Add basic DFS tests.
[Samba/ekacnet.git] / librpc / idl / lsa.idl
blobe9c65045d9cf5e9a17af71af81fbc83bb3b48a4e
1 #include "idl_types.h"
3 /*
4 lsa interface definition
5 */
7 import "misc.idl", "security.idl";
9 [ uuid("12345778-1234-abcd-ef00-0123456789ab"),
10 version(0.0),
11 endpoint("ncacn_np:[\\pipe\\lsarpc]","ncacn_np:[\\pipe\\netlogon]","ncacn_np:[\\pipe\\lsass]", "ncacn_ip_tcp:", "ncalrpc:"),
12 pointer_default(unique),
13 helpstring("Local Security Authority")
14 ] interface lsarpc
16 typedef bitmap security_secinfo security_secinfo;
17 typedef bitmap kerb_EncTypes kerb_EncTypes;
19 typedef [public] struct {
20 [value(2*strlen_m(string))] uint16 length;
21 [value(2*strlen_m(string))] uint16 size;
22 [charset(UTF16),size_is(size/2),length_is(length/2)] uint16 *string;
23 } lsa_String;
25 typedef [public] struct {
26 [value(2*strlen_m(string))] uint16 length;
27 [value(2*strlen_m_term(string))] uint16 size;
28 [charset(UTF16),size_is(size/2),length_is(length/2)] uint16 *string;
29 } lsa_StringLarge;
31 typedef [public] struct {
32 uint32 count;
33 [size_is(count)] lsa_String *names;
34 } lsa_Strings;
36 typedef [public] struct {
37 [value(strlen_m(string))] uint16 length;
38 [value(strlen_m(string))] uint16 size;
39 [charset(DOS),size_is(size),length_is(length)] uint8 *string;
40 } lsa_AsciiString;
42 typedef [public] struct {
43 [value(strlen_m(string))] uint16 length;
44 [value(strlen_m_term(string))] uint16 size;
45 [charset(DOS),size_is(size),length_is(length)] uint8 *string;
46 } lsa_AsciiStringLarge;
48 typedef [public] struct {
49 uint16 length;
50 uint16 size;
51 [size_is(size/2),length_is(length/2)] uint16 *array;
52 } lsa_BinaryString;
54 /******************/
55 /* Function: 0x00 */
56 NTSTATUS lsa_Close (
57 [in,out] policy_handle *handle
61 /******************/
62 /* Function: 0x01 */
63 [public] NTSTATUS lsa_Delete (
64 [in] policy_handle *handle
68 /******************/
69 /* Function: 0x02 */
70 typedef struct {
71 uint32 low;
72 uint32 high;
73 } lsa_LUID;
75 typedef struct {
76 lsa_StringLarge name;
77 lsa_LUID luid;
78 } lsa_PrivEntry;
80 typedef struct {
81 uint32 count;
82 [size_is(count)] lsa_PrivEntry *privs;
83 } lsa_PrivArray;
85 [public] NTSTATUS lsa_EnumPrivs (
86 [in] policy_handle *handle,
87 [in,out,ref] uint32 *resume_handle,
88 [out,ref] lsa_PrivArray *privs,
89 [in] uint32 max_count
92 /******************/
93 /* Function: 0x03 */
94 NTSTATUS lsa_QuerySecurity (
95 [in] policy_handle *handle,
96 [in] security_secinfo sec_info,
97 [out,ref] sec_desc_buf **sdbuf
100 /******************/
101 /* Function: 0x04 */
102 NTSTATUS lsa_SetSecObj(
103 [in] policy_handle *handle,
104 [in] security_secinfo sec_info,
105 [in,ref] sec_desc_buf *sdbuf
108 /******************/
109 /* Function: 0x05 */
110 [todo] NTSTATUS lsa_ChangePassword ();
113 /******************/
114 /* Function: 0x06 */
115 typedef struct {
116 uint3264 len; /* ignored */
117 uint16 impersonation_level;
118 uint8 context_mode;
119 uint8 effective_only;
120 } lsa_QosInfo;
122 typedef struct {
123 uint3264 len; /* ignored */
124 uint8 *root_dir;
125 [string,charset(UTF16)] uint16 *object_name;
126 uint32 attributes;
127 security_descriptor *sec_desc;
128 lsa_QosInfo *sec_qos;
129 } lsa_ObjectAttribute;
131 typedef [public,bitmap32bit] bitmap {
132 LSA_POLICY_VIEW_LOCAL_INFORMATION = 0x00000001,
133 LSA_POLICY_VIEW_AUDIT_INFORMATION = 0x00000002,
134 LSA_POLICY_GET_PRIVATE_INFORMATION = 0x00000004,
135 LSA_POLICY_TRUST_ADMIN = 0x00000008,
136 LSA_POLICY_CREATE_ACCOUNT = 0x00000010,
137 LSA_POLICY_CREATE_SECRET = 0x00000020,
138 LSA_POLICY_CREATE_PRIVILEGE = 0x00000040,
139 LSA_POLICY_SET_DEFAULT_QUOTA_LIMITS = 0x00000080,
140 LSA_POLICY_SET_AUDIT_REQUIREMENTS = 0x00000100,
141 LSA_POLICY_AUDIT_LOG_ADMIN = 0x00000200,
142 LSA_POLICY_SERVER_ADMIN = 0x00000400,
143 LSA_POLICY_LOOKUP_NAMES = 0x00000800,
144 LSA_POLICY_NOTIFICATION = 0x00001000
145 } lsa_PolicyAccessMask;
147 const int LSA_POLICY_ALL_ACCESS =
148 (STANDARD_RIGHTS_REQUIRED_ACCESS |
149 LSA_POLICY_VIEW_LOCAL_INFORMATION |
150 LSA_POLICY_VIEW_AUDIT_INFORMATION |
151 LSA_POLICY_GET_PRIVATE_INFORMATION |
152 LSA_POLICY_TRUST_ADMIN |
153 LSA_POLICY_CREATE_ACCOUNT |
154 LSA_POLICY_CREATE_SECRET |
155 LSA_POLICY_CREATE_PRIVILEGE |
156 LSA_POLICY_SET_DEFAULT_QUOTA_LIMITS |
157 LSA_POLICY_SET_AUDIT_REQUIREMENTS |
158 LSA_POLICY_AUDIT_LOG_ADMIN |
159 LSA_POLICY_SERVER_ADMIN |
160 LSA_POLICY_LOOKUP_NAMES);
162 const int LSA_POLICY_READ =
163 (STANDARD_RIGHTS_READ_ACCESS |
164 LSA_POLICY_VIEW_LOCAL_INFORMATION |
165 LSA_POLICY_VIEW_AUDIT_INFORMATION |
166 LSA_POLICY_GET_PRIVATE_INFORMATION);
168 const int LSA_POLICY_WRITE =
169 (STANDARD_RIGHTS_READ_ACCESS |
170 LSA_POLICY_TRUST_ADMIN |
171 LSA_POLICY_CREATE_ACCOUNT |
172 LSA_POLICY_CREATE_SECRET |
173 LSA_POLICY_CREATE_PRIVILEGE |
174 LSA_POLICY_SET_DEFAULT_QUOTA_LIMITS |
175 LSA_POLICY_SET_AUDIT_REQUIREMENTS |
176 LSA_POLICY_AUDIT_LOG_ADMIN |
177 LSA_POLICY_SERVER_ADMIN);
179 const int LSA_POLICY_EXECUTE =
180 (STANDARD_RIGHTS_EXECUTE_ACCESS |
181 LSA_POLICY_VIEW_LOCAL_INFORMATION |
182 LSA_POLICY_LOOKUP_NAMES);
184 typedef [public,bitmap32bit] bitmap {
185 LSA_ACCOUNT_VIEW = 0x00000001,
186 LSA_ACCOUNT_ADJUST_PRIVILEGES = 0x00000002,
187 LSA_ACCOUNT_ADJUST_QUOTAS = 0x00000004,
188 LSA_ACCOUNT_ADJUST_SYSTEM_ACCESS = 0x00000008
189 } lsa_AccountAccessMask;
191 const int LSA_ACCOUNT_ALL_ACCESS =
192 (STANDARD_RIGHTS_REQUIRED_ACCESS |
193 LSA_ACCOUNT_VIEW |
194 LSA_ACCOUNT_ADJUST_PRIVILEGES |
195 LSA_ACCOUNT_ADJUST_QUOTAS |
196 LSA_ACCOUNT_ADJUST_SYSTEM_ACCESS);
198 const int LSA_ACCOUNT_READ =
199 (STANDARD_RIGHTS_READ_ACCESS |
200 LSA_ACCOUNT_VIEW);
202 const int LSA_ACCOUNT_WRITE =
203 (STANDARD_RIGHTS_READ_ACCESS |
204 LSA_ACCOUNT_ADJUST_PRIVILEGES |
205 LSA_ACCOUNT_ADJUST_QUOTAS |
206 LSA_ACCOUNT_ADJUST_SYSTEM_ACCESS);
208 const int LSA_ACCOUNT_EXECUTE =
209 (STANDARD_RIGHTS_EXECUTE_ACCESS);
211 typedef [public,bitmap32bit] bitmap {
212 LSA_SECRET_SET_VALUE = 0x00000001,
213 LSA_SECRET_QUERY_VALUE = 0x00000002
214 } lsa_SecretAccessMask;
216 const int LSA_SECRET_ALL_ACCESS =
217 (LSA_SECRET_QUERY_VALUE |
218 LSA_SECRET_SET_VALUE |
219 SEC_STD_DELETE |
220 STANDARD_RIGHTS_READ_ACCESS |
221 SEC_STD_WRITE_DAC |
222 SEC_STD_WRITE_OWNER); /* 0x000F0003 */
224 const int LSA_SECRET_READ =
225 (LSA_SECRET_QUERY_VALUE |
226 STANDARD_RIGHTS_READ_ACCESS); /* 0x00020002 */
228 const int LSA_SECRET_WRITE =
229 (LSA_SECRET_SET_VALUE |
230 STANDARD_RIGHTS_READ_ACCESS); /* 0x00020001 */
232 const int LSA_SECRET_EXECUTE =
233 (STANDARD_RIGHTS_READ_ACCESS); /* 0x00020000 */
235 typedef [public,bitmap32bit] bitmap {
236 LSA_TRUSTED_QUERY_DOMAIN_NAME = 0x00000001,
237 LSA_TRUSTED_QUERY_CONTROLLERS = 0x00000002,
238 LSA_TRUSTED_SET_CONTROLLERS = 0x00000004,
239 LSA_TRUSTED_QUERY_POSIX = 0x00000008,
240 LSA_TRUSTED_SET_POSIX = 0x00000010,
241 LSA_TRUSTED_SET_AUTH = 0x00000020,
242 LSA_TRUSTED_QUERY_AUTH = 0x00000040
243 } lsa_TrustedAccessMask;
245 const int LSA_TRUSTED_DOMAIN_ALL_ACCESS =
246 (LSA_TRUSTED_QUERY_DOMAIN_NAME |
247 LSA_TRUSTED_QUERY_CONTROLLERS |
248 LSA_TRUSTED_SET_CONTROLLERS |
249 LSA_TRUSTED_QUERY_POSIX |
250 LSA_TRUSTED_SET_POSIX |
251 LSA_TRUSTED_SET_AUTH |
252 LSA_TRUSTED_QUERY_AUTH |
253 SEC_STD_DELETE |
254 STANDARD_RIGHTS_READ_ACCESS |
255 SEC_STD_WRITE_DAC |
256 SEC_STD_WRITE_OWNER); /* 0x000F007F */
258 const int LSA_TRUSTED_DOMAIN_READ =
259 (LSA_TRUSTED_QUERY_DOMAIN_NAME |
260 STANDARD_RIGHTS_READ_ACCESS); /* 0x00020001 */
262 const int LSA_TRUSTED_DOMAIN_WRITE =
263 (LSA_TRUSTED_SET_CONTROLLERS |
264 LSA_TRUSTED_SET_POSIX |
265 LSA_TRUSTED_SET_AUTH |
266 STANDARD_RIGHTS_READ_ACCESS); /* 0x00020034 */
268 const int LSA_TRUSTED_DOMAIN_EXECUTE =
269 (LSA_TRUSTED_QUERY_DOMAIN_NAME |
270 LSA_TRUSTED_QUERY_POSIX |
271 STANDARD_RIGHTS_READ_ACCESS); /* 0x0002000C */
274 /* notice the screwup with the system_name - thats why MS created
275 OpenPolicy2 */
276 [public] NTSTATUS lsa_OpenPolicy (
277 [in,unique] uint16 *system_name,
278 [in] lsa_ObjectAttribute *attr,
279 [in] lsa_PolicyAccessMask access_mask,
280 [out] policy_handle *handle
285 /******************/
286 /* Function: 0x07 */
288 typedef struct {
289 uint32 percent_full;
290 uint32 maximum_log_size;
291 hyper retention_time;
292 uint8 shutdown_in_progress;
293 hyper time_to_shutdown;
294 uint32 next_audit_record;
295 } lsa_AuditLogInfo;
297 typedef [v1_enum] enum {
298 LSA_AUDIT_POLICY_NONE=0,
299 LSA_AUDIT_POLICY_SUCCESS=1,
300 LSA_AUDIT_POLICY_FAILURE=2,
301 LSA_AUDIT_POLICY_ALL=(LSA_AUDIT_POLICY_SUCCESS|LSA_AUDIT_POLICY_FAILURE),
302 LSA_AUDIT_POLICY_CLEAR=4
303 } lsa_PolicyAuditPolicy;
305 typedef enum {
306 LSA_AUDIT_CATEGORY_SYSTEM = 0,
307 LSA_AUDIT_CATEGORY_LOGON = 1,
308 LSA_AUDIT_CATEGORY_FILE_AND_OBJECT_ACCESS = 2,
309 LSA_AUDIT_CATEGORY_USE_OF_USER_RIGHTS = 3,
310 LSA_AUDIT_CATEGORY_PROCCESS_TRACKING = 4,
311 LSA_AUDIT_CATEGORY_SECURITY_POLICY_CHANGES = 5,
312 LSA_AUDIT_CATEGORY_ACCOUNT_MANAGEMENT = 6,
313 LSA_AUDIT_CATEGORY_DIRECTORY_SERVICE_ACCESS = 7, /* only in win2k/2k3 */
314 LSA_AUDIT_CATEGORY_ACCOUNT_LOGON = 8 /* only in win2k/2k3 */
315 } lsa_PolicyAuditEventType;
317 typedef struct {
318 uint32 auditing_mode;
319 [size_is(count)] lsa_PolicyAuditPolicy *settings;
320 uint32 count;
321 } lsa_AuditEventsInfo;
323 typedef struct {
324 lsa_StringLarge name;
325 dom_sid2 *sid;
326 } lsa_DomainInfo;
328 typedef struct {
329 lsa_String name;
330 } lsa_PDAccountInfo;
332 typedef [v1_enum] enum {
333 LSA_ROLE_BACKUP=2,
334 LSA_ROLE_PRIMARY=3
335 } lsa_Role;
337 typedef struct {
338 lsa_Role role;
339 } lsa_ServerRole;
341 typedef struct {
342 lsa_String source;
343 lsa_String account;
344 } lsa_ReplicaSourceInfo;
346 typedef struct {
347 uint32 paged_pool;
348 uint32 non_paged_pool;
349 uint32 min_wss;
350 uint32 max_wss;
351 uint32 pagefile;
352 hyper unknown;
353 } lsa_DefaultQuotaInfo;
355 typedef struct {
356 hyper modified_id;
357 NTTIME_hyper db_create_time;
358 } lsa_ModificationInfo;
360 typedef struct {
361 uint8 shutdown_on_full;
362 } lsa_AuditFullSetInfo;
364 typedef struct {
365 uint8 shutdown_on_full;
366 uint8 log_is_full;
367 } lsa_AuditFullQueryInfo;
369 typedef struct {
370 /* it's important that we use the lsa_StringLarge here,
371 * because otherwise windows clients result with such dns hostnames
372 * e.g. w2k3-client.samba4.samba.orgsamba4.samba.org
373 * where it should be
374 * w2k3-client.samba4.samba.org
376 lsa_StringLarge name;
377 lsa_StringLarge dns_domain;
378 lsa_StringLarge dns_forest;
379 GUID domain_guid;
380 dom_sid2 *sid;
381 } lsa_DnsDomainInfo;
383 typedef enum {
384 LSA_POLICY_INFO_AUDIT_LOG=1,
385 LSA_POLICY_INFO_AUDIT_EVENTS=2,
386 LSA_POLICY_INFO_DOMAIN=3,
387 LSA_POLICY_INFO_PD=4,
388 LSA_POLICY_INFO_ACCOUNT_DOMAIN=5,
389 LSA_POLICY_INFO_ROLE=6,
390 LSA_POLICY_INFO_REPLICA=7,
391 LSA_POLICY_INFO_QUOTA=8,
392 LSA_POLICY_INFO_MOD=9,
393 LSA_POLICY_INFO_AUDIT_FULL_SET=10,
394 LSA_POLICY_INFO_AUDIT_FULL_QUERY=11,
395 LSA_POLICY_INFO_DNS=12,
396 LSA_POLICY_INFO_DNS_INT=13,
397 LSA_POLICY_INFO_L_ACCOUNT_DOMAIN=14
398 } lsa_PolicyInfo;
400 typedef [switch_type(uint16)] union {
401 [case(LSA_POLICY_INFO_AUDIT_LOG)] lsa_AuditLogInfo audit_log;
402 [case(LSA_POLICY_INFO_AUDIT_EVENTS)] lsa_AuditEventsInfo audit_events;
403 [case(LSA_POLICY_INFO_DOMAIN)] lsa_DomainInfo domain;
404 [case(LSA_POLICY_INFO_PD)] lsa_PDAccountInfo pd;
405 [case(LSA_POLICY_INFO_ACCOUNT_DOMAIN)] lsa_DomainInfo account_domain;
406 [case(LSA_POLICY_INFO_ROLE)] lsa_ServerRole role;
407 [case(LSA_POLICY_INFO_REPLICA)] lsa_ReplicaSourceInfo replica;
408 [case(LSA_POLICY_INFO_QUOTA)] lsa_DefaultQuotaInfo quota;
409 [case(LSA_POLICY_INFO_MOD)] lsa_ModificationInfo mod;
410 [case(LSA_POLICY_INFO_AUDIT_FULL_SET)] lsa_AuditFullSetInfo auditfullset;
411 [case(LSA_POLICY_INFO_AUDIT_FULL_QUERY)] lsa_AuditFullQueryInfo auditfullquery;
412 [case(LSA_POLICY_INFO_DNS)] lsa_DnsDomainInfo dns;
413 [case(LSA_POLICY_INFO_DNS_INT)] lsa_DnsDomainInfo dns;
414 [case(LSA_POLICY_INFO_L_ACCOUNT_DOMAIN)] lsa_DomainInfo l_account_domain;
415 } lsa_PolicyInformation;
417 NTSTATUS lsa_QueryInfoPolicy(
418 [in] policy_handle *handle,
419 [in] lsa_PolicyInfo level,
420 [out,ref,switch_is(level)] lsa_PolicyInformation **info
423 /******************/
424 /* Function: 0x08 */
425 NTSTATUS lsa_SetInfoPolicy (
426 [in] policy_handle *handle,
427 [in] lsa_PolicyInfo level,
428 [in,switch_is(level)] lsa_PolicyInformation *info
431 /******************/
432 /* Function: 0x09 */
433 [todo] NTSTATUS lsa_ClearAuditLog ();
435 /******************/
436 /* Function: 0x0a */
437 [public] NTSTATUS lsa_CreateAccount (
438 [in] policy_handle *handle,
439 [in,ref] dom_sid2 *sid,
440 [in] lsa_AccountAccessMask access_mask,
441 [out] policy_handle *acct_handle
444 /******************/
445 /* NOTE: This only returns accounts that have at least
446 one privilege set
448 /* Function: 0x0b */
449 typedef struct {
450 dom_sid2 *sid;
451 } lsa_SidPtr;
453 typedef [public] struct {
454 [range(0,20480)] uint32 num_sids;
455 [size_is(num_sids)] lsa_SidPtr *sids;
456 } lsa_SidArray;
458 [public] NTSTATUS lsa_EnumAccounts(
459 [in] policy_handle *handle,
460 [in,out,ref] uint32 *resume_handle,
461 [out,ref] lsa_SidArray *sids,
462 [in,range(0,8192)] uint32 num_entries
465 /*************************************************/
466 /* Function: 0x0c */
468 [public] NTSTATUS lsa_CreateTrustedDomain(
469 [in] policy_handle *policy_handle,
470 [in] lsa_DomainInfo *info,
471 [in] lsa_TrustedAccessMask access_mask,
472 [out] policy_handle *trustdom_handle
476 /******************/
477 /* Function: 0x0d */
479 /* w2k3 treats max_size as max_domains*60 */
480 const int LSA_ENUM_TRUST_DOMAIN_MULTIPLIER = 60;
482 typedef struct {
483 uint32 count;
484 [size_is(count)] lsa_DomainInfo *domains;
485 } lsa_DomainList;
487 NTSTATUS lsa_EnumTrustDom(
488 [in] policy_handle *handle,
489 [in,out,ref] uint32 *resume_handle,
490 [out,ref] lsa_DomainList *domains,
491 [in] uint32 max_size
495 /******************/
496 /* Function: 0x0e */
497 typedef [public] enum {
498 SID_NAME_USE_NONE = 0,/* NOTUSED */
499 SID_NAME_USER = 1, /* user */
500 SID_NAME_DOM_GRP = 2, /* domain group */
501 SID_NAME_DOMAIN = 3, /* domain: don't know what this is */
502 SID_NAME_ALIAS = 4, /* local group */
503 SID_NAME_WKN_GRP = 5, /* well-known group */
504 SID_NAME_DELETED = 6, /* deleted account: needed for c2 rating */
505 SID_NAME_INVALID = 7, /* invalid account */
506 SID_NAME_UNKNOWN = 8, /* oops. */
507 SID_NAME_COMPUTER = 9 /* machine */
508 } lsa_SidType;
510 typedef struct {
511 lsa_SidType sid_type;
512 uint32 rid;
513 uint32 sid_index;
514 } lsa_TranslatedSid;
516 typedef struct {
517 [range(0,1000)] uint32 count;
518 [size_is(count)] lsa_TranslatedSid *sids;
519 } lsa_TransSidArray;
521 const int LSA_REF_DOMAIN_LIST_MULTIPLIER = 32;
522 typedef struct {
523 [range(0,1000)] uint32 count;
524 [size_is(count)] lsa_DomainInfo *domains;
525 uint32 max_size;
526 } lsa_RefDomainList;
528 /* Level 1: Ask everywhere
529 * Level 2: Ask domain and trusted domains, no builtin and wkn
530 * Level 3: Only ask domain
531 * Level 4: W2k3ad: Only ask AD trusts
532 * Level 5: Only ask transitive forest trusts
533 * Level 6: Like 4
536 typedef enum {
537 LSA_LOOKUP_NAMES_ALL = 1,
538 LSA_LOOKUP_NAMES_DOMAINS_ONLY = 2,
539 LSA_LOOKUP_NAMES_PRIMARY_DOMAIN_ONLY = 3,
540 LSA_LOOKUP_NAMES_UPLEVEL_TRUSTS_ONLY = 4,
541 LSA_LOOKUP_NAMES_FOREST_TRUSTS_ONLY = 5,
542 LSA_LOOKUP_NAMES_UPLEVEL_TRUSTS_ONLY2 = 6,
543 LSA_LOOKUP_NAMES_RODC_REFERRAL_TO_FULL_DC = 7
544 } lsa_LookupNamesLevel;
546 [public] NTSTATUS lsa_LookupNames (
547 [in] policy_handle *handle,
548 [in,range(0,1000)] uint32 num_names,
549 [in,size_is(num_names)] lsa_String names[],
550 [out,ref] lsa_RefDomainList **domains,
551 [in,out,ref] lsa_TransSidArray *sids,
552 [in] lsa_LookupNamesLevel level,
553 [in,out,ref] uint32 *count
557 /******************/
558 /* Function: 0x0f */
560 typedef struct {
561 lsa_SidType sid_type;
562 lsa_String name;
563 uint32 sid_index;
564 } lsa_TranslatedName;
566 typedef struct {
567 [range(0,20480)] uint32 count;
568 [size_is(count)] lsa_TranslatedName *names;
569 } lsa_TransNameArray;
571 [public] NTSTATUS lsa_LookupSids(
572 [in] policy_handle *handle,
573 [in,ref] lsa_SidArray *sids,
574 [out,ref] lsa_RefDomainList **domains,
575 [in,out,ref] lsa_TransNameArray *names,
576 [in] lsa_LookupNamesLevel level,
577 [in,out,ref] uint32 *count
581 /* Function: 0x10 */
582 [public] NTSTATUS lsa_CreateSecret(
583 [in] policy_handle *handle,
584 [in] lsa_String name,
585 [in] lsa_SecretAccessMask access_mask,
586 [out] policy_handle *sec_handle
590 /*****************************************/
591 /* Function: 0x11 */
592 NTSTATUS lsa_OpenAccount(
593 [in] policy_handle *handle,
594 [in,ref] dom_sid2 *sid,
595 [in] lsa_AccountAccessMask access_mask,
596 [out] policy_handle *acct_handle
600 /****************************************/
601 /* Function: 0x12 */
603 typedef struct {
604 lsa_LUID luid;
605 uint32 attribute;
606 } lsa_LUIDAttribute;
608 typedef struct {
609 [range(0,1000)] uint32 count;
610 uint32 unknown;
611 [size_is(count)] lsa_LUIDAttribute set[*];
612 } lsa_PrivilegeSet;
614 NTSTATUS lsa_EnumPrivsAccount(
615 [in] policy_handle *handle,
616 [out,ref] lsa_PrivilegeSet **privs
620 /****************************************/
621 /* Function: 0x13 */
622 NTSTATUS lsa_AddPrivilegesToAccount(
623 [in] policy_handle *handle,
624 [in,ref] lsa_PrivilegeSet *privs
628 /****************************************/
629 /* Function: 0x14 */
630 NTSTATUS lsa_RemovePrivilegesFromAccount(
631 [in] policy_handle *handle,
632 [in] uint8 remove_all,
633 [in,unique] lsa_PrivilegeSet *privs
636 /* Function: 0x15 */
637 [todo] NTSTATUS lsa_GetQuotasForAccount();
639 /* Function: 0x16 */
640 [todo] NTSTATUS lsa_SetQuotasForAccount();
642 typedef [bitmap32bit] bitmap {
643 LSA_POLICY_MODE_INTERACTIVE = 0x00000001,
644 LSA_POLICY_MODE_NETWORK = 0x00000002,
645 LSA_POLICY_MODE_BATCH = 0x00000004,
646 LSA_POLICY_MODE_SERVICE = 0x00000010,
647 LSA_POLICY_MODE_PROXY = 0x00000020,
648 LSA_POLICY_MODE_DENY_INTERACTIVE = 0x00000040,
649 LSA_POLICY_MODE_DENY_NETWORK = 0x00000080,
650 LSA_POLICY_MODE_DENY_BATCH = 0x00000100,
651 LSA_POLICY_MODE_DENY_SERVICE = 0x00000200,
652 LSA_POLICY_MODE_REMOTE_INTERACTIVE = 0x00000400,
653 LSA_POLICY_MODE_DENY_REMOTE_INTERACTIVE = 0x00000800,
654 LSA_POLICY_MODE_ALL = 0x00000FF7,
655 LSA_POLICY_MODE_ALL_NT4 = 0x00000037
656 } lsa_SystemAccessModeFlags;
658 /* Function: 0x17 */
659 NTSTATUS lsa_GetSystemAccessAccount(
660 [in] policy_handle *handle,
661 [out,ref] lsa_AccountAccessMask *access_mask
664 /* Function: 0x18 */
665 NTSTATUS lsa_SetSystemAccessAccount(
666 [in] policy_handle *handle,
667 [in] lsa_AccountAccessMask access_mask
670 /* Function: 0x19 */
671 NTSTATUS lsa_OpenTrustedDomain(
672 [in] policy_handle *handle,
673 [in] dom_sid2 *sid,
674 [in] lsa_TrustedAccessMask access_mask,
675 [out] policy_handle *trustdom_handle
678 typedef [flag(NDR_PAHEX)] struct {
679 uint3264 length;
680 uint3264 size;
681 [size_is(size),length_is(length)] uint8 *data;
682 } lsa_DATA_BUF;
684 typedef [flag(NDR_PAHEX)] struct {
685 [range(0,65536)] uint32 size;
686 [size_is(size)] uint8 *data;
687 } lsa_DATA_BUF2;
689 typedef enum {
690 LSA_TRUSTED_DOMAIN_INFO_NAME = 1,
691 LSA_TRUSTED_DOMAIN_INFO_CONTROLLERS = 2,
692 LSA_TRUSTED_DOMAIN_INFO_POSIX_OFFSET = 3,
693 LSA_TRUSTED_DOMAIN_INFO_PASSWORD = 4,
694 LSA_TRUSTED_DOMAIN_INFO_BASIC = 5,
695 LSA_TRUSTED_DOMAIN_INFO_INFO_EX = 6,
696 LSA_TRUSTED_DOMAIN_INFO_AUTH_INFO = 7,
697 LSA_TRUSTED_DOMAIN_INFO_FULL_INFO = 8,
698 LSA_TRUSTED_DOMAIN_INFO_AUTH_INFO_INTERNAL = 9,
699 LSA_TRUSTED_DOMAIN_INFO_FULL_INFO_INTERNAL = 10,
700 LSA_TRUSTED_DOMAIN_INFO_INFO_EX2_INTERNAL = 11,
701 LSA_TRUSTED_DOMAIN_INFO_FULL_INFO_2_INTERNAL = 12,
702 LSA_TRUSTED_DOMAIN_SUPPORTED_ENCRYPTION_TYPES = 13
703 } lsa_TrustDomInfoEnum;
705 typedef [public,bitmap32bit] bitmap {
706 LSA_TRUST_DIRECTION_INBOUND = 0x00000001,
707 LSA_TRUST_DIRECTION_OUTBOUND = 0x00000002
708 } lsa_TrustDirection;
710 typedef [v1_enum] enum {
711 LSA_TRUST_TYPE_DOWNLEVEL = 0x00000001,
712 LSA_TRUST_TYPE_UPLEVEL = 0x00000002,
713 LSA_TRUST_TYPE_MIT = 0x00000003
714 } lsa_TrustType;
716 typedef [public,bitmap32bit] bitmap {
717 LSA_TRUST_ATTRIBUTE_NON_TRANSITIVE = 0x00000001,
718 LSA_TRUST_ATTRIBUTE_UPLEVEL_ONLY = 0x00000002,
719 LSA_TRUST_ATTRIBUTE_QUARANTINED_DOMAIN = 0x00000004,
720 LSA_TRUST_ATTRIBUTE_FOREST_TRANSITIVE = 0x00000008,
721 LSA_TRUST_ATTRIBUTE_CROSS_ORGANIZATION = 0x00000010,
722 LSA_TRUST_ATTRIBUTE_WITHIN_FOREST = 0x00000020,
723 LSA_TRUST_ATTRIBUTE_TREAT_AS_EXTERNAL = 0x00000040,
724 LSA_TRUST_ATTRIBUTE_USES_RC4_ENCRYPTION = 0x00000080
725 } lsa_TrustAttributes;
727 typedef struct {
728 lsa_StringLarge netbios_name;
729 } lsa_TrustDomainInfoName;
732 typedef struct {
733 uint32 entries;
734 [size_is(entries)] lsa_StringLarge *netbios_names;
735 } lsa_TrustDomainInfoControllers;
737 typedef struct {
738 uint32 posix_offset;
739 } lsa_TrustDomainInfoPosixOffset;
741 typedef struct {
742 lsa_DATA_BUF *password;
743 lsa_DATA_BUF *old_password;
744 } lsa_TrustDomainInfoPassword;
746 typedef struct {
747 lsa_String netbios_name;
748 dom_sid2 *sid;
749 } lsa_TrustDomainInfoBasic;
751 typedef struct {
752 lsa_StringLarge domain_name;
753 lsa_StringLarge netbios_name;
754 dom_sid2 *sid;
755 lsa_TrustDirection trust_direction;
756 lsa_TrustType trust_type;
757 lsa_TrustAttributes trust_attributes;
758 } lsa_TrustDomainInfoInfoEx;
760 typedef [public,v1_enum] enum {
761 TRUST_AUTH_TYPE_NONE = 0,
762 TRUST_AUTH_TYPE_NT4OWF = 1,
763 TRUST_AUTH_TYPE_CLEAR = 2,
764 TRUST_AUTH_TYPE_VERSION = 3
765 } lsa_TrustAuthType;
767 typedef struct {
768 NTTIME_hyper last_update_time;
769 lsa_TrustAuthType AuthType;
770 lsa_DATA_BUF2 data;
771 } lsa_TrustDomainInfoBuffer;
773 typedef [public] struct {
774 uint32 incoming_count;
775 lsa_TrustDomainInfoBuffer *incoming_current_auth_info;
776 lsa_TrustDomainInfoBuffer *incoming_previous_auth_info;
777 uint32 outgoing_count;
778 lsa_TrustDomainInfoBuffer *outgoing_current_auth_info;
779 lsa_TrustDomainInfoBuffer *outgoing_previous_auth_info;
780 } lsa_TrustDomainInfoAuthInfo;
782 typedef struct {
783 lsa_TrustDomainInfoInfoEx info_ex;
784 lsa_TrustDomainInfoPosixOffset posix_offset;
785 lsa_TrustDomainInfoAuthInfo auth_info;
786 } lsa_TrustDomainInfoFullInfo;
788 typedef struct {
789 lsa_DATA_BUF2 auth_blob;
790 } lsa_TrustDomainInfoAuthInfoInternal;
792 typedef struct {
793 lsa_TrustDomainInfoInfoEx info_ex;
794 lsa_TrustDomainInfoPosixOffset posix_offset;
795 lsa_TrustDomainInfoAuthInfoInternal auth_info;
796 } lsa_TrustDomainInfoFullInfoInternal;
798 typedef struct {
799 lsa_TrustDomainInfoInfoEx info_ex;
800 uint32 forest_trust_length;
801 [size_is(forest_trust_length)] uint8 *forest_trust_data;
802 } lsa_TrustDomainInfoInfoEx2Internal;
804 typedef struct {
805 lsa_TrustDomainInfoInfoEx2Internal info;
806 lsa_TrustDomainInfoPosixOffset posix_offset;
807 lsa_TrustDomainInfoAuthInfo auth_info;
808 } lsa_TrustDomainInfoFullInfo2Internal;
810 typedef struct {
811 kerb_EncTypes enc_types;
812 } lsa_TrustDomainInfoSupportedEncTypes;
814 typedef [switch_type(lsa_TrustDomInfoEnum)] union {
815 [case(LSA_TRUSTED_DOMAIN_INFO_NAME)]
816 lsa_TrustDomainInfoName name;
817 [case(LSA_TRUSTED_DOMAIN_INFO_CONTROLLERS)]
818 lsa_TrustDomainInfoControllers controllers;
819 [case(LSA_TRUSTED_DOMAIN_INFO_POSIX_OFFSET)]
820 lsa_TrustDomainInfoPosixOffset posix_offset;
821 [case(LSA_TRUSTED_DOMAIN_INFO_PASSWORD)]
822 lsa_TrustDomainInfoPassword password;
823 [case(LSA_TRUSTED_DOMAIN_INFO_BASIC)]
824 lsa_TrustDomainInfoBasic info_basic;
825 [case(LSA_TRUSTED_DOMAIN_INFO_INFO_EX)]
826 lsa_TrustDomainInfoInfoEx info_ex;
827 [case(LSA_TRUSTED_DOMAIN_INFO_AUTH_INFO)]
828 lsa_TrustDomainInfoAuthInfo auth_info;
829 [case(LSA_TRUSTED_DOMAIN_INFO_FULL_INFO)]
830 lsa_TrustDomainInfoFullInfo full_info;
831 [case(LSA_TRUSTED_DOMAIN_INFO_AUTH_INFO_INTERNAL)]
832 lsa_TrustDomainInfoAuthInfoInternal auth_info_internal;
833 [case(LSA_TRUSTED_DOMAIN_INFO_FULL_INFO_INTERNAL)]
834 lsa_TrustDomainInfoFullInfoInternal full_info_internal;
835 [case(LSA_TRUSTED_DOMAIN_INFO_INFO_EX2_INTERNAL)]
836 lsa_TrustDomainInfoInfoEx2Internal info_ex2_internal;
837 [case(LSA_TRUSTED_DOMAIN_INFO_FULL_INFO_2_INTERNAL)]
838 lsa_TrustDomainInfoFullInfo2Internal full_info2_internal;
839 [case(LSA_TRUSTED_DOMAIN_SUPPORTED_ENCRYPTION_TYPES)]
840 lsa_TrustDomainInfoSupportedEncTypes enc_types;
841 } lsa_TrustedDomainInfo;
843 /* Function: 0x1a */
844 NTSTATUS lsa_QueryTrustedDomainInfo(
845 [in] policy_handle *trustdom_handle,
846 [in] lsa_TrustDomInfoEnum level,
847 [out,switch_is(level),ref] lsa_TrustedDomainInfo **info
850 /* Function: 0x1b */
851 NTSTATUS lsa_SetInformationTrustedDomain(
852 [in] policy_handle *trustdom_handle,
853 [in] lsa_TrustDomInfoEnum level,
854 [in,switch_is(level)] lsa_TrustedDomainInfo *info
857 /* Function: 0x1c */
858 [public] NTSTATUS lsa_OpenSecret(
859 [in] policy_handle *handle,
860 [in] lsa_String name,
861 [in] lsa_SecretAccessMask access_mask,
862 [out] policy_handle *sec_handle
865 /* Function: 0x1d */
867 [public] NTSTATUS lsa_SetSecret(
868 [in] policy_handle *sec_handle,
869 [in,unique] lsa_DATA_BUF *new_val,
870 [in,unique] lsa_DATA_BUF *old_val
873 typedef struct {
874 lsa_DATA_BUF *buf;
875 } lsa_DATA_BUF_PTR;
877 /* Function: 0x1e */
878 [public] NTSTATUS lsa_QuerySecret (
879 [in] policy_handle *sec_handle,
880 [in,out,unique] lsa_DATA_BUF_PTR *new_val,
881 [in,out,unique] NTTIME_hyper *new_mtime,
882 [in,out,unique] lsa_DATA_BUF_PTR *old_val,
883 [in,out,unique] NTTIME_hyper *old_mtime
886 /* Function: 0x1f */
887 NTSTATUS lsa_LookupPrivValue(
888 [in] policy_handle *handle,
889 [in,ref] lsa_String *name,
890 [out,ref] lsa_LUID *luid
894 /* Function: 0x20 */
895 NTSTATUS lsa_LookupPrivName(
896 [in] policy_handle *handle,
897 [in,ref] lsa_LUID *luid,
898 [out,ref] lsa_StringLarge **name
902 /*******************/
903 /* Function: 0x21 */
904 NTSTATUS lsa_LookupPrivDisplayName(
905 [in] policy_handle *handle,
906 [in,ref] lsa_String *name,
907 [in] uint16 language_id,
908 [in] uint16 language_id_sys,
909 [out,ref] lsa_StringLarge **disp_name,
910 /* see http://www.microsoft.com/globaldev/nlsweb/ for
911 language definitions */
912 [out,ref] uint16 *returned_language_id
915 /*******************/
916 /* Function: 0x22 */
917 NTSTATUS lsa_DeleteObject (
918 [in,out] policy_handle *handle
921 /*******************/
922 /* Function: 0x23 */
923 NTSTATUS lsa_EnumAccountsWithUserRight (
924 [in] policy_handle *handle,
925 [in,unique] lsa_String *name,
926 [out] lsa_SidArray *sids
929 /* Function: 0x24 */
930 typedef struct {
931 [string,charset(UTF16)] uint16 *name;
932 } lsa_RightAttribute;
934 typedef struct {
935 [range(0,256)] uint32 count;
936 [size_is(count)] lsa_StringLarge *names;
937 } lsa_RightSet;
939 NTSTATUS lsa_EnumAccountRights (
940 [in] policy_handle *handle,
941 [in,ref] dom_sid2 *sid,
942 [out,ref] lsa_RightSet *rights
946 /**********************/
947 /* Function: 0x25 */
948 NTSTATUS lsa_AddAccountRights (
949 [in] policy_handle *handle,
950 [in,ref] dom_sid2 *sid,
951 [in,ref] lsa_RightSet *rights
954 /**********************/
955 /* Function: 0x26 */
956 NTSTATUS lsa_RemoveAccountRights (
957 [in] policy_handle *handle,
958 [in,ref] dom_sid2 *sid,
959 [in] uint8 remove_all,
960 [in,ref] lsa_RightSet *rights
963 /* Function: 0x27 */
964 NTSTATUS lsa_QueryTrustedDomainInfoBySid(
965 [in] policy_handle *handle,
966 [in,ref] dom_sid2 *dom_sid,
967 [in] lsa_TrustDomInfoEnum level,
968 [out,switch_is(level),ref] lsa_TrustedDomainInfo **info
971 /* Function: 0x28 */
972 NTSTATUS lsa_SetTrustedDomainInfo(
973 [in] policy_handle *handle,
974 [in] dom_sid2 *dom_sid,
975 [in] lsa_TrustDomInfoEnum level,
976 [in,switch_is(level)] lsa_TrustedDomainInfo *info
979 /* Function: 0x29 */
980 NTSTATUS lsa_DeleteTrustedDomain(
981 [in] policy_handle *handle,
982 [in] dom_sid2 *dom_sid
985 /* Function: 0x2a */
986 NTSTATUS lsa_StorePrivateData(
987 [in] policy_handle *handle,
988 [in,ref] lsa_String *name,
989 [in,unique] lsa_DATA_BUF *val
992 /* Function: 0x2b */
993 NTSTATUS lsa_RetrievePrivateData(
994 [in] policy_handle *handle,
995 [in,ref] lsa_String *name,
996 [in,out,ref] lsa_DATA_BUF **val
999 /**********************/
1000 /* Function: 0x2c */
1001 [public] NTSTATUS lsa_OpenPolicy2 (
1002 [in,unique] [string,charset(UTF16)] uint16 *system_name,
1003 [in] lsa_ObjectAttribute *attr,
1004 [in] lsa_PolicyAccessMask access_mask,
1005 [out] policy_handle *handle
1008 /**********************/
1009 /* Function: 0x2d */
1010 NTSTATUS lsa_GetUserName(
1011 [in,unique] [string,charset(UTF16)] uint16 *system_name,
1012 [in,out,ref] lsa_String **account_name,
1013 [in,out,unique] lsa_String **authority_name
1016 /**********************/
1017 /* Function: 0x2e */
1019 NTSTATUS lsa_QueryInfoPolicy2(
1020 [in] policy_handle *handle,
1021 [in] lsa_PolicyInfo level,
1022 [out,ref,switch_is(level)] lsa_PolicyInformation **info
1025 /* Function 0x2f */
1026 NTSTATUS lsa_SetInfoPolicy2(
1027 [in] policy_handle *handle,
1028 [in] lsa_PolicyInfo level,
1029 [in,switch_is(level)] lsa_PolicyInformation *info
1032 /**********************/
1033 /* Function 0x30 */
1034 NTSTATUS lsa_QueryTrustedDomainInfoByName(
1035 [in] policy_handle *handle,
1036 [in,ref] lsa_String *trusted_domain,
1037 [in] lsa_TrustDomInfoEnum level,
1038 [out,ref,switch_is(level)] lsa_TrustedDomainInfo **info
1041 /**********************/
1042 /* Function 0x31 */
1043 [public] NTSTATUS lsa_SetTrustedDomainInfoByName(
1044 [in] policy_handle *handle,
1045 [in,ref] lsa_String *trusted_domain,
1046 [in] lsa_TrustDomInfoEnum level,
1047 [in,ref,switch_is(level)] lsa_TrustedDomainInfo *info
1050 /* Function 0x32 */
1052 /* w2k3 treats max_size as max_domains*82 */
1053 const int LSA_ENUM_TRUST_DOMAIN_EX_MULTIPLIER = 82;
1055 typedef struct {
1056 uint32 count;
1057 [size_is(count)] lsa_TrustDomainInfoInfoEx *domains;
1058 } lsa_DomainListEx;
1060 NTSTATUS lsa_EnumTrustedDomainsEx (
1061 [in] policy_handle *handle,
1062 [in,out] uint32 *resume_handle,
1063 [out] lsa_DomainListEx *domains,
1064 [in] uint32 max_size
1067 /* Function 0x33 */
1068 NTSTATUS lsa_CreateTrustedDomainEx(
1069 [in] policy_handle *policy_handle,
1070 [in] lsa_TrustDomainInfoInfoEx *info,
1071 [in] lsa_TrustDomainInfoAuthInfoInternal *auth_info,
1072 [in] uint32 access_mask,
1073 [out] policy_handle *trustdom_handle
1077 /* Function 0x34 */
1078 NTSTATUS lsa_CloseTrustedDomainEx(
1079 [in,out] policy_handle *handle
1082 /* Function 0x35 */
1084 /* w2k3 returns either 0x000bbbd000000000 or 0x000a48e800000000
1085 for unknown6 - gd */
1086 typedef struct {
1087 uint32 enforce_restrictions;
1088 hyper service_tkt_lifetime;
1089 hyper user_tkt_lifetime;
1090 hyper user_tkt_renewaltime;
1091 hyper clock_skew;
1092 hyper unknown6;
1093 } lsa_DomainInfoKerberos;
1095 typedef struct {
1096 uint32 blob_size;
1097 [size_is(blob_size)] uint8 *efs_blob;
1098 } lsa_DomainInfoEfs;
1100 typedef enum {
1101 LSA_DOMAIN_INFO_POLICY_EFS=2,
1102 LSA_DOMAIN_INFO_POLICY_KERBEROS=3
1103 } lsa_DomainInfoEnum;
1105 typedef [switch_type(uint16)] union {
1106 [case(LSA_DOMAIN_INFO_POLICY_EFS)] lsa_DomainInfoEfs efs_info;
1107 [case(LSA_DOMAIN_INFO_POLICY_KERBEROS)] lsa_DomainInfoKerberos kerberos_info;
1108 } lsa_DomainInformationPolicy;
1110 NTSTATUS lsa_QueryDomainInformationPolicy(
1111 [in] policy_handle *handle,
1112 [in] uint16 level,
1113 [out,ref,switch_is(level)] lsa_DomainInformationPolicy **info
1116 /* Function 0x36 */
1117 NTSTATUS lsa_SetDomainInformationPolicy(
1118 [in] policy_handle *handle,
1119 [in] uint16 level,
1120 [in,unique,switch_is(level)] lsa_DomainInformationPolicy *info
1123 /**********************/
1124 /* Function 0x37 */
1125 NTSTATUS lsa_OpenTrustedDomainByName(
1126 [in] policy_handle *handle,
1127 [in] lsa_String name,
1128 [in] uint32 access_mask,
1129 [out] policy_handle *trustdom_handle
1132 /* Function 0x38 */
1133 [todo] NTSTATUS lsa_TestCall();
1135 /**********************/
1136 /* Function 0x39 */
1138 typedef struct {
1139 lsa_SidType sid_type;
1140 lsa_String name;
1141 uint32 sid_index;
1142 uint32 unknown;
1143 } lsa_TranslatedName2;
1145 typedef struct {
1146 [range(0,1000)] uint32 count;
1147 [size_is(count)] lsa_TranslatedName2 *names;
1148 } lsa_TransNameArray2;
1150 typedef [v1_enum] enum {
1151 LSA_LOOKUP_OPTION_SEARCH_ISOLATED_NAMES = 0x00000000,
1152 LSA_LOOKUP_OPTION_SEARCH_ISOLATED_NAMES_LOCAL = 0x80000000
1153 } lsa_LookupOptions;
1155 typedef [v1_enum] enum {
1156 LSA_CLIENT_REVISION_1 = 0x00000001,
1157 LSA_CLIENT_REVISION_2 = 0x00000002
1158 } lsa_ClientRevision;
1160 [public] NTSTATUS lsa_LookupSids2(
1161 [in] policy_handle *handle,
1162 [in,ref] lsa_SidArray *sids,
1163 [out,ref] lsa_RefDomainList **domains,
1164 [in,out,ref] lsa_TransNameArray2 *names,
1165 [in] lsa_LookupNamesLevel level,
1166 [in,out,ref] uint32 *count,
1167 [in] lsa_LookupOptions lookup_options,
1168 [in] lsa_ClientRevision client_revision
1171 /**********************/
1172 /* Function 0x3a */
1174 typedef struct {
1175 lsa_SidType sid_type;
1176 uint32 rid;
1177 uint32 sid_index;
1178 uint32 unknown;
1179 } lsa_TranslatedSid2;
1181 typedef struct {
1182 [range(0,1000)] uint32 count;
1183 [size_is(count)] lsa_TranslatedSid2 *sids;
1184 } lsa_TransSidArray2;
1186 [public] NTSTATUS lsa_LookupNames2 (
1187 [in] policy_handle *handle,
1188 [in,range(0,1000)] uint32 num_names,
1189 [in,size_is(num_names)] lsa_String names[],
1190 [out,ref] lsa_RefDomainList **domains,
1191 [in,out,ref] lsa_TransSidArray2 *sids,
1192 [in] lsa_LookupNamesLevel level,
1193 [in,out,ref] uint32 *count,
1194 [in] lsa_LookupOptions lookup_options,
1195 [in] lsa_ClientRevision client_revision
1198 /* Function 0x3b */
1199 NTSTATUS lsa_CreateTrustedDomainEx2(
1200 [in] policy_handle *policy_handle,
1201 [in] lsa_TrustDomainInfoInfoEx *info,
1202 [in] lsa_TrustDomainInfoAuthInfoInternal *auth_info,
1203 [in] uint32 access_mask,
1204 [out] policy_handle *trustdom_handle
1207 /* Function 0x3c */
1208 [todo] NTSTATUS lsa_CREDRWRITE();
1210 /* Function 0x3d */
1211 [todo] NTSTATUS lsa_CREDRREAD();
1213 /* Function 0x3e */
1214 [todo] NTSTATUS lsa_CREDRENUMERATE();
1216 /* Function 0x3f */
1217 [todo] NTSTATUS lsa_CREDRWRITEDOMAINCREDENTIALS();
1219 /* Function 0x40 */
1220 [todo] NTSTATUS lsa_CREDRREADDOMAINCREDENTIALS();
1222 /* Function 0x41 */
1223 [todo] NTSTATUS lsa_CREDRDELETE();
1225 /* Function 0x42 */
1226 [todo] NTSTATUS lsa_CREDRGETTARGETINFO();
1228 /* Function 0x43 */
1229 [todo] NTSTATUS lsa_CREDRPROFILELOADED();
1231 /**********************/
1232 /* Function 0x44 */
1233 typedef struct {
1234 lsa_SidType sid_type;
1235 dom_sid2 *sid;
1236 uint32 sid_index;
1237 uint32 flags;
1238 } lsa_TranslatedSid3;
1240 typedef struct {
1241 [range(0,1000)] uint32 count;
1242 [size_is(count)] lsa_TranslatedSid3 *sids;
1243 } lsa_TransSidArray3;
1245 [public] NTSTATUS lsa_LookupNames3 (
1246 [in] policy_handle *handle,
1247 [in,range(0,1000)] uint32 num_names,
1248 [in,size_is(num_names)] lsa_String names[],
1249 [out,ref] lsa_RefDomainList **domains,
1250 [in,out,ref] lsa_TransSidArray3 *sids,
1251 [in] lsa_LookupNamesLevel level,
1252 [in,out,ref] uint32 *count,
1253 [in] lsa_LookupOptions lookup_options,
1254 [in] lsa_ClientRevision client_revision
1257 /* Function 0x45 */
1258 [todo] NTSTATUS lsa_CREDRGETSESSIONTYPES();
1260 /* Function 0x46 */
1261 [todo] NTSTATUS lsa_LSARREGISTERAUDITEVENT();
1263 /* Function 0x47 */
1264 [todo] NTSTATUS lsa_LSARGENAUDITEVENT();
1266 /* Function 0x48 */
1267 [todo] NTSTATUS lsa_LSARUNREGISTERAUDITEVENT();
1269 /* Function 0x49 */
1270 typedef struct {
1271 [range(0,131072)] uint3264 length;
1272 [size_is(length)] uint8 *data;
1273 } lsa_ForestTrustBinaryData;
1275 typedef struct {
1276 dom_sid2 *domain_sid;
1277 lsa_StringLarge dns_domain_name;
1278 lsa_StringLarge netbios_domain_name;
1279 } lsa_ForestTrustDomainInfo;
1281 typedef [switch_type(uint32)] union {
1282 [case(LSA_FOREST_TRUST_TOP_LEVEL_NAME)] lsa_StringLarge top_level_name;
1283 [case(LSA_FOREST_TRUST_TOP_LEVEL_NAME_EX)] lsa_StringLarge top_level_name_ex;
1284 [case(LSA_FOREST_TRUST_DOMAIN_INFO)] lsa_ForestTrustDomainInfo domain_info;
1285 [default] lsa_ForestTrustBinaryData data;
1286 } lsa_ForestTrustData;
1288 typedef [v1_enum] enum {
1289 LSA_FOREST_TRUST_TOP_LEVEL_NAME = 0,
1290 LSA_FOREST_TRUST_TOP_LEVEL_NAME_EX = 1,
1291 LSA_FOREST_TRUST_DOMAIN_INFO = 2,
1292 LSA_FOREST_TRUST_RECORD_TYPE_LAST = 3
1293 } lsa_ForestTrustRecordType;
1295 typedef struct {
1296 uint32 flags;
1297 lsa_ForestTrustRecordType type;
1298 hyper time;
1299 [switch_is(type)] lsa_ForestTrustData forest_trust_data;
1300 } lsa_ForestTrustRecord;
1302 typedef [public] struct {
1303 [range(0,4000)] uint32 count;
1304 [size_is(count)] lsa_ForestTrustRecord **entries;
1305 } lsa_ForestTrustInformation;
1307 NTSTATUS lsa_lsaRQueryForestTrustInformation(
1308 [in] policy_handle *handle,
1309 [in,ref] lsa_String *trusted_domain_name,
1310 [in] uint16 unknown, /* level ? */
1311 [out,ref] lsa_ForestTrustInformation **forest_trust_info
1314 /*****************
1315 * Function 0x4a */
1317 typedef [v1_enum] enum {
1318 LSA_FOREST_TRUST_COLLISION_TDO = 0,
1319 LSA_FOREST_TRUST_COLLISION_XREF = 1,
1320 LSA_FOREST_TRUST_COLLISION_OTHER = 2
1321 } lsa_ForestTrustCollisionRecordType;
1323 /* if type is CollisionTdo, flags can be */
1324 typedef [bitmap32bit] bitmap {
1325 LSA_TLN_DISABLED_NEW = 0x00000001,
1326 LSA_TLN_DISABLED_ADMIN = 0x00000002,
1327 LSA_TLN_DISABLED_CONFLICT = 0x00000004
1328 } lsa_ForestTrustCollisionTDOFlags;
1330 /* if type is CollisionXref, flags can be */
1331 typedef [bitmap32bit] bitmap {
1332 LSA_SID_DISABLED_ADMIN = 0x00000001,
1333 LSA_SID_DISABLED_CONFLICT = 0x00000002,
1334 LSA_NB_DISABLED_ADMIN = 0x00000004,
1335 LSA_NB_DISABLED_CONFLICT = 0x00000008
1336 } lsa_ForestTrustCollisionXrefFlags;
1338 typedef [nodiscriminant] union {
1339 [case(LSA_FOREST_TRUST_COLLISION_TDO)] lsa_ForestTrustCollisionTDOFlags flags;
1340 [case(LSA_FOREST_TRUST_COLLISION_XREF)] lsa_ForestTrustCollisionXrefFlags flags;
1341 [default] uint32 flags;
1342 } lsa_ForestTrustCollisionFlags;
1344 typedef struct {
1345 uint32 index;
1346 lsa_ForestTrustCollisionRecordType type;
1347 [switch_is(type)] lsa_ForestTrustCollisionFlags flags;
1348 lsa_String name;
1349 } lsa_ForestTrustCollisionRecord;
1351 typedef struct {
1352 uint32 count;
1353 [size_is(count)] lsa_ForestTrustCollisionRecord **entries;
1354 } lsa_ForestTrustCollisionInfo;
1356 [public] NTSTATUS lsa_lsaRSetForestTrustInformation(
1357 [in] policy_handle *handle,
1358 [in,ref] lsa_StringLarge *trusted_domain_name,
1359 [in] uint16 highest_record_type,
1360 [in,ref] lsa_ForestTrustInformation *forest_trust_info,
1361 [in] uint8 check_only,
1362 [out,ref] lsa_ForestTrustCollisionInfo **collision_info
1365 /* Function 0x4b */
1366 [todo] NTSTATUS lsa_CREDRRENAME();
1368 /*****************/
1369 /* Function 0x4c */
1371 [public] NTSTATUS lsa_LookupSids3(
1372 [in,ref] lsa_SidArray *sids,
1373 [out,ref] lsa_RefDomainList **domains,
1374 [in,out,ref] lsa_TransNameArray2 *names,
1375 [in] lsa_LookupNamesLevel level,
1376 [in,out,ref] uint32 *count,
1377 [in] lsa_LookupOptions lookup_options,
1378 [in] lsa_ClientRevision client_revision
1381 const int LSA_CLIENT_REVISION_NO_DNS = 0x00000001;
1382 const int LSA_CLIENT_REVISION_DNS = 0x00000002;
1384 const int LSA_LOOKUP_OPTIONS_NO_ISOLATED = 0x80000000;
1386 /* Function 0x4d */
1387 NTSTATUS lsa_LookupNames4(
1388 [in,range(0,1000)] uint32 num_names,
1389 [in,size_is(num_names)] lsa_String names[],
1390 [out,ref] lsa_RefDomainList **domains,
1391 [in,out,ref] lsa_TransSidArray3 *sids,
1392 [in] lsa_LookupNamesLevel level,
1393 [in,out,ref] uint32 *count,
1394 [in] lsa_LookupOptions lookup_options,
1395 [in] lsa_ClientRevision client_revision
1398 /* Function 0x4e */
1399 [todo] NTSTATUS lsa_LSAROPENPOLICYSCE();
1401 /* Function 0x4f */
1402 [todo] NTSTATUS lsa_LSARADTREGISTERSECURITYEVENTSOURCE();
1404 /* Function 0x50 */
1405 [todo] NTSTATUS lsa_LSARADTUNREGISTERSECURITYEVENTSOURCE();
1407 /* Function 0x51 */
1408 [todo] NTSTATUS lsa_LSARADTREPORTSECURITYEVENT();