa_DeleteTrustedDomain
(
981 [in] policy_handle
*handle,
982 [in] dom_sid2
*dom_sid
986 NTSTATUS lsa_StorePrivateData
(
987 [in] policy_handle
*handle,
988 [in,ref] lsa_String
*name
,
989 [in,unique] lsa_DATA_BUF
*val
993 NTSTATUS lsa_RetrievePrivateData
(
994 [in] policy_handle
*handle,
995 [in,ref] lsa_String
*name
,
996 [in,out,ref] lsa_DATA_BUF
**val
999 /**********************/
1000 /* Function: 0x2c */
1001 [public] NTSTATUS lsa_OpenPolicy2
(
1002 [in,unique] [string,charset
(UTF16
)] uint16
*system_name
,
1003 [in] lsa_ObjectAttribute
*attr
,
1004 [in] lsa_PolicyAccessMask access_mask
,
1005 [out] policy_handle
*handle
1008 /**********************/
1009 /* Function: 0x2d */
1010 NTSTATUS lsa_GetUserName
(
1011 [in,unique] [string,charset
(UTF16
)] uint16
*system_name
,
1012 [in,out,ref] lsa_String
**account_name
,
1013 [in,out,unique] lsa_String
**authority_name
1016 /**********************/
1017 /* Function: 0x2e */
1019 NTSTATUS lsa_QueryInfoPolicy2
(
1020 [in] policy_handle
*handle,
1021 [in] lsa_PolicyInfo level
,
1022 [out,ref,switch_is(level
)] lsa_PolicyInformation
**info
1026 NTSTATUS lsa_SetInfoPolicy2
(
1027 [in] policy_handle
*handle,
1028 [in] lsa_PolicyInfo level
,
1029 [in,switch_is(level
)] lsa_PolicyInformation
*info
1032 /**********************/
1034 NTSTATUS lsa_QueryTrustedDomainInfoByName
(
1035 [in] policy_handle
*handle,
1036 [in,ref] lsa_String
*trusted_domain
,
1037 [in] lsa_TrustDomInfoEnum level
,
1038 [out,ref,switch_is(level
)] lsa_TrustedDomainInfo
**info
1041 /**********************/
1043 [public] NTSTATUS lsa_SetTrustedDomainInfoByName
(
1044 [in] policy_handle
*handle,
1045 [in,ref] lsa_String
*trusted_domain
,
1046 [in] lsa_TrustDomInfoEnum level
,
1047 [in,ref,switch_is(level
)] lsa_TrustedDomainInfo
*info
1052 /* w2k3 treats max_size as max_domains*82 */
1053 const int LSA_ENUM_TRUST_DOMAIN_EX_MULTIPLIER
= 82;
1057 [size_is(count
)] lsa_TrustDomainInfoInfoEx
*domains
;
1060 NTSTATUS lsa_EnumTrustedDomainsEx
(
1061 [in] policy_handle
*handle,
1062 [in,out] uint32
*resume_handle
,
1063 [out] lsa_DomainListEx
*domains
,
1064 [in] uint32 max_size
1068 NTSTATUS lsa_CreateTrustedDomainEx
(
1069 [in] policy_handle
*policy_handle
,
1070 [in] lsa_TrustDomainInfoInfoEx
*info
,
1071 [in] lsa_TrustDomainInfoAuthInfoInternal
*auth_info
,
1072 [in] uint32 access_mask
,
1073 [out] policy_handle
*trustdom_handle
1078 NTSTATUS lsa_CloseTrustedDomainEx
(
1079 [in,out] policy_handle
*handle
1084 /* w2k3 returns either 0x000bbbd000000000 or 0x000a48e800000000
1085 for unknown6 - gd */
1087 uint32 enforce_restrictions
;
1088 hyper service_tkt_lifetime
;
1089 hyper user_tkt_lifetime
;
1090 hyper user_tkt_renewaltime
;
1093 } lsa_DomainInfoKerberos
;
1097 [size_is(blob_size
)] uint8
*efs_blob
;
1098 } lsa_DomainInfoEfs
;
1101 LSA_DOMAIN_INFO_POLICY_EFS
=2,
1102 LSA_DOMAIN_INFO_POLICY_KERBEROS
=3
1103 } lsa_DomainInfoEnum
;
1105 typedef [switch_type(uint16
)] union {
1106 [case(LSA_DOMAIN_INFO_POLICY_EFS
)] lsa_DomainInfoEfs efs_info
;
1107 [case(LSA_DOMAIN_INFO_POLICY_KERBEROS
)] lsa_DomainInfoKerberos kerberos_info
;
1108 } lsa_DomainInformationPolicy
;
1110 NTSTATUS lsa_QueryDomainInformationPolicy
(
1111 [in] policy_handle
*handle,
1113 [out,ref,switch_is(level
)] lsa_DomainInformationPolicy
**info
1117 NTSTATUS lsa_SetDomainInformationPolicy
(
1118 [in] policy_handle
*handle,
1120 [in,unique,switch_is(level
)] lsa_DomainInformationPolicy
*info
1123 /**********************/
1125 NTSTATUS lsa_OpenTrustedDomainByName
(
1126 [in] policy_handle
*handle,
1127 [in] lsa_String name
,
1128 [in] uint32 access_mask
,
1129 [out] policy_handle
*trustdom_handle
1133 [todo
] NTSTATUS lsa_TestCall
();
1135 /**********************/
1139 lsa_SidType sid_type
;
1143 } lsa_TranslatedName2
;
1146 [range(0,1000)] uint32 count
;
1147 [size_is(count
)] lsa_TranslatedName2
*names
;
1148 } lsa_TransNameArray2
;
1150 typedef [v1_enum] enum {
1151 LSA_LOOKUP_OPTION_SEARCH_ISOLATED_NAMES
= 0x00000000,
1152 LSA_LOOKUP_OPTION_SEARCH_ISOLATED_NAMES_LOCAL
= 0x80000000
1153 } lsa_LookupOptions
;
1155 typedef [v1_enum] enum {
1156 LSA_CLIENT_REVISION_1
= 0x00000001,
1157 LSA_CLIENT_REVISION_2
= 0x00000002
1158 } lsa_ClientRevision
;
1160 [public] NTSTATUS lsa_LookupSids2
(
1161 [in] policy_handle
*handle,
1162 [in,ref] lsa_SidArray
*sids
,
1163 [out,ref] lsa_RefDomainList
**domains
,
1164 [in,out,ref] lsa_TransNameArray2
*names
,
1165 [in] lsa_LookupNamesLevel level
,
1166 [in,out,ref] uint32
*count
,
1167 [in] lsa_LookupOptions lookup_options
,
1168 [in] lsa_ClientRevision client_revision
1171 /**********************/
1175 lsa_SidType sid_type
;
1179 } lsa_TranslatedSid2
;
1182 [range(0,1000)] uint32 count
;
1183 [size_is(count
)] lsa_TranslatedSid2
*sids
;
1184 } lsa_TransSidArray2
;
1186 [public] NTSTATUS lsa_LookupNames2
(
1187 [in] policy_handle
*handle,
1188 [in,range(0,1000)] uint32 num_names
,
1189 [in,size_is(num_names
)] lsa_String names
[],
1190 [out,ref] lsa_RefDomainList
**domains
,
1191 [in,out,ref] lsa_TransSidArray2
*sids
,
1192 [in] lsa_LookupNamesLevel level
,
1193 [in,out,ref] uint32
*count
,
1194 [in] lsa_LookupOptions lookup_options
,
1195 [in] lsa_ClientRevision client_revision
1199 NTSTATUS lsa_CreateTrustedDomainEx2
(
1200 [in] policy_handle
*policy_handle
,
1201 [in] lsa_TrustDomainInfoInfoEx
*info
,
1202 [in] lsa_TrustDomainInfoAuthInfoInternal
*auth_info
,
1203 [in] uint32 access_mask
,
1204 [out] policy_handle
*trustdom_handle
1208 [todo
] NTSTATUS lsa_CREDRWRITE
();
1211 [todo
] NTSTATUS lsa_CREDRREAD
();
1214 [todo
] NTSTATUS lsa_CREDRENUMERATE
();
1217 [todo
] NTSTATUS lsa_CREDRWRITEDOMAINCREDENTIALS
();
1220 [todo
] NTSTATUS lsa_CREDRREADDOMAINCREDENTIALS
();
1223 [todo
] NTSTATUS lsa_CREDRDELETE
();
1226 [todo
] NTSTATUS lsa_CREDRGETTARGETINFO
();
1229 [todo
] NTSTATUS lsa_CREDRPROFILELOADED
();
1231 /**********************/
1234 lsa_SidType sid_type
;
1238 } lsa_TranslatedSid3
;
1241 [range(0,1000)] uint32 count
;
1242 [size_is(count
)] lsa_TranslatedSid3
*sids
;
1243 } lsa_TransSidArray3
;
1245 [public] NTSTATUS lsa_LookupNames3
(
1246 [in] policy_handle
*handle,
1247 [in,range(0,1000)] uint32 num_names
,
1248 [in,size_is(num_names
)] lsa_String names
[],
1249 [out,ref] lsa_RefDomainList
**domains
,
1250 [in,out,ref] lsa_TransSidArray3
*sids
,
1251 [in] lsa_LookupNamesLevel level
,
1252 [in,out,ref] uint32
*count
,
1253 [in] lsa_LookupOptions lookup_options
,
1254 [in] lsa_ClientRevision client_revision
1258 [todo
] NTSTATUS lsa_CREDRGETSESSIONTYPES
();
1261 [todo
] NTSTATUS lsa_LSARREGISTERAUDITEVENT
();
1264 [todo
] NTSTATUS lsa_LSARGENAUDITEVENT
();
1267 [todo
] NTSTATUS lsa_LSARUNREGISTERAUDITEVENT
();
1271 [range(0,131072)] uint3264 length
;
1272 [size_is(length
)] uint8
*data
;
1273 } lsa_ForestTrustBinaryData
;
1276 dom_sid2
*domain_sid
;
1277 lsa_StringLarge dns_domain_name
;
1278 lsa_StringLarge netbios_domain_name
;
1279 } lsa_ForestTrustDomainInfo
;
1281 typedef [switch_type(uint32
)] union {
1282 [case(LSA_FOREST_TRUST_TOP_LEVEL_NAME
)] lsa_StringLarge top_level_name
;
1283 [case(LSA_FOREST_TRUST_TOP_LEVEL_NAME_EX
)] lsa_StringLarge top_level_name_ex
;
1284 [case(LSA_FOREST_TRUST_DOMAIN_INFO
)] lsa_ForestTrustDomainInfo domain_info
;
1285 [default] lsa_ForestTrustBinaryData data
;
1286 } lsa_ForestTrustData
;
1288 typedef [v1_enum] enum {
1289 LSA_FOREST_TRUST_TOP_LEVEL_NAME
= 0,
1290 LSA_FOREST_TRUST_TOP_LEVEL_NAME_EX
= 1,
1291 LSA_FOREST_TRUST_DOMAIN_INFO
= 2,
1292 LSA_FOREST_TRUST_RECORD_TYPE_LAST
= 3
1293 } lsa_ForestTrustRecordType
;
1297 lsa_ForestTrustRecordType type
;
1299 [switch_is(type
)] lsa_ForestTrustData forest_trust_data
;
1300 } lsa_ForestTrustRecord
;
1302 typedef [public] struct {
1303 [range(0,4000)] uint32 count
;
1304 [size_is(count
)] lsa_ForestTrustRecord
**entries
;
1305 } lsa_ForestTrustInformation
;
1307 NTSTATUS lsa_lsaRQueryForestTrustInformation
(
1308 [in] policy_handle
*handle,
1309 [in,ref] lsa_String
*trusted_domain_name
,
1310 [in] uint16 unknown
, /* level ? */
1311 [out,ref] lsa_ForestTrustInformation
**forest_trust_info
1317 typedef [v1_enum] enum {
1318 LSA_FOREST_TRUST_COLLISION_TDO
= 0,
1319 LSA_FOREST_TRUST_COLLISION_XREF
= 1,
1320 LSA_FOREST_TRUST_COLLISION_OTHER
= 2
1321 } lsa_ForestTrustCollisionRecordType
;
1323 /* if type is CollisionTdo, flags can be */
1324 typedef [bitmap32bit
] bitmap
{
1325 LSA_TLN_DISABLED_NEW
= 0x00000001,
1326 LSA_TLN_DISABLED_ADMIN
= 0x00000002,
1327 LSA_TLN_DISABLED_CONFLICT
= 0x00000004
1328 } lsa_ForestTrustCollisionTDOFlags
;
1330 /* if type is CollisionXref, flags can be */
1331 typedef [bitmap32bit
] bitmap
{
1332 LSA_SID_DISABLED_ADMIN
= 0x00000001,
1333 LSA_SID_DISABLED_CONFLICT
= 0x00000002,
1334 LSA_NB_DISABLED_ADMIN
= 0x00000004,
1335 LSA_NB_DISABLED_CONFLICT
= 0x00000008
1336 } lsa_ForestTrustCollisionXrefFlags
;
1338 typedef [nodiscriminant
] union {
1339 [case(LSA_FOREST_TRUST_COLLISION_TDO
)] lsa_ForestTrustCollisionTDOFlags flags
;
1340 [case(LSA_FOREST_TRUST_COLLISION_XREF
)] lsa_ForestTrustCollisionXrefFlags flags
;
1341 [default] uint32 flags
;
1342 } lsa_ForestTrustCollisionFlags
;
1346 lsa_ForestTrustCollisionRecordType type
;
1347 [switch_is(type
)] lsa_ForestTrustCollisionFlags flags
;
1349 } lsa_ForestTrustCollisionRecord
;
1353 [size_is(count
)] lsa_ForestTrustCollisionRecord
**entries
;
1354 } lsa_ForestTrustCollisionInfo
;
1356 [public] NTSTATUS lsa_lsaRSetForestTrustInformation
(
1357 [in] policy_handle
*handle,
1358 [in,ref] lsa_StringLarge
*trusted_domain_name
,
1359 [in] uint16 highest_record_type
,
1360 [in,ref] lsa_ForestTrustInformation
*forest_trust_info
,
1361 [in] uint8 check_only
,
1362 [out,ref] lsa_ForestTrustCollisionInfo
**collision_info
1366 [todo
] NTSTATUS lsa_CREDRRENAME
();
1371 [public] NTSTATUS lsa_LookupSids3
(
1372 [in,ref] lsa_SidArray
*sids
,
1373 [out,ref] lsa_RefDomainList
**domains
,
1374 [in,out,ref] lsa_TransNameArray2
*names
,
1375 [in] lsa_LookupNamesLevel level
,
1376 [in,out,ref] uint32
*count
,
1377 [in] lsa_LookupOptions lookup_options
,
1378 [in] lsa_ClientRevision client_revision
1381 const int LSA_CLIENT_REVISION_NO_DNS
= 0x00000001;
1382 const int LSA_CLIENT_REVISION_DNS
= 0x00000002;
1384 const int LSA_LOOKUP_OPTIONS_NO_ISOLATED
= 0x80000000;
1387 NTSTATUS lsa_LookupNames4
(
1388 [in,range(0,1000)] uint32 num_names
,
1389 [in,size_is(num_names
)] lsa_String names
[],
1390 [out,ref] lsa_RefDomainList
**domains
,
1391 [in,out,ref] lsa_TransSidArray3
*sids
,
1392 [in] lsa_LookupNamesLevel level
,
1393 [in,out,ref] uint32
*count
,
1394 [in] lsa_LookupOptions lookup_options
,
1395 [in] lsa_ClientRevision client_revision
1399 [todo
] NTSTATUS lsa_LSAROPENPOLICYSCE
();
1402 [todo
] NTSTATUS lsa_LSARADTREGISTERSECURITYEVENTSOURCE
();
1405 [todo
] NTSTATUS lsa_LSARADTUNREGISTERSECURITYEVENTSOURCE
();
1408 [todo
] NTSTATUS lsa_LSARADTREPORTSECURITYEVENT
();