2 * Unix SMB/CIFS implementation.
3 * client auto-generated by pidl. DO NOT MODIFY!
7 #include "librpc/gen_ndr/cli_lsa.h"
9 NTSTATUS
rpccli_lsa_Close(struct rpc_pipe_client
*cli
,
11 struct policy_handle
*handle
/* [in,out] [ref] */)
19 if (DEBUGLEVEL
>= 10) {
20 NDR_PRINT_IN_DEBUG(lsa_Close
, &r
);
23 status
= cli_do_rpc_ndr(cli
,
30 if (!NT_STATUS_IS_OK(status
)) {
34 if (DEBUGLEVEL
>= 10) {
35 NDR_PRINT_OUT_DEBUG(lsa_Close
, &r
);
38 if (NT_STATUS_IS_ERR(status
)) {
42 /* Return variables */
43 *handle
= *r
.out
.handle
;
49 NTSTATUS
rpccli_lsa_Delete(struct rpc_pipe_client
*cli
,
51 struct policy_handle
*handle
/* [in] [ref] */)
59 if (DEBUGLEVEL
>= 10) {
60 NDR_PRINT_IN_DEBUG(lsa_Delete
, &r
);
63 status
= cli_do_rpc_ndr(cli
,
70 if (!NT_STATUS_IS_OK(status
)) {
74 if (DEBUGLEVEL
>= 10) {
75 NDR_PRINT_OUT_DEBUG(lsa_Delete
, &r
);
78 if (NT_STATUS_IS_ERR(status
)) {
82 /* Return variables */
88 NTSTATUS
rpccli_lsa_EnumPrivs(struct rpc_pipe_client
*cli
,
90 struct policy_handle
*handle
/* [in] [ref] */,
91 uint32_t *resume_handle
/* [in,out] [ref] */,
92 struct lsa_PrivArray
*privs
/* [out] [ref] */,
93 uint32_t max_count
/* [in] */)
95 struct lsa_EnumPrivs r
;
100 r
.in
.resume_handle
= resume_handle
;
101 r
.in
.max_count
= max_count
;
103 if (DEBUGLEVEL
>= 10) {
104 NDR_PRINT_IN_DEBUG(lsa_EnumPrivs
, &r
);
107 status
= cli_do_rpc_ndr(cli
,
114 if (!NT_STATUS_IS_OK(status
)) {
118 if (DEBUGLEVEL
>= 10) {
119 NDR_PRINT_OUT_DEBUG(lsa_EnumPrivs
, &r
);
122 if (NT_STATUS_IS_ERR(status
)) {
126 /* Return variables */
127 *resume_handle
= *r
.out
.resume_handle
;
128 *privs
= *r
.out
.privs
;
134 NTSTATUS
rpccli_lsa_QuerySecurity(struct rpc_pipe_client
*cli
,
136 struct policy_handle
*handle
/* [in] [ref] */,
137 uint32_t sec_info
/* [in] */,
138 struct sec_desc_buf
**sdbuf
/* [out] [ref] */)
140 struct lsa_QuerySecurity r
;
144 r
.in
.handle
= handle
;
145 r
.in
.sec_info
= sec_info
;
147 if (DEBUGLEVEL
>= 10) {
148 NDR_PRINT_IN_DEBUG(lsa_QuerySecurity
, &r
);
151 status
= cli_do_rpc_ndr(cli
,
155 NDR_LSA_QUERYSECURITY
,
158 if (!NT_STATUS_IS_OK(status
)) {
162 if (DEBUGLEVEL
>= 10) {
163 NDR_PRINT_OUT_DEBUG(lsa_QuerySecurity
, &r
);
166 if (NT_STATUS_IS_ERR(status
)) {
170 /* Return variables */
171 *sdbuf
= *r
.out
.sdbuf
;
177 NTSTATUS
rpccli_lsa_SetSecObj(struct rpc_pipe_client
*cli
,
179 struct policy_handle
*handle
/* [in] [ref] */,
180 uint32_t sec_info
/* [in] */,
181 struct sec_desc_buf
*sdbuf
/* [in] [ref] */)
183 struct lsa_SetSecObj r
;
187 r
.in
.handle
= handle
;
188 r
.in
.sec_info
= sec_info
;
191 if (DEBUGLEVEL
>= 10) {
192 NDR_PRINT_IN_DEBUG(lsa_SetSecObj
, &r
);
195 status
= cli_do_rpc_ndr(cli
,
202 if (!NT_STATUS_IS_OK(status
)) {
206 if (DEBUGLEVEL
>= 10) {
207 NDR_PRINT_OUT_DEBUG(lsa_SetSecObj
, &r
);
210 if (NT_STATUS_IS_ERR(status
)) {
214 /* Return variables */
220 NTSTATUS
rpccli_lsa_ChangePassword(struct rpc_pipe_client
*cli
,
223 struct lsa_ChangePassword r
;
228 if (DEBUGLEVEL
>= 10) {
229 NDR_PRINT_IN_DEBUG(lsa_ChangePassword
, &r
);
232 status
= cli_do_rpc_ndr(cli
,
236 NDR_LSA_CHANGEPASSWORD
,
239 if (!NT_STATUS_IS_OK(status
)) {
243 if (DEBUGLEVEL
>= 10) {
244 NDR_PRINT_OUT_DEBUG(lsa_ChangePassword
, &r
);
247 if (NT_STATUS_IS_ERR(status
)) {
251 /* Return variables */
257 NTSTATUS
rpccli_lsa_OpenPolicy(struct rpc_pipe_client
*cli
,
259 uint16_t *system_name
/* [in] [unique] */,
260 struct lsa_ObjectAttribute
*attr
/* [in] [ref] */,
261 uint32_t access_mask
/* [in] */,
262 struct policy_handle
*handle
/* [out] [ref] */)
264 struct lsa_OpenPolicy r
;
268 r
.in
.system_name
= system_name
;
270 r
.in
.access_mask
= access_mask
;
272 if (DEBUGLEVEL
>= 10) {
273 NDR_PRINT_IN_DEBUG(lsa_OpenPolicy
, &r
);
276 status
= cli_do_rpc_ndr(cli
,
283 if (!NT_STATUS_IS_OK(status
)) {
287 if (DEBUGLEVEL
>= 10) {
288 NDR_PRINT_OUT_DEBUG(lsa_OpenPolicy
, &r
);
291 if (NT_STATUS_IS_ERR(status
)) {
295 /* Return variables */
296 *handle
= *r
.out
.handle
;
302 NTSTATUS
rpccli_lsa_QueryInfoPolicy(struct rpc_pipe_client
*cli
,
304 struct policy_handle
*handle
/* [in] [ref] */,
305 enum lsa_PolicyInfo level
/* [in] */,
306 union lsa_PolicyInformation
**info
/* [out] [ref,switch_is(level)] */)
308 struct lsa_QueryInfoPolicy r
;
312 r
.in
.handle
= handle
;
315 if (DEBUGLEVEL
>= 10) {
316 NDR_PRINT_IN_DEBUG(lsa_QueryInfoPolicy
, &r
);
319 status
= cli_do_rpc_ndr(cli
,
323 NDR_LSA_QUERYINFOPOLICY
,
326 if (!NT_STATUS_IS_OK(status
)) {
330 if (DEBUGLEVEL
>= 10) {
331 NDR_PRINT_OUT_DEBUG(lsa_QueryInfoPolicy
, &r
);
334 if (NT_STATUS_IS_ERR(status
)) {
338 /* Return variables */
345 NTSTATUS
rpccli_lsa_SetInfoPolicy(struct rpc_pipe_client
*cli
,
347 struct policy_handle
*handle
/* [in] [ref] */,
348 enum lsa_PolicyInfo level
/* [in] */,
349 union lsa_PolicyInformation
*info
/* [in] [ref,switch_is(level)] */)
351 struct lsa_SetInfoPolicy r
;
355 r
.in
.handle
= handle
;
359 if (DEBUGLEVEL
>= 10) {
360 NDR_PRINT_IN_DEBUG(lsa_SetInfoPolicy
, &r
);
363 status
= cli_do_rpc_ndr(cli
,
367 NDR_LSA_SETINFOPOLICY
,
370 if (!NT_STATUS_IS_OK(status
)) {
374 if (DEBUGLEVEL
>= 10) {
375 NDR_PRINT_OUT_DEBUG(lsa_SetInfoPolicy
, &r
);
378 if (NT_STATUS_IS_ERR(status
)) {
382 /* Return variables */
388 NTSTATUS
rpccli_lsa_ClearAuditLog(struct rpc_pipe_client
*cli
,
391 struct lsa_ClearAuditLog r
;
396 if (DEBUGLEVEL
>= 10) {
397 NDR_PRINT_IN_DEBUG(lsa_ClearAuditLog
, &r
);
400 status
= cli_do_rpc_ndr(cli
,
404 NDR_LSA_CLEARAUDITLOG
,
407 if (!NT_STATUS_IS_OK(status
)) {
411 if (DEBUGLEVEL
>= 10) {
412 NDR_PRINT_OUT_DEBUG(lsa_ClearAuditLog
, &r
);
415 if (NT_STATUS_IS_ERR(status
)) {
419 /* Return variables */
425 NTSTATUS
rpccli_lsa_CreateAccount(struct rpc_pipe_client
*cli
,
427 struct policy_handle
*handle
/* [in] [ref] */,
428 struct dom_sid2
*sid
/* [in] [ref] */,
429 uint32_t access_mask
/* [in] */,
430 struct policy_handle
*acct_handle
/* [out] [ref] */)
432 struct lsa_CreateAccount r
;
436 r
.in
.handle
= handle
;
438 r
.in
.access_mask
= access_mask
;
440 if (DEBUGLEVEL
>= 10) {
441 NDR_PRINT_IN_DEBUG(lsa_CreateAccount
, &r
);
444 status
= cli_do_rpc_ndr(cli
,
448 NDR_LSA_CREATEACCOUNT
,
451 if (!NT_STATUS_IS_OK(status
)) {
455 if (DEBUGLEVEL
>= 10) {
456 NDR_PRINT_OUT_DEBUG(lsa_CreateAccount
, &r
);
459 if (NT_STATUS_IS_ERR(status
)) {
463 /* Return variables */
464 *acct_handle
= *r
.out
.acct_handle
;
470 NTSTATUS
rpccli_lsa_EnumAccounts(struct rpc_pipe_client
*cli
,
472 struct policy_handle
*handle
/* [in] [ref] */,
473 uint32_t *resume_handle
/* [in,out] [ref] */,
474 struct lsa_SidArray
*sids
/* [out] [ref] */,
475 uint32_t num_entries
/* [in] [range(0,8192)] */)
477 struct lsa_EnumAccounts r
;
481 r
.in
.handle
= handle
;
482 r
.in
.resume_handle
= resume_handle
;
483 r
.in
.num_entries
= num_entries
;
485 if (DEBUGLEVEL
>= 10) {
486 NDR_PRINT_IN_DEBUG(lsa_EnumAccounts
, &r
);
489 status
= cli_do_rpc_ndr(cli
,
493 NDR_LSA_ENUMACCOUNTS
,
496 if (!NT_STATUS_IS_OK(status
)) {
500 if (DEBUGLEVEL
>= 10) {
501 NDR_PRINT_OUT_DEBUG(lsa_EnumAccounts
, &r
);
504 if (NT_STATUS_IS_ERR(status
)) {
508 /* Return variables */
509 *resume_handle
= *r
.out
.resume_handle
;
516 NTSTATUS
rpccli_lsa_CreateTrustedDomain(struct rpc_pipe_client
*cli
,
518 struct policy_handle
*handle
/* [in] [ref] */,
519 struct lsa_DomainInfo
*info
/* [in] [ref] */,
520 uint32_t access_mask
/* [in] */,
521 struct policy_handle
*trustdom_handle
/* [out] [ref] */)
523 struct lsa_CreateTrustedDomain r
;
527 r
.in
.handle
= handle
;
529 r
.in
.access_mask
= access_mask
;
531 if (DEBUGLEVEL
>= 10) {
532 NDR_PRINT_IN_DEBUG(lsa_CreateTrustedDomain
, &r
);
535 status
= cli_do_rpc_ndr(cli
,
539 NDR_LSA_CREATETRUSTEDDOMAIN
,
542 if (!NT_STATUS_IS_OK(status
)) {
546 if (DEBUGLEVEL
>= 10) {
547 NDR_PRINT_OUT_DEBUG(lsa_CreateTrustedDomain
, &r
);
550 if (NT_STATUS_IS_ERR(status
)) {
554 /* Return variables */
555 *trustdom_handle
= *r
.out
.trustdom_handle
;
561 NTSTATUS
rpccli_lsa_EnumTrustDom(struct rpc_pipe_client
*cli
,
563 struct policy_handle
*handle
/* [in] [ref] */,
564 uint32_t *resume_handle
/* [in,out] [ref] */,
565 struct lsa_DomainList
*domains
/* [out] [ref] */,
566 uint32_t max_size
/* [in] */)
568 struct lsa_EnumTrustDom r
;
572 r
.in
.handle
= handle
;
573 r
.in
.resume_handle
= resume_handle
;
574 r
.in
.max_size
= max_size
;
576 if (DEBUGLEVEL
>= 10) {
577 NDR_PRINT_IN_DEBUG(lsa_EnumTrustDom
, &r
);
580 status
= cli_do_rpc_ndr(cli
,
584 NDR_LSA_ENUMTRUSTDOM
,
587 if (!NT_STATUS_IS_OK(status
)) {
591 if (DEBUGLEVEL
>= 10) {
592 NDR_PRINT_OUT_DEBUG(lsa_EnumTrustDom
, &r
);
595 if (NT_STATUS_IS_ERR(status
)) {
599 /* Return variables */
600 *resume_handle
= *r
.out
.resume_handle
;
601 *domains
= *r
.out
.domains
;
607 NTSTATUS
rpccli_lsa_LookupNames(struct rpc_pipe_client
*cli
,
609 struct policy_handle
*handle
/* [in] [ref] */,
610 uint32_t num_names
/* [in] [range(0,1000)] */,
611 struct lsa_String
*names
/* [in] [size_is(num_names)] */,
612 struct lsa_RefDomainList
**domains
/* [out] [ref] */,
613 struct lsa_TransSidArray
*sids
/* [in,out] [ref] */,
614 enum lsa_LookupNamesLevel level
/* [in] */,
615 uint32_t *count
/* [in,out] [ref] */)
617 struct lsa_LookupNames r
;
621 r
.in
.handle
= handle
;
622 r
.in
.num_names
= num_names
;
628 if (DEBUGLEVEL
>= 10) {
629 NDR_PRINT_IN_DEBUG(lsa_LookupNames
, &r
);
632 status
= cli_do_rpc_ndr(cli
,
639 if (!NT_STATUS_IS_OK(status
)) {
643 if (DEBUGLEVEL
>= 10) {
644 NDR_PRINT_OUT_DEBUG(lsa_LookupNames
, &r
);
647 if (NT_STATUS_IS_ERR(status
)) {
651 /* Return variables */
652 *domains
= *r
.out
.domains
;
654 *count
= *r
.out
.count
;
660 NTSTATUS
rpccli_lsa_LookupSids(struct rpc_pipe_client
*cli
,
662 struct policy_handle
*handle
/* [in] [ref] */,
663 struct lsa_SidArray
*sids
/* [in] [ref] */,
664 struct lsa_RefDomainList
**domains
/* [out] [ref] */,
665 struct lsa_TransNameArray
*names
/* [in,out] [ref] */,
666 uint16_t level
/* [in] */,
667 uint32_t *count
/* [in,out] [ref] */)
669 struct lsa_LookupSids r
;
673 r
.in
.handle
= handle
;
679 if (DEBUGLEVEL
>= 10) {
680 NDR_PRINT_IN_DEBUG(lsa_LookupSids
, &r
);
683 status
= cli_do_rpc_ndr(cli
,
690 if (!NT_STATUS_IS_OK(status
)) {
694 if (DEBUGLEVEL
>= 10) {
695 NDR_PRINT_OUT_DEBUG(lsa_LookupSids
, &r
);
698 if (NT_STATUS_IS_ERR(status
)) {
702 /* Return variables */
703 *domains
= *r
.out
.domains
;
704 *names
= *r
.out
.names
;
705 *count
= *r
.out
.count
;
711 NTSTATUS
rpccli_lsa_CreateSecret(struct rpc_pipe_client
*cli
,
713 struct policy_handle
*handle
/* [in] [ref] */,
714 struct lsa_String name
/* [in] */,
715 uint32_t access_mask
/* [in] */,
716 struct policy_handle
*sec_handle
/* [out] [ref] */)
718 struct lsa_CreateSecret r
;
722 r
.in
.handle
= handle
;
724 r
.in
.access_mask
= access_mask
;
726 if (DEBUGLEVEL
>= 10) {
727 NDR_PRINT_IN_DEBUG(lsa_CreateSecret
, &r
);
730 status
= cli_do_rpc_ndr(cli
,
734 NDR_LSA_CREATESECRET
,
737 if (!NT_STATUS_IS_OK(status
)) {
741 if (DEBUGLEVEL
>= 10) {
742 NDR_PRINT_OUT_DEBUG(lsa_CreateSecret
, &r
);
745 if (NT_STATUS_IS_ERR(status
)) {
749 /* Return variables */
750 *sec_handle
= *r
.out
.sec_handle
;
756 NTSTATUS
rpccli_lsa_OpenAccount(struct rpc_pipe_client
*cli
,
758 struct policy_handle
*handle
/* [in] [ref] */,
759 struct dom_sid2
*sid
/* [in] [ref] */,
760 uint32_t access_mask
/* [in] */,
761 struct policy_handle
*acct_handle
/* [out] [ref] */)
763 struct lsa_OpenAccount r
;
767 r
.in
.handle
= handle
;
769 r
.in
.access_mask
= access_mask
;
771 if (DEBUGLEVEL
>= 10) {
772 NDR_PRINT_IN_DEBUG(lsa_OpenAccount
, &r
);
775 status
= cli_do_rpc_ndr(cli
,
782 if (!NT_STATUS_IS_OK(status
)) {
786 if (DEBUGLEVEL
>= 10) {
787 NDR_PRINT_OUT_DEBUG(lsa_OpenAccount
, &r
);
790 if (NT_STATUS_IS_ERR(status
)) {
794 /* Return variables */
795 *acct_handle
= *r
.out
.acct_handle
;
801 NTSTATUS
rpccli_lsa_EnumPrivsAccount(struct rpc_pipe_client
*cli
,
803 struct policy_handle
*handle
/* [in] [ref] */,
804 struct lsa_PrivilegeSet
**privs
/* [out] [ref] */)
806 struct lsa_EnumPrivsAccount r
;
810 r
.in
.handle
= handle
;
812 if (DEBUGLEVEL
>= 10) {
813 NDR_PRINT_IN_DEBUG(lsa_EnumPrivsAccount
, &r
);
816 status
= cli_do_rpc_ndr(cli
,
820 NDR_LSA_ENUMPRIVSACCOUNT
,
823 if (!NT_STATUS_IS_OK(status
)) {
827 if (DEBUGLEVEL
>= 10) {
828 NDR_PRINT_OUT_DEBUG(lsa_EnumPrivsAccount
, &r
);
831 if (NT_STATUS_IS_ERR(status
)) {
835 /* Return variables */
836 *privs
= *r
.out
.privs
;
842 NTSTATUS
rpccli_lsa_AddPrivilegesToAccount(struct rpc_pipe_client
*cli
,
844 struct policy_handle
*handle
/* [in] [ref] */,
845 struct lsa_PrivilegeSet
*privs
/* [in] [ref] */)
847 struct lsa_AddPrivilegesToAccount r
;
851 r
.in
.handle
= handle
;
854 if (DEBUGLEVEL
>= 10) {
855 NDR_PRINT_IN_DEBUG(lsa_AddPrivilegesToAccount
, &r
);
858 status
= cli_do_rpc_ndr(cli
,
862 NDR_LSA_ADDPRIVILEGESTOACCOUNT
,
865 if (!NT_STATUS_IS_OK(status
)) {
869 if (DEBUGLEVEL
>= 10) {
870 NDR_PRINT_OUT_DEBUG(lsa_AddPrivilegesToAccount
, &r
);
873 if (NT_STATUS_IS_ERR(status
)) {
877 /* Return variables */
883 NTSTATUS
rpccli_lsa_RemovePrivilegesFromAccount(struct rpc_pipe_client
*cli
,
885 struct policy_handle
*handle
/* [in] [ref] */,
886 uint8_t remove_all
/* [in] */,
887 struct lsa_PrivilegeSet
*privs
/* [in] [unique] */)
889 struct lsa_RemovePrivilegesFromAccount r
;
893 r
.in
.handle
= handle
;
894 r
.in
.remove_all
= remove_all
;
897 if (DEBUGLEVEL
>= 10) {
898 NDR_PRINT_IN_DEBUG(lsa_RemovePrivilegesFromAccount
, &r
);
901 status
= cli_do_rpc_ndr(cli
,
905 NDR_LSA_REMOVEPRIVILEGESFROMACCOUNT
,
908 if (!NT_STATUS_IS_OK(status
)) {
912 if (DEBUGLEVEL
>= 10) {
913 NDR_PRINT_OUT_DEBUG(lsa_RemovePrivilegesFromAccount
, &r
);
916 if (NT_STATUS_IS_ERR(status
)) {
920 /* Return variables */
926 NTSTATUS
rpccli_lsa_GetQuotasForAccount(struct rpc_pipe_client
*cli
,
929 struct lsa_GetQuotasForAccount r
;
934 if (DEBUGLEVEL
>= 10) {
935 NDR_PRINT_IN_DEBUG(lsa_GetQuotasForAccount
, &r
);
938 status
= cli_do_rpc_ndr(cli
,
942 NDR_LSA_GETQUOTASFORACCOUNT
,
945 if (!NT_STATUS_IS_OK(status
)) {
949 if (DEBUGLEVEL
>= 10) {
950 NDR_PRINT_OUT_DEBUG(lsa_GetQuotasForAccount
, &r
);
953 if (NT_STATUS_IS_ERR(status
)) {
957 /* Return variables */
963 NTSTATUS
rpccli_lsa_SetQuotasForAccount(struct rpc_pipe_client
*cli
,
966 struct lsa_SetQuotasForAccount r
;
971 if (DEBUGLEVEL
>= 10) {
972 NDR_PRINT_IN_DEBUG(lsa_SetQuotasForAccount
, &r
);
975 status
= cli_do_rpc_ndr(cli
,
979 NDR_LSA_SETQUOTASFORACCOUNT
,
982 if (!NT_STATUS_IS_OK(status
)) {
986 if (DEBUGLEVEL
>= 10) {
987 NDR_PRINT_OUT_DEBUG(lsa_SetQuotasForAccount
, &r
);
990 if (NT_STATUS_IS_ERR(status
)) {
994 /* Return variables */
1000 NTSTATUS
rpccli_lsa_GetSystemAccessAccount(struct rpc_pipe_client
*cli
,
1001 TALLOC_CTX
*mem_ctx
,
1002 struct policy_handle
*handle
/* [in] [ref] */,
1003 uint32_t *access_mask
/* [out] [ref] */)
1005 struct lsa_GetSystemAccessAccount r
;
1009 r
.in
.handle
= handle
;
1011 if (DEBUGLEVEL
>= 10) {
1012 NDR_PRINT_IN_DEBUG(lsa_GetSystemAccessAccount
, &r
);
1015 status
= cli_do_rpc_ndr(cli
,
1019 NDR_LSA_GETSYSTEMACCESSACCOUNT
,
1022 if (!NT_STATUS_IS_OK(status
)) {
1026 if (DEBUGLEVEL
>= 10) {
1027 NDR_PRINT_OUT_DEBUG(lsa_GetSystemAccessAccount
, &r
);
1030 if (NT_STATUS_IS_ERR(status
)) {
1034 /* Return variables */
1035 *access_mask
= *r
.out
.access_mask
;
1038 return r
.out
.result
;
1041 NTSTATUS
rpccli_lsa_SetSystemAccessAccount(struct rpc_pipe_client
*cli
,
1042 TALLOC_CTX
*mem_ctx
,
1043 struct policy_handle
*handle
/* [in] [ref] */,
1044 uint32_t access_mask
/* [in] */)
1046 struct lsa_SetSystemAccessAccount r
;
1050 r
.in
.handle
= handle
;
1051 r
.in
.access_mask
= access_mask
;
1053 if (DEBUGLEVEL
>= 10) {
1054 NDR_PRINT_IN_DEBUG(lsa_SetSystemAccessAccount
, &r
);
1057 status
= cli_do_rpc_ndr(cli
,
1061 NDR_LSA_SETSYSTEMACCESSACCOUNT
,
1064 if (!NT_STATUS_IS_OK(status
)) {
1068 if (DEBUGLEVEL
>= 10) {
1069 NDR_PRINT_OUT_DEBUG(lsa_SetSystemAccessAccount
, &r
);
1072 if (NT_STATUS_IS_ERR(status
)) {
1076 /* Return variables */
1079 return r
.out
.result
;
1082 NTSTATUS
rpccli_lsa_OpenTrustedDomain(struct rpc_pipe_client
*cli
,
1083 TALLOC_CTX
*mem_ctx
,
1084 struct policy_handle
*handle
/* [in] [ref] */,
1085 struct dom_sid2
*sid
/* [in] [ref] */,
1086 uint32_t access_mask
/* [in] */,
1087 struct policy_handle
*trustdom_handle
/* [out] [ref] */)
1089 struct lsa_OpenTrustedDomain r
;
1093 r
.in
.handle
= handle
;
1095 r
.in
.access_mask
= access_mask
;
1097 if (DEBUGLEVEL
>= 10) {
1098 NDR_PRINT_IN_DEBUG(lsa_OpenTrustedDomain
, &r
);
1101 status
= cli_do_rpc_ndr(cli
,
1105 NDR_LSA_OPENTRUSTEDDOMAIN
,
1108 if (!NT_STATUS_IS_OK(status
)) {
1112 if (DEBUGLEVEL
>= 10) {
1113 NDR_PRINT_OUT_DEBUG(lsa_OpenTrustedDomain
, &r
);
1116 if (NT_STATUS_IS_ERR(status
)) {
1120 /* Return variables */
1121 *trustdom_handle
= *r
.out
.trustdom_handle
;
1124 return r
.out
.result
;
1127 NTSTATUS
rpccli_lsa_QueryTrustedDomainInfo(struct rpc_pipe_client
*cli
,
1128 TALLOC_CTX
*mem_ctx
,
1129 struct policy_handle
*trustdom_handle
/* [in] [ref] */,
1130 enum lsa_TrustDomInfoEnum level
/* [in] */,
1131 union lsa_TrustedDomainInfo
*info
/* [out] [unique,switch_is(level)] */)
1133 struct lsa_QueryTrustedDomainInfo r
;
1137 r
.in
.trustdom_handle
= trustdom_handle
;
1140 if (DEBUGLEVEL
>= 10) {
1141 NDR_PRINT_IN_DEBUG(lsa_QueryTrustedDomainInfo
, &r
);
1144 status
= cli_do_rpc_ndr(cli
,
1148 NDR_LSA_QUERYTRUSTEDDOMAININFO
,
1151 if (!NT_STATUS_IS_OK(status
)) {
1155 if (DEBUGLEVEL
>= 10) {
1156 NDR_PRINT_OUT_DEBUG(lsa_QueryTrustedDomainInfo
, &r
);
1159 if (NT_STATUS_IS_ERR(status
)) {
1163 /* Return variables */
1164 if (info
&& r
.out
.info
) {
1165 *info
= *r
.out
.info
;
1169 return r
.out
.result
;
1172 NTSTATUS
rpccli_lsa_SetInformationTrustedDomain(struct rpc_pipe_client
*cli
,
1173 TALLOC_CTX
*mem_ctx
)
1175 struct lsa_SetInformationTrustedDomain r
;
1180 if (DEBUGLEVEL
>= 10) {
1181 NDR_PRINT_IN_DEBUG(lsa_SetInformationTrustedDomain
, &r
);
1184 status
= cli_do_rpc_ndr(cli
,
1188 NDR_LSA_SETINFORMATIONTRUSTEDDOMAIN
,
1191 if (!NT_STATUS_IS_OK(status
)) {
1195 if (DEBUGLEVEL
>= 10) {
1196 NDR_PRINT_OUT_DEBUG(lsa_SetInformationTrustedDomain
, &r
);
1199 if (NT_STATUS_IS_ERR(status
)) {
1203 /* Return variables */
1206 return r
.out
.result
;
1209 NTSTATUS
rpccli_lsa_OpenSecret(struct rpc_pipe_client
*cli
,
1210 TALLOC_CTX
*mem_ctx
,
1211 struct policy_handle
*handle
/* [in] [ref] */,
1212 struct lsa_String name
/* [in] */,
1213 uint32_t access_mask
/* [in] */,
1214 struct policy_handle
*sec_handle
/* [out] [ref] */)
1216 struct lsa_OpenSecret r
;
1220 r
.in
.handle
= handle
;
1222 r
.in
.access_mask
= access_mask
;
1224 if (DEBUGLEVEL
>= 10) {
1225 NDR_PRINT_IN_DEBUG(lsa_OpenSecret
, &r
);
1228 status
= cli_do_rpc_ndr(cli
,
1235 if (!NT_STATUS_IS_OK(status
)) {
1239 if (DEBUGLEVEL
>= 10) {
1240 NDR_PRINT_OUT_DEBUG(lsa_OpenSecret
, &r
);
1243 if (NT_STATUS_IS_ERR(status
)) {
1247 /* Return variables */
1248 *sec_handle
= *r
.out
.sec_handle
;
1251 return r
.out
.result
;
1254 NTSTATUS
rpccli_lsa_SetSecret(struct rpc_pipe_client
*cli
,
1255 TALLOC_CTX
*mem_ctx
,
1256 struct policy_handle
*sec_handle
/* [in] [ref] */,
1257 struct lsa_DATA_BUF
*new_val
/* [in] [unique] */,
1258 struct lsa_DATA_BUF
*old_val
/* [in] [unique] */)
1260 struct lsa_SetSecret r
;
1264 r
.in
.sec_handle
= sec_handle
;
1265 r
.in
.new_val
= new_val
;
1266 r
.in
.old_val
= old_val
;
1268 if (DEBUGLEVEL
>= 10) {
1269 NDR_PRINT_IN_DEBUG(lsa_SetSecret
, &r
);
1272 status
= cli_do_rpc_ndr(cli
,
1279 if (!NT_STATUS_IS_OK(status
)) {
1283 if (DEBUGLEVEL
>= 10) {
1284 NDR_PRINT_OUT_DEBUG(lsa_SetSecret
, &r
);
1287 if (NT_STATUS_IS_ERR(status
)) {
1291 /* Return variables */
1294 return r
.out
.result
;
1297 NTSTATUS
rpccli_lsa_QuerySecret(struct rpc_pipe_client
*cli
,
1298 TALLOC_CTX
*mem_ctx
,
1299 struct policy_handle
*sec_handle
/* [in] [ref] */,
1300 struct lsa_DATA_BUF_PTR
*new_val
/* [in,out] [unique] */,
1301 NTTIME
*new_mtime
/* [in,out] [unique] */,
1302 struct lsa_DATA_BUF_PTR
*old_val
/* [in,out] [unique] */,
1303 NTTIME
*old_mtime
/* [in,out] [unique] */)
1305 struct lsa_QuerySecret r
;
1309 r
.in
.sec_handle
= sec_handle
;
1310 r
.in
.new_val
= new_val
;
1311 r
.in
.new_mtime
= new_mtime
;
1312 r
.in
.old_val
= old_val
;
1313 r
.in
.old_mtime
= old_mtime
;
1315 if (DEBUGLEVEL
>= 10) {
1316 NDR_PRINT_IN_DEBUG(lsa_QuerySecret
, &r
);
1319 status
= cli_do_rpc_ndr(cli
,
1323 NDR_LSA_QUERYSECRET
,
1326 if (!NT_STATUS_IS_OK(status
)) {
1330 if (DEBUGLEVEL
>= 10) {
1331 NDR_PRINT_OUT_DEBUG(lsa_QuerySecret
, &r
);
1334 if (NT_STATUS_IS_ERR(status
)) {
1338 /* Return variables */
1339 if (new_val
&& r
.out
.new_val
) {
1340 *new_val
= *r
.out
.new_val
;
1342 if (new_mtime
&& r
.out
.new_mtime
) {
1343 *new_mtime
= *r
.out
.new_mtime
;
1345 if (old_val
&& r
.out
.old_val
) {
1346 *old_val
= *r
.out
.old_val
;
1348 if (old_mtime
&& r
.out
.old_mtime
) {
1349 *old_mtime
= *r
.out
.old_mtime
;
1353 return r
.out
.result
;
1356 NTSTATUS
rpccli_lsa_LookupPrivValue(struct rpc_pipe_client
*cli
,
1357 TALLOC_CTX
*mem_ctx
,
1358 struct policy_handle
*handle
/* [in] [ref] */,
1359 struct lsa_String
*name
/* [in] [ref] */,
1360 struct lsa_LUID
*luid
/* [out] [ref] */)
1362 struct lsa_LookupPrivValue r
;
1366 r
.in
.handle
= handle
;
1369 if (DEBUGLEVEL
>= 10) {
1370 NDR_PRINT_IN_DEBUG(lsa_LookupPrivValue
, &r
);
1373 status
= cli_do_rpc_ndr(cli
,
1377 NDR_LSA_LOOKUPPRIVVALUE
,
1380 if (!NT_STATUS_IS_OK(status
)) {
1384 if (DEBUGLEVEL
>= 10) {
1385 NDR_PRINT_OUT_DEBUG(lsa_LookupPrivValue
, &r
);
1388 if (NT_STATUS_IS_ERR(status
)) {
1392 /* Return variables */
1393 *luid
= *r
.out
.luid
;
1396 return r
.out
.result
;
1399 NTSTATUS
rpccli_lsa_LookupPrivName(struct rpc_pipe_client
*cli
,
1400 TALLOC_CTX
*mem_ctx
,
1401 struct policy_handle
*handle
/* [in] [ref] */,
1402 struct lsa_LUID
*luid
/* [in] [ref] */,
1403 struct lsa_StringLarge
*name
/* [out] [unique] */)
1405 struct lsa_LookupPrivName r
;
1409 r
.in
.handle
= handle
;
1412 if (DEBUGLEVEL
>= 10) {
1413 NDR_PRINT_IN_DEBUG(lsa_LookupPrivName
, &r
);
1416 status
= cli_do_rpc_ndr(cli
,
1420 NDR_LSA_LOOKUPPRIVNAME
,
1423 if (!NT_STATUS_IS_OK(status
)) {
1427 if (DEBUGLEVEL
>= 10) {
1428 NDR_PRINT_OUT_DEBUG(lsa_LookupPrivName
, &r
);
1431 if (NT_STATUS_IS_ERR(status
)) {
1435 /* Return variables */
1436 if (name
&& r
.out
.name
) {
1437 *name
= *r
.out
.name
;
1441 return r
.out
.result
;
1444 NTSTATUS
rpccli_lsa_LookupPrivDisplayName(struct rpc_pipe_client
*cli
,
1445 TALLOC_CTX
*mem_ctx
,
1446 struct policy_handle
*handle
/* [in] [ref] */,
1447 struct lsa_String
*name
/* [in] [ref] */,
1448 uint16_t language_id
/* [in] */,
1449 uint16_t language_id_sys
/* [in] */,
1450 struct lsa_StringLarge
**disp_name
/* [out] [ref] */,
1451 uint16_t *returned_language_id
/* [out] [ref] */)
1453 struct lsa_LookupPrivDisplayName r
;
1457 r
.in
.handle
= handle
;
1459 r
.in
.language_id
= language_id
;
1460 r
.in
.language_id_sys
= language_id_sys
;
1462 if (DEBUGLEVEL
>= 10) {
1463 NDR_PRINT_IN_DEBUG(lsa_LookupPrivDisplayName
, &r
);
1466 status
= cli_do_rpc_ndr(cli
,
1470 NDR_LSA_LOOKUPPRIVDISPLAYNAME
,
1473 if (!NT_STATUS_IS_OK(status
)) {
1477 if (DEBUGLEVEL
>= 10) {
1478 NDR_PRINT_OUT_DEBUG(lsa_LookupPrivDisplayName
, &r
);
1481 if (NT_STATUS_IS_ERR(status
)) {
1485 /* Return variables */
1486 *disp_name
= *r
.out
.disp_name
;
1487 *returned_language_id
= *r
.out
.returned_language_id
;
1490 return r
.out
.result
;
1493 NTSTATUS
rpccli_lsa_DeleteObject(struct rpc_pipe_client
*cli
,
1494 TALLOC_CTX
*mem_ctx
,
1495 struct policy_handle
*handle
/* [in,out] [ref] */)
1497 struct lsa_DeleteObject r
;
1501 r
.in
.handle
= handle
;
1503 if (DEBUGLEVEL
>= 10) {
1504 NDR_PRINT_IN_DEBUG(lsa_DeleteObject
, &r
);
1507 status
= cli_do_rpc_ndr(cli
,
1511 NDR_LSA_DELETEOBJECT
,
1514 if (!NT_STATUS_IS_OK(status
)) {
1518 if (DEBUGLEVEL
>= 10) {
1519 NDR_PRINT_OUT_DEBUG(lsa_DeleteObject
, &r
);
1522 if (NT_STATUS_IS_ERR(status
)) {
1526 /* Return variables */
1527 *handle
= *r
.out
.handle
;
1530 return r
.out
.result
;
1533 NTSTATUS
rpccli_lsa_EnumAccountsWithUserRight(struct rpc_pipe_client
*cli
,
1534 TALLOC_CTX
*mem_ctx
,
1535 struct policy_handle
*handle
/* [in] [ref] */,
1536 struct lsa_String
*name
/* [in] [unique] */,
1537 struct lsa_SidArray
*sids
/* [out] [ref] */)
1539 struct lsa_EnumAccountsWithUserRight r
;
1543 r
.in
.handle
= handle
;
1546 if (DEBUGLEVEL
>= 10) {
1547 NDR_PRINT_IN_DEBUG(lsa_EnumAccountsWithUserRight
, &r
);
1550 status
= cli_do_rpc_ndr(cli
,
1554 NDR_LSA_ENUMACCOUNTSWITHUSERRIGHT
,
1557 if (!NT_STATUS_IS_OK(status
)) {
1561 if (DEBUGLEVEL
>= 10) {
1562 NDR_PRINT_OUT_DEBUG(lsa_EnumAccountsWithUserRight
, &r
);
1565 if (NT_STATUS_IS_ERR(status
)) {
1569 /* Return variables */
1570 *sids
= *r
.out
.sids
;
1573 return r
.out
.result
;
1576 NTSTATUS
rpccli_lsa_EnumAccountRights(struct rpc_pipe_client
*cli
,
1577 TALLOC_CTX
*mem_ctx
,
1578 struct policy_handle
*handle
/* [in] [ref] */,
1579 struct dom_sid2
*sid
/* [in] [ref] */,
1580 struct lsa_RightSet
*rights
/* [out] [ref] */)
1582 struct lsa_EnumAccountRights r
;
1586 r
.in
.handle
= handle
;
1589 if (DEBUGLEVEL
>= 10) {
1590 NDR_PRINT_IN_DEBUG(lsa_EnumAccountRights
, &r
);
1593 status
= cli_do_rpc_ndr(cli
,
1597 NDR_LSA_ENUMACCOUNTRIGHTS
,
1600 if (!NT_STATUS_IS_OK(status
)) {
1604 if (DEBUGLEVEL
>= 10) {
1605 NDR_PRINT_OUT_DEBUG(lsa_EnumAccountRights
, &r
);
1608 if (NT_STATUS_IS_ERR(status
)) {
1612 /* Return variables */
1613 *rights
= *r
.out
.rights
;
1616 return r
.out
.result
;
1619 NTSTATUS
rpccli_lsa_AddAccountRights(struct rpc_pipe_client
*cli
,
1620 TALLOC_CTX
*mem_ctx
,
1621 struct policy_handle
*handle
/* [in] [ref] */,
1622 struct dom_sid2
*sid
/* [in] [ref] */,
1623 struct lsa_RightSet
*rights
/* [in] [ref] */)
1625 struct lsa_AddAccountRights r
;
1629 r
.in
.handle
= handle
;
1631 r
.in
.rights
= rights
;
1633 if (DEBUGLEVEL
>= 10) {
1634 NDR_PRINT_IN_DEBUG(lsa_AddAccountRights
, &r
);
1637 status
= cli_do_rpc_ndr(cli
,
1641 NDR_LSA_ADDACCOUNTRIGHTS
,
1644 if (!NT_STATUS_IS_OK(status
)) {
1648 if (DEBUGLEVEL
>= 10) {
1649 NDR_PRINT_OUT_DEBUG(lsa_AddAccountRights
, &r
);
1652 if (NT_STATUS_IS_ERR(status
)) {
1656 /* Return variables */
1659 return r
.out
.result
;
1662 NTSTATUS
rpccli_lsa_RemoveAccountRights(struct rpc_pipe_client
*cli
,
1663 TALLOC_CTX
*mem_ctx
,
1664 struct policy_handle
*handle
/* [in] [ref] */,
1665 struct dom_sid2
*sid
/* [in] [ref] */,
1666 uint8_t remove_all
/* [in] */,
1667 struct lsa_RightSet
*rights
/* [in] [ref] */)
1669 struct lsa_RemoveAccountRights r
;
1673 r
.in
.handle
= handle
;
1675 r
.in
.remove_all
= remove_all
;
1676 r
.in
.rights
= rights
;
1678 if (DEBUGLEVEL
>= 10) {
1679 NDR_PRINT_IN_DEBUG(lsa_RemoveAccountRights
, &r
);
1682 status
= cli_do_rpc_ndr(cli
,
1686 NDR_LSA_REMOVEACCOUNTRIGHTS
,
1689 if (!NT_STATUS_IS_OK(status
)) {
1693 if (DEBUGLEVEL
>= 10) {
1694 NDR_PRINT_OUT_DEBUG(lsa_RemoveAccountRights
, &r
);
1697 if (NT_STATUS_IS_ERR(status
)) {
1701 /* Return variables */
1704 return r
.out
.result
;
1707 NTSTATUS
rpccli_lsa_QueryTrustedDomainInfoBySid(struct rpc_pipe_client
*cli
,
1708 TALLOC_CTX
*mem_ctx
,
1709 struct policy_handle
*handle
/* [in] [ref] */,
1710 struct dom_sid2
*dom_sid
/* [in] [ref] */,
1711 enum lsa_TrustDomInfoEnum level
/* [in] */,
1712 union lsa_TrustedDomainInfo
**info
/* [out] [ref,switch_is(level)] */)
1714 struct lsa_QueryTrustedDomainInfoBySid r
;
1718 r
.in
.handle
= handle
;
1719 r
.in
.dom_sid
= dom_sid
;
1722 if (DEBUGLEVEL
>= 10) {
1723 NDR_PRINT_IN_DEBUG(lsa_QueryTrustedDomainInfoBySid
, &r
);
1726 status
= cli_do_rpc_ndr(cli
,
1730 NDR_LSA_QUERYTRUSTEDDOMAININFOBYSID
,
1733 if (!NT_STATUS_IS_OK(status
)) {
1737 if (DEBUGLEVEL
>= 10) {
1738 NDR_PRINT_OUT_DEBUG(lsa_QueryTrustedDomainInfoBySid
, &r
);
1741 if (NT_STATUS_IS_ERR(status
)) {
1745 /* Return variables */
1746 *info
= *r
.out
.info
;
1749 return r
.out
.result
;
1752 NTSTATUS
rpccli_lsa_SetTrustedDomainInfo(struct rpc_pipe_client
*cli
,
1753 TALLOC_CTX
*mem_ctx
)
1755 struct lsa_SetTrustedDomainInfo r
;
1760 if (DEBUGLEVEL
>= 10) {
1761 NDR_PRINT_IN_DEBUG(lsa_SetTrustedDomainInfo
, &r
);
1764 status
= cli_do_rpc_ndr(cli
,
1768 NDR_LSA_SETTRUSTEDDOMAININFO
,
1771 if (!NT_STATUS_IS_OK(status
)) {
1775 if (DEBUGLEVEL
>= 10) {
1776 NDR_PRINT_OUT_DEBUG(lsa_SetTrustedDomainInfo
, &r
);
1779 if (NT_STATUS_IS_ERR(status
)) {
1783 /* Return variables */
1786 return r
.out
.result
;
1789 NTSTATUS
rpccli_lsa_DeleteTrustedDomain(struct rpc_pipe_client
*cli
,
1790 TALLOC_CTX
*mem_ctx
,
1791 struct policy_handle
*handle
/* [in] [ref] */,
1792 struct dom_sid2
*dom_sid
/* [in] [ref] */)
1794 struct lsa_DeleteTrustedDomain r
;
1798 r
.in
.handle
= handle
;
1799 r
.in
.dom_sid
= dom_sid
;
1801 if (DEBUGLEVEL
>= 10) {
1802 NDR_PRINT_IN_DEBUG(lsa_DeleteTrustedDomain
, &r
);
1805 status
= cli_do_rpc_ndr(cli
,
1809 NDR_LSA_DELETETRUSTEDDOMAIN
,
1812 if (!NT_STATUS_IS_OK(status
)) {
1816 if (DEBUGLEVEL
>= 10) {
1817 NDR_PRINT_OUT_DEBUG(lsa_DeleteTrustedDomain
, &r
);
1820 if (NT_STATUS_IS_ERR(status
)) {
1824 /* Return variables */
1827 return r
.out
.result
;
1830 NTSTATUS
rpccli_lsa_StorePrivateData(struct rpc_pipe_client
*cli
,
1831 TALLOC_CTX
*mem_ctx
)
1833 struct lsa_StorePrivateData r
;
1838 if (DEBUGLEVEL
>= 10) {
1839 NDR_PRINT_IN_DEBUG(lsa_StorePrivateData
, &r
);
1842 status
= cli_do_rpc_ndr(cli
,
1846 NDR_LSA_STOREPRIVATEDATA
,
1849 if (!NT_STATUS_IS_OK(status
)) {
1853 if (DEBUGLEVEL
>= 10) {
1854 NDR_PRINT_OUT_DEBUG(lsa_StorePrivateData
, &r
);
1857 if (NT_STATUS_IS_ERR(status
)) {
1861 /* Return variables */
1864 return r
.out
.result
;
1867 NTSTATUS
rpccli_lsa_RetrievePrivateData(struct rpc_pipe_client
*cli
,
1868 TALLOC_CTX
*mem_ctx
)
1870 struct lsa_RetrievePrivateData r
;
1875 if (DEBUGLEVEL
>= 10) {
1876 NDR_PRINT_IN_DEBUG(lsa_RetrievePrivateData
, &r
);
1879 status
= cli_do_rpc_ndr(cli
,
1883 NDR_LSA_RETRIEVEPRIVATEDATA
,
1886 if (!NT_STATUS_IS_OK(status
)) {
1890 if (DEBUGLEVEL
>= 10) {
1891 NDR_PRINT_OUT_DEBUG(lsa_RetrievePrivateData
, &r
);
1894 if (NT_STATUS_IS_ERR(status
)) {
1898 /* Return variables */
1901 return r
.out
.result
;
1904 NTSTATUS
rpccli_lsa_OpenPolicy2(struct rpc_pipe_client
*cli
,
1905 TALLOC_CTX
*mem_ctx
,
1906 const char *system_name
/* [in] [unique,charset(UTF16)] */,
1907 struct lsa_ObjectAttribute
*attr
/* [in] [ref] */,
1908 uint32_t access_mask
/* [in] */,
1909 struct policy_handle
*handle
/* [out] [ref] */)
1911 struct lsa_OpenPolicy2 r
;
1915 r
.in
.system_name
= system_name
;
1917 r
.in
.access_mask
= access_mask
;
1919 if (DEBUGLEVEL
>= 10) {
1920 NDR_PRINT_IN_DEBUG(lsa_OpenPolicy2
, &r
);
1923 status
= cli_do_rpc_ndr(cli
,
1927 NDR_LSA_OPENPOLICY2
,
1930 if (!NT_STATUS_IS_OK(status
)) {
1934 if (DEBUGLEVEL
>= 10) {
1935 NDR_PRINT_OUT_DEBUG(lsa_OpenPolicy2
, &r
);
1938 if (NT_STATUS_IS_ERR(status
)) {
1942 /* Return variables */
1943 *handle
= *r
.out
.handle
;
1946 return r
.out
.result
;
1949 NTSTATUS
rpccli_lsa_GetUserName(struct rpc_pipe_client
*cli
,
1950 TALLOC_CTX
*mem_ctx
,
1951 const char *system_name
/* [in] [unique,charset(UTF16)] */,
1952 struct lsa_String
**account_name
/* [in,out] [ref] */,
1953 struct lsa_String
**authority_name
/* [in,out] [unique] */)
1955 struct lsa_GetUserName r
;
1959 r
.in
.system_name
= system_name
;
1960 r
.in
.account_name
= account_name
;
1961 r
.in
.authority_name
= authority_name
;
1963 if (DEBUGLEVEL
>= 10) {
1964 NDR_PRINT_IN_DEBUG(lsa_GetUserName
, &r
);
1967 status
= cli_do_rpc_ndr(cli
,
1971 NDR_LSA_GETUSERNAME
,
1974 if (!NT_STATUS_IS_OK(status
)) {
1978 if (DEBUGLEVEL
>= 10) {
1979 NDR_PRINT_OUT_DEBUG(lsa_GetUserName
, &r
);
1982 if (NT_STATUS_IS_ERR(status
)) {
1986 /* Return variables */
1987 *account_name
= *r
.out
.account_name
;
1988 if (authority_name
&& r
.out
.authority_name
) {
1989 *authority_name
= *r
.out
.authority_name
;
1993 return r
.out
.result
;
1996 NTSTATUS
rpccli_lsa_QueryInfoPolicy2(struct rpc_pipe_client
*cli
,
1997 TALLOC_CTX
*mem_ctx
,
1998 struct policy_handle
*handle
/* [in] [ref] */,
1999 enum lsa_PolicyInfo level
/* [in] */,
2000 union lsa_PolicyInformation
**info
/* [out] [ref,switch_is(level)] */)
2002 struct lsa_QueryInfoPolicy2 r
;
2006 r
.in
.handle
= handle
;
2009 if (DEBUGLEVEL
>= 10) {
2010 NDR_PRINT_IN_DEBUG(lsa_QueryInfoPolicy2
, &r
);
2013 status
= cli_do_rpc_ndr(cli
,
2017 NDR_LSA_QUERYINFOPOLICY2
,
2020 if (!NT_STATUS_IS_OK(status
)) {
2024 if (DEBUGLEVEL
>= 10) {
2025 NDR_PRINT_OUT_DEBUG(lsa_QueryInfoPolicy2
, &r
);
2028 if (NT_STATUS_IS_ERR(status
)) {
2032 /* Return variables */
2033 *info
= *r
.out
.info
;
2036 return r
.out
.result
;
2039 NTSTATUS
rpccli_lsa_SetInfoPolicy2(struct rpc_pipe_client
*cli
,
2040 TALLOC_CTX
*mem_ctx
,
2041 struct policy_handle
*handle
/* [in] [ref] */,
2042 enum lsa_PolicyInfo level
/* [in] */,
2043 union lsa_PolicyInformation
*info
/* [in] [ref,switch_is(level)] */)
2045 struct lsa_SetInfoPolicy2 r
;
2049 r
.in
.handle
= handle
;
2053 if (DEBUGLEVEL
>= 10) {
2054 NDR_PRINT_IN_DEBUG(lsa_SetInfoPolicy2
, &r
);
2057 status
= cli_do_rpc_ndr(cli
,
2061 NDR_LSA_SETINFOPOLICY2
,
2064 if (!NT_STATUS_IS_OK(status
)) {
2068 if (DEBUGLEVEL
>= 10) {
2069 NDR_PRINT_OUT_DEBUG(lsa_SetInfoPolicy2
, &r
);
2072 if (NT_STATUS_IS_ERR(status
)) {
2076 /* Return variables */
2079 return r
.out
.result
;
2082 NTSTATUS
rpccli_lsa_QueryTrustedDomainInfoByName(struct rpc_pipe_client
*cli
,
2083 TALLOC_CTX
*mem_ctx
,
2084 struct policy_handle
*handle
/* [in] [ref] */,
2085 struct lsa_String
*trusted_domain
/* [in] [ref] */,
2086 enum lsa_TrustDomInfoEnum level
/* [in] */,
2087 union lsa_TrustedDomainInfo
**info
/* [out] [ref,switch_is(level)] */)
2089 struct lsa_QueryTrustedDomainInfoByName r
;
2093 r
.in
.handle
= handle
;
2094 r
.in
.trusted_domain
= trusted_domain
;
2097 if (DEBUGLEVEL
>= 10) {
2098 NDR_PRINT_IN_DEBUG(lsa_QueryTrustedDomainInfoByName
, &r
);
2101 status
= cli_do_rpc_ndr(cli
,
2105 NDR_LSA_QUERYTRUSTEDDOMAININFOBYNAME
,
2108 if (!NT_STATUS_IS_OK(status
)) {
2112 if (DEBUGLEVEL
>= 10) {
2113 NDR_PRINT_OUT_DEBUG(lsa_QueryTrustedDomainInfoByName
, &r
);
2116 if (NT_STATUS_IS_ERR(status
)) {
2120 /* Return variables */
2121 *info
= *r
.out
.info
;
2124 return r
.out
.result
;
2127 NTSTATUS
rpccli_lsa_SetTrustedDomainInfoByName(struct rpc_pipe_client
*cli
,
2128 TALLOC_CTX
*mem_ctx
,
2129 struct policy_handle
*handle
/* [in] [ref] */,
2130 struct lsa_String trusted_domain
/* [in] */,
2131 enum lsa_TrustDomInfoEnum level
/* [in] */,
2132 union lsa_TrustedDomainInfo
*info
/* [in] [unique,switch_is(level)] */)
2134 struct lsa_SetTrustedDomainInfoByName r
;
2138 r
.in
.handle
= handle
;
2139 r
.in
.trusted_domain
= trusted_domain
;
2143 if (DEBUGLEVEL
>= 10) {
2144 NDR_PRINT_IN_DEBUG(lsa_SetTrustedDomainInfoByName
, &r
);
2147 status
= cli_do_rpc_ndr(cli
,
2151 NDR_LSA_SETTRUSTEDDOMAININFOBYNAME
,
2154 if (!NT_STATUS_IS_OK(status
)) {
2158 if (DEBUGLEVEL
>= 10) {
2159 NDR_PRINT_OUT_DEBUG(lsa_SetTrustedDomainInfoByName
, &r
);
2162 if (NT_STATUS_IS_ERR(status
)) {
2166 /* Return variables */
2169 return r
.out
.result
;
2172 NTSTATUS
rpccli_lsa_EnumTrustedDomainsEx(struct rpc_pipe_client
*cli
,
2173 TALLOC_CTX
*mem_ctx
,
2174 struct policy_handle
*handle
/* [in] [ref] */,
2175 uint32_t *resume_handle
/* [in,out] [ref] */,
2176 struct lsa_DomainListEx
*domains
/* [out] [ref] */,
2177 uint32_t max_size
/* [in] */)
2179 struct lsa_EnumTrustedDomainsEx r
;
2183 r
.in
.handle
= handle
;
2184 r
.in
.resume_handle
= resume_handle
;
2185 r
.in
.max_size
= max_size
;
2187 if (DEBUGLEVEL
>= 10) {
2188 NDR_PRINT_IN_DEBUG(lsa_EnumTrustedDomainsEx
, &r
);
2191 status
= cli_do_rpc_ndr(cli
,
2195 NDR_LSA_ENUMTRUSTEDDOMAINSEX
,
2198 if (!NT_STATUS_IS_OK(status
)) {
2202 if (DEBUGLEVEL
>= 10) {
2203 NDR_PRINT_OUT_DEBUG(lsa_EnumTrustedDomainsEx
, &r
);
2206 if (NT_STATUS_IS_ERR(status
)) {
2210 /* Return variables */
2211 *resume_handle
= *r
.out
.resume_handle
;
2212 *domains
= *r
.out
.domains
;
2215 return r
.out
.result
;
2218 NTSTATUS
rpccli_lsa_CreateTrustedDomainEx(struct rpc_pipe_client
*cli
,
2219 TALLOC_CTX
*mem_ctx
)
2221 struct lsa_CreateTrustedDomainEx r
;
2226 if (DEBUGLEVEL
>= 10) {
2227 NDR_PRINT_IN_DEBUG(lsa_CreateTrustedDomainEx
, &r
);
2230 status
= cli_do_rpc_ndr(cli
,
2234 NDR_LSA_CREATETRUSTEDDOMAINEX
,
2237 if (!NT_STATUS_IS_OK(status
)) {
2241 if (DEBUGLEVEL
>= 10) {
2242 NDR_PRINT_OUT_DEBUG(lsa_CreateTrustedDomainEx
, &r
);
2245 if (NT_STATUS_IS_ERR(status
)) {
2249 /* Return variables */
2252 return r
.out
.result
;
2255 NTSTATUS
rpccli_lsa_CloseTrustedDomainEx(struct rpc_pipe_client
*cli
,
2256 TALLOC_CTX
*mem_ctx
,
2257 struct policy_handle
*handle
/* [in,out] [ref] */)
2259 struct lsa_CloseTrustedDomainEx r
;
2263 r
.in
.handle
= handle
;
2265 if (DEBUGLEVEL
>= 10) {
2266 NDR_PRINT_IN_DEBUG(lsa_CloseTrustedDomainEx
, &r
);
2269 status
= cli_do_rpc_ndr(cli
,
2273 NDR_LSA_CLOSETRUSTEDDOMAINEX
,
2276 if (!NT_STATUS_IS_OK(status
)) {
2280 if (DEBUGLEVEL
>= 10) {
2281 NDR_PRINT_OUT_DEBUG(lsa_CloseTrustedDomainEx
, &r
);
2284 if (NT_STATUS_IS_ERR(status
)) {
2288 /* Return variables */
2289 *handle
= *r
.out
.handle
;
2292 return r
.out
.result
;
2295 NTSTATUS
rpccli_lsa_QueryDomainInformationPolicy(struct rpc_pipe_client
*cli
,
2296 TALLOC_CTX
*mem_ctx
,
2297 struct policy_handle
*handle
/* [in] [ref] */,
2298 uint16_t level
/* [in] */,
2299 union lsa_DomainInformationPolicy
**info
/* [out] [ref,switch_is(level)] */)
2301 struct lsa_QueryDomainInformationPolicy r
;
2305 r
.in
.handle
= handle
;
2308 if (DEBUGLEVEL
>= 10) {
2309 NDR_PRINT_IN_DEBUG(lsa_QueryDomainInformationPolicy
, &r
);
2312 status
= cli_do_rpc_ndr(cli
,
2316 NDR_LSA_QUERYDOMAININFORMATIONPOLICY
,
2319 if (!NT_STATUS_IS_OK(status
)) {
2323 if (DEBUGLEVEL
>= 10) {
2324 NDR_PRINT_OUT_DEBUG(lsa_QueryDomainInformationPolicy
, &r
);
2327 if (NT_STATUS_IS_ERR(status
)) {
2331 /* Return variables */
2332 *info
= *r
.out
.info
;
2335 return r
.out
.result
;
2338 NTSTATUS
rpccli_lsa_SetDomainInformationPolicy(struct rpc_pipe_client
*cli
,
2339 TALLOC_CTX
*mem_ctx
,
2340 struct policy_handle
*handle
/* [in] [ref] */,
2341 uint16_t level
/* [in] */,
2342 union lsa_DomainInformationPolicy
*info
/* [in] [unique,switch_is(level)] */)
2344 struct lsa_SetDomainInformationPolicy r
;
2348 r
.in
.handle
= handle
;
2352 if (DEBUGLEVEL
>= 10) {
2353 NDR_PRINT_IN_DEBUG(lsa_SetDomainInformationPolicy
, &r
);
2356 status
= cli_do_rpc_ndr(cli
,
2360 NDR_LSA_SETDOMAININFORMATIONPOLICY
,
2363 if (!NT_STATUS_IS_OK(status
)) {
2367 if (DEBUGLEVEL
>= 10) {
2368 NDR_PRINT_OUT_DEBUG(lsa_SetDomainInformationPolicy
, &r
);
2371 if (NT_STATUS_IS_ERR(status
)) {
2375 /* Return variables */
2378 return r
.out
.result
;
2381 NTSTATUS
rpccli_lsa_OpenTrustedDomainByName(struct rpc_pipe_client
*cli
,
2382 TALLOC_CTX
*mem_ctx
,
2383 struct policy_handle
*handle
/* [in] [ref] */,
2384 struct lsa_String name
/* [in] */,
2385 uint32_t access_mask
/* [in] */,
2386 struct policy_handle
*trustdom_handle
/* [out] [ref] */)
2388 struct lsa_OpenTrustedDomainByName r
;
2392 r
.in
.handle
= handle
;
2394 r
.in
.access_mask
= access_mask
;
2396 if (DEBUGLEVEL
>= 10) {
2397 NDR_PRINT_IN_DEBUG(lsa_OpenTrustedDomainByName
, &r
);
2400 status
= cli_do_rpc_ndr(cli
,
2404 NDR_LSA_OPENTRUSTEDDOMAINBYNAME
,
2407 if (!NT_STATUS_IS_OK(status
)) {
2411 if (DEBUGLEVEL
>= 10) {
2412 NDR_PRINT_OUT_DEBUG(lsa_OpenTrustedDomainByName
, &r
);
2415 if (NT_STATUS_IS_ERR(status
)) {
2419 /* Return variables */
2420 *trustdom_handle
= *r
.out
.trustdom_handle
;
2423 return r
.out
.result
;
2426 NTSTATUS
rpccli_lsa_TestCall(struct rpc_pipe_client
*cli
,
2427 TALLOC_CTX
*mem_ctx
)
2429 struct lsa_TestCall r
;
2434 if (DEBUGLEVEL
>= 10) {
2435 NDR_PRINT_IN_DEBUG(lsa_TestCall
, &r
);
2438 status
= cli_do_rpc_ndr(cli
,
2445 if (!NT_STATUS_IS_OK(status
)) {
2449 if (DEBUGLEVEL
>= 10) {
2450 NDR_PRINT_OUT_DEBUG(lsa_TestCall
, &r
);
2453 if (NT_STATUS_IS_ERR(status
)) {
2457 /* Return variables */
2460 return r
.out
.result
;
2463 NTSTATUS
rpccli_lsa_LookupSids2(struct rpc_pipe_client
*cli
,
2464 TALLOC_CTX
*mem_ctx
,
2465 struct policy_handle
*handle
/* [in] [ref] */,
2466 struct lsa_SidArray
*sids
/* [in] [ref] */,
2467 struct lsa_RefDomainList
**domains
/* [out] [ref] */,
2468 struct lsa_TransNameArray2
*names
/* [in,out] [ref] */,
2469 uint16_t level
/* [in] */,
2470 uint32_t *count
/* [in,out] [ref] */,
2471 uint32_t unknown1
/* [in] */,
2472 uint32_t unknown2
/* [in] */)
2474 struct lsa_LookupSids2 r
;
2478 r
.in
.handle
= handle
;
2483 r
.in
.unknown1
= unknown1
;
2484 r
.in
.unknown2
= unknown2
;
2486 if (DEBUGLEVEL
>= 10) {
2487 NDR_PRINT_IN_DEBUG(lsa_LookupSids2
, &r
);
2490 status
= cli_do_rpc_ndr(cli
,
2494 NDR_LSA_LOOKUPSIDS2
,
2497 if (!NT_STATUS_IS_OK(status
)) {
2501 if (DEBUGLEVEL
>= 10) {
2502 NDR_PRINT_OUT_DEBUG(lsa_LookupSids2
, &r
);
2505 if (NT_STATUS_IS_ERR(status
)) {
2509 /* Return variables */
2510 *domains
= *r
.out
.domains
;
2511 *names
= *r
.out
.names
;
2512 *count
= *r
.out
.count
;
2515 return r
.out
.result
;
2518 NTSTATUS
rpccli_lsa_LookupNames2(struct rpc_pipe_client
*cli
,
2519 TALLOC_CTX
*mem_ctx
,
2520 struct policy_handle
*handle
/* [in] [ref] */,
2521 uint32_t num_names
/* [in] [range(0,1000)] */,
2522 struct lsa_String
*names
/* [in] [size_is(num_names)] */,
2523 struct lsa_RefDomainList
**domains
/* [out] [ref] */,
2524 struct lsa_TransSidArray2
*sids
/* [in,out] [ref] */,
2525 enum lsa_LookupNamesLevel level
/* [in] */,
2526 uint32_t *count
/* [in,out] [ref] */,
2527 uint32_t unknown1
/* [in] */,
2528 uint32_t unknown2
/* [in] */)
2530 struct lsa_LookupNames2 r
;
2534 r
.in
.handle
= handle
;
2535 r
.in
.num_names
= num_names
;
2540 r
.in
.unknown1
= unknown1
;
2541 r
.in
.unknown2
= unknown2
;
2543 if (DEBUGLEVEL
>= 10) {
2544 NDR_PRINT_IN_DEBUG(lsa_LookupNames2
, &r
);
2547 status
= cli_do_rpc_ndr(cli
,
2551 NDR_LSA_LOOKUPNAMES2
,
2554 if (!NT_STATUS_IS_OK(status
)) {
2558 if (DEBUGLEVEL
>= 10) {
2559 NDR_PRINT_OUT_DEBUG(lsa_LookupNames2
, &r
);
2562 if (NT_STATUS_IS_ERR(status
)) {
2566 /* Return variables */
2567 *domains
= *r
.out
.domains
;
2568 *sids
= *r
.out
.sids
;
2569 *count
= *r
.out
.count
;
2572 return r
.out
.result
;
2575 NTSTATUS
rpccli_lsa_CreateTrustedDomainEx2(struct rpc_pipe_client
*cli
,
2576 TALLOC_CTX
*mem_ctx
)
2578 struct lsa_CreateTrustedDomainEx2 r
;
2583 if (DEBUGLEVEL
>= 10) {
2584 NDR_PRINT_IN_DEBUG(lsa_CreateTrustedDomainEx2
, &r
);
2587 status
= cli_do_rpc_ndr(cli
,
2591 NDR_LSA_CREATETRUSTEDDOMAINEX2
,
2594 if (!NT_STATUS_IS_OK(status
)) {
2598 if (DEBUGLEVEL
>= 10) {
2599 NDR_PRINT_OUT_DEBUG(lsa_CreateTrustedDomainEx2
, &r
);
2602 if (NT_STATUS_IS_ERR(status
)) {
2606 /* Return variables */
2609 return r
.out
.result
;
2612 NTSTATUS
rpccli_lsa_CREDRWRITE(struct rpc_pipe_client
*cli
,
2613 TALLOC_CTX
*mem_ctx
)
2615 struct lsa_CREDRWRITE r
;
2620 if (DEBUGLEVEL
>= 10) {
2621 NDR_PRINT_IN_DEBUG(lsa_CREDRWRITE
, &r
);
2624 status
= cli_do_rpc_ndr(cli
,
2631 if (!NT_STATUS_IS_OK(status
)) {
2635 if (DEBUGLEVEL
>= 10) {
2636 NDR_PRINT_OUT_DEBUG(lsa_CREDRWRITE
, &r
);
2639 if (NT_STATUS_IS_ERR(status
)) {
2643 /* Return variables */
2646 return r
.out
.result
;
2649 NTSTATUS
rpccli_lsa_CREDRREAD(struct rpc_pipe_client
*cli
,
2650 TALLOC_CTX
*mem_ctx
)
2652 struct lsa_CREDRREAD r
;
2657 if (DEBUGLEVEL
>= 10) {
2658 NDR_PRINT_IN_DEBUG(lsa_CREDRREAD
, &r
);
2661 status
= cli_do_rpc_ndr(cli
,
2668 if (!NT_STATUS_IS_OK(status
)) {
2672 if (DEBUGLEVEL
>= 10) {
2673 NDR_PRINT_OUT_DEBUG(lsa_CREDRREAD
, &r
);
2676 if (NT_STATUS_IS_ERR(status
)) {
2680 /* Return variables */
2683 return r
.out
.result
;
2686 NTSTATUS
rpccli_lsa_CREDRENUMERATE(struct rpc_pipe_client
*cli
,
2687 TALLOC_CTX
*mem_ctx
)
2689 struct lsa_CREDRENUMERATE r
;
2694 if (DEBUGLEVEL
>= 10) {
2695 NDR_PRINT_IN_DEBUG(lsa_CREDRENUMERATE
, &r
);
2698 status
= cli_do_rpc_ndr(cli
,
2702 NDR_LSA_CREDRENUMERATE
,
2705 if (!NT_STATUS_IS_OK(status
)) {
2709 if (DEBUGLEVEL
>= 10) {
2710 NDR_PRINT_OUT_DEBUG(lsa_CREDRENUMERATE
, &r
);
2713 if (NT_STATUS_IS_ERR(status
)) {
2717 /* Return variables */
2720 return r
.out
.result
;
2723 NTSTATUS
rpccli_lsa_CREDRWRITEDOMAINCREDENTIALS(struct rpc_pipe_client
*cli
,
2724 TALLOC_CTX
*mem_ctx
)
2726 struct lsa_CREDRWRITEDOMAINCREDENTIALS r
;
2731 if (DEBUGLEVEL
>= 10) {
2732 NDR_PRINT_IN_DEBUG(lsa_CREDRWRITEDOMAINCREDENTIALS
, &r
);
2735 status
= cli_do_rpc_ndr(cli
,
2739 NDR_LSA_CREDRWRITEDOMAINCREDENTIALS
,
2742 if (!NT_STATUS_IS_OK(status
)) {
2746 if (DEBUGLEVEL
>= 10) {
2747 NDR_PRINT_OUT_DEBUG(lsa_CREDRWRITEDOMAINCREDENTIALS
, &r
);
2750 if (NT_STATUS_IS_ERR(status
)) {
2754 /* Return variables */
2757 return r
.out
.result
;
2760 NTSTATUS
rpccli_lsa_CREDRREADDOMAINCREDENTIALS(struct rpc_pipe_client
*cli
,
2761 TALLOC_CTX
*mem_ctx
)
2763 struct lsa_CREDRREADDOMAINCREDENTIALS r
;
2768 if (DEBUGLEVEL
>= 10) {
2769 NDR_PRINT_IN_DEBUG(lsa_CREDRREADDOMAINCREDENTIALS
, &r
);
2772 status
= cli_do_rpc_ndr(cli
,
2776 NDR_LSA_CREDRREADDOMAINCREDENTIALS
,
2779 if (!NT_STATUS_IS_OK(status
)) {
2783 if (DEBUGLEVEL
>= 10) {
2784 NDR_PRINT_OUT_DEBUG(lsa_CREDRREADDOMAINCREDENTIALS
, &r
);
2787 if (NT_STATUS_IS_ERR(status
)) {
2791 /* Return variables */
2794 return r
.out
.result
;
2797 NTSTATUS
rpccli_lsa_CREDRDELETE(struct rpc_pipe_client
*cli
,
2798 TALLOC_CTX
*mem_ctx
)
2800 struct lsa_CREDRDELETE r
;
2805 if (DEBUGLEVEL
>= 10) {
2806 NDR_PRINT_IN_DEBUG(lsa_CREDRDELETE
, &r
);
2809 status
= cli_do_rpc_ndr(cli
,
2813 NDR_LSA_CREDRDELETE
,
2816 if (!NT_STATUS_IS_OK(status
)) {
2820 if (DEBUGLEVEL
>= 10) {
2821 NDR_PRINT_OUT_DEBUG(lsa_CREDRDELETE
, &r
);
2824 if (NT_STATUS_IS_ERR(status
)) {
2828 /* Return variables */
2831 return r
.out
.result
;
2834 NTSTATUS
rpccli_lsa_CREDRGETTARGETINFO(struct rpc_pipe_client
*cli
,
2835 TALLOC_CTX
*mem_ctx
)
2837 struct lsa_CREDRGETTARGETINFO r
;
2842 if (DEBUGLEVEL
>= 10) {
2843 NDR_PRINT_IN_DEBUG(lsa_CREDRGETTARGETINFO
, &r
);
2846 status
= cli_do_rpc_ndr(cli
,
2850 NDR_LSA_CREDRGETTARGETINFO
,
2853 if (!NT_STATUS_IS_OK(status
)) {
2857 if (DEBUGLEVEL
>= 10) {
2858 NDR_PRINT_OUT_DEBUG(lsa_CREDRGETTARGETINFO
, &r
);
2861 if (NT_STATUS_IS_ERR(status
)) {
2865 /* Return variables */
2868 return r
.out
.result
;
2871 NTSTATUS
rpccli_lsa_CREDRPROFILELOADED(struct rpc_pipe_client
*cli
,
2872 TALLOC_CTX
*mem_ctx
)
2874 struct lsa_CREDRPROFILELOADED r
;
2879 if (DEBUGLEVEL
>= 10) {
2880 NDR_PRINT_IN_DEBUG(lsa_CREDRPROFILELOADED
, &r
);
2883 status
= cli_do_rpc_ndr(cli
,
2887 NDR_LSA_CREDRPROFILELOADED
,
2890 if (!NT_STATUS_IS_OK(status
)) {
2894 if (DEBUGLEVEL
>= 10) {
2895 NDR_PRINT_OUT_DEBUG(lsa_CREDRPROFILELOADED
, &r
);
2898 if (NT_STATUS_IS_ERR(status
)) {
2902 /* Return variables */
2905 return r
.out
.result
;
2908 NTSTATUS
rpccli_lsa_LookupNames3(struct rpc_pipe_client
*cli
,
2909 TALLOC_CTX
*mem_ctx
,
2910 struct policy_handle
*handle
/* [in] [ref] */,
2911 uint32_t num_names
/* [in] [range(0,1000)] */,
2912 struct lsa_String
*names
/* [in] [size_is(num_names)] */,
2913 struct lsa_RefDomainList
**domains
/* [out] [ref] */,
2914 struct lsa_TransSidArray3
*sids
/* [in,out] [ref] */,
2915 enum lsa_LookupNamesLevel level
/* [in] */,
2916 uint32_t *count
/* [in,out] [ref] */,
2917 uint32_t unknown1
/* [in] */,
2918 uint32_t unknown2
/* [in] */)
2920 struct lsa_LookupNames3 r
;
2924 r
.in
.handle
= handle
;
2925 r
.in
.num_names
= num_names
;
2930 r
.in
.unknown1
= unknown1
;
2931 r
.in
.unknown2
= unknown2
;
2933 if (DEBUGLEVEL
>= 10) {
2934 NDR_PRINT_IN_DEBUG(lsa_LookupNames3
, &r
);
2937 status
= cli_do_rpc_ndr(cli
,
2941 NDR_LSA_LOOKUPNAMES3
,
2944 if (!NT_STATUS_IS_OK(status
)) {
2948 if (DEBUGLEVEL
>= 10) {
2949 NDR_PRINT_OUT_DEBUG(lsa_LookupNames3
, &r
);
2952 if (NT_STATUS_IS_ERR(status
)) {
2956 /* Return variables */
2957 *domains
= *r
.out
.domains
;
2958 *sids
= *r
.out
.sids
;
2959 *count
= *r
.out
.count
;
2962 return r
.out
.result
;
2965 NTSTATUS
rpccli_lsa_CREDRGETSESSIONTYPES(struct rpc_pipe_client
*cli
,
2966 TALLOC_CTX
*mem_ctx
)
2968 struct lsa_CREDRGETSESSIONTYPES r
;
2973 if (DEBUGLEVEL
>= 10) {
2974 NDR_PRINT_IN_DEBUG(lsa_CREDRGETSESSIONTYPES
, &r
);
2977 status
= cli_do_rpc_ndr(cli
,
2981 NDR_LSA_CREDRGETSESSIONTYPES
,
2984 if (!NT_STATUS_IS_OK(status
)) {
2988 if (DEBUGLEVEL
>= 10) {
2989 NDR_PRINT_OUT_DEBUG(lsa_CREDRGETSESSIONTYPES
, &r
);
2992 if (NT_STATUS_IS_ERR(status
)) {
2996 /* Return variables */
2999 return r
.out
.result
;
3002 NTSTATUS
rpccli_lsa_LSARREGISTERAUDITEVENT(struct rpc_pipe_client
*cli
,
3003 TALLOC_CTX
*mem_ctx
)
3005 struct lsa_LSARREGISTERAUDITEVENT r
;
3010 if (DEBUGLEVEL
>= 10) {
3011 NDR_PRINT_IN_DEBUG(lsa_LSARREGISTERAUDITEVENT
, &r
);
3014 status
= cli_do_rpc_ndr(cli
,
3018 NDR_LSA_LSARREGISTERAUDITEVENT
,
3021 if (!NT_STATUS_IS_OK(status
)) {
3025 if (DEBUGLEVEL
>= 10) {
3026 NDR_PRINT_OUT_DEBUG(lsa_LSARREGISTERAUDITEVENT
, &r
);
3029 if (NT_STATUS_IS_ERR(status
)) {
3033 /* Return variables */
3036 return r
.out
.result
;
3039 NTSTATUS
rpccli_lsa_LSARGENAUDITEVENT(struct rpc_pipe_client
*cli
,
3040 TALLOC_CTX
*mem_ctx
)
3042 struct lsa_LSARGENAUDITEVENT r
;
3047 if (DEBUGLEVEL
>= 10) {
3048 NDR_PRINT_IN_DEBUG(lsa_LSARGENAUDITEVENT
, &r
);
3051 status
= cli_do_rpc_ndr(cli
,
3055 NDR_LSA_LSARGENAUDITEVENT
,
3058 if (!NT_STATUS_IS_OK(status
)) {
3062 if (DEBUGLEVEL
>= 10) {
3063 NDR_PRINT_OUT_DEBUG(lsa_LSARGENAUDITEVENT
, &r
);
3066 if (NT_STATUS_IS_ERR(status
)) {
3070 /* Return variables */
3073 return r
.out
.result
;
3076 NTSTATUS
rpccli_lsa_LSARUNREGISTERAUDITEVENT(struct rpc_pipe_client
*cli
,
3077 TALLOC_CTX
*mem_ctx
)
3079 struct lsa_LSARUNREGISTERAUDITEVENT r
;
3084 if (DEBUGLEVEL
>= 10) {
3085 NDR_PRINT_IN_DEBUG(lsa_LSARUNREGISTERAUDITEVENT
, &r
);
3088 status
= cli_do_rpc_ndr(cli
,
3092 NDR_LSA_LSARUNREGISTERAUDITEVENT
,
3095 if (!NT_STATUS_IS_OK(status
)) {
3099 if (DEBUGLEVEL
>= 10) {
3100 NDR_PRINT_OUT_DEBUG(lsa_LSARUNREGISTERAUDITEVENT
, &r
);
3103 if (NT_STATUS_IS_ERR(status
)) {
3107 /* Return variables */
3110 return r
.out
.result
;
3113 NTSTATUS
rpccli_lsa_lsaRQueryForestTrustInformation(struct rpc_pipe_client
*cli
,
3114 TALLOC_CTX
*mem_ctx
,
3115 struct policy_handle
*handle
/* [in] [ref] */,
3116 struct lsa_String
*trusted_domain_name
/* [in] [ref] */,
3117 uint16_t unknown
/* [in] */,
3118 struct lsa_ForestTrustInformation
**forest_trust_info
/* [out] [ref] */)
3120 struct lsa_lsaRQueryForestTrustInformation r
;
3124 r
.in
.handle
= handle
;
3125 r
.in
.trusted_domain_name
= trusted_domain_name
;
3126 r
.in
.unknown
= unknown
;
3128 if (DEBUGLEVEL
>= 10) {
3129 NDR_PRINT_IN_DEBUG(lsa_lsaRQueryForestTrustInformation
, &r
);
3132 status
= cli_do_rpc_ndr(cli
,
3136 NDR_LSA_LSARQUERYFORESTTRUSTINFORMATION
,
3139 if (!NT_STATUS_IS_OK(status
)) {
3143 if (DEBUGLEVEL
>= 10) {
3144 NDR_PRINT_OUT_DEBUG(lsa_lsaRQueryForestTrustInformation
, &r
);
3147 if (NT_STATUS_IS_ERR(status
)) {
3151 /* Return variables */
3152 *forest_trust_info
= *r
.out
.forest_trust_info
;
3155 return r
.out
.result
;
3158 NTSTATUS
rpccli_lsa_LSARSETFORESTTRUSTINFORMATION(struct rpc_pipe_client
*cli
,
3159 TALLOC_CTX
*mem_ctx
)
3161 struct lsa_LSARSETFORESTTRUSTINFORMATION r
;
3166 if (DEBUGLEVEL
>= 10) {
3167 NDR_PRINT_IN_DEBUG(lsa_LSARSETFORESTTRUSTINFORMATION
, &r
);
3170 status
= cli_do_rpc_ndr(cli
,
3174 NDR_LSA_LSARSETFORESTTRUSTINFORMATION
,
3177 if (!NT_STATUS_IS_OK(status
)) {
3181 if (DEBUGLEVEL
>= 10) {
3182 NDR_PRINT_OUT_DEBUG(lsa_LSARSETFORESTTRUSTINFORMATION
, &r
);
3185 if (NT_STATUS_IS_ERR(status
)) {
3189 /* Return variables */
3192 return r
.out
.result
;
3195 NTSTATUS
rpccli_lsa_CREDRRENAME(struct rpc_pipe_client
*cli
,
3196 TALLOC_CTX
*mem_ctx
)
3198 struct lsa_CREDRRENAME r
;
3203 if (DEBUGLEVEL
>= 10) {
3204 NDR_PRINT_IN_DEBUG(lsa_CREDRRENAME
, &r
);
3207 status
= cli_do_rpc_ndr(cli
,
3211 NDR_LSA_CREDRRENAME
,
3214 if (!NT_STATUS_IS_OK(status
)) {
3218 if (DEBUGLEVEL
>= 10) {
3219 NDR_PRINT_OUT_DEBUG(lsa_CREDRRENAME
, &r
);
3222 if (NT_STATUS_IS_ERR(status
)) {
3226 /* Return variables */
3229 return r
.out
.result
;
3232 NTSTATUS
rpccli_lsa_LookupSids3(struct rpc_pipe_client
*cli
,
3233 TALLOC_CTX
*mem_ctx
,
3234 struct lsa_SidArray
*sids
/* [in] [ref] */,
3235 struct lsa_RefDomainList
**domains
/* [out] [ref] */,
3236 struct lsa_TransNameArray2
*names
/* [in,out] [ref] */,
3237 uint16_t level
/* [in] */,
3238 uint32_t *count
/* [in,out] [ref] */,
3239 uint32_t unknown1
/* [in] */,
3240 uint32_t unknown2
/* [in] */)
3242 struct lsa_LookupSids3 r
;
3250 r
.in
.unknown1
= unknown1
;
3251 r
.in
.unknown2
= unknown2
;
3253 if (DEBUGLEVEL
>= 10) {
3254 NDR_PRINT_IN_DEBUG(lsa_LookupSids3
, &r
);
3257 status
= cli_do_rpc_ndr(cli
,
3261 NDR_LSA_LOOKUPSIDS3
,
3264 if (!NT_STATUS_IS_OK(status
)) {
3268 if (DEBUGLEVEL
>= 10) {
3269 NDR_PRINT_OUT_DEBUG(lsa_LookupSids3
, &r
);
3272 if (NT_STATUS_IS_ERR(status
)) {
3276 /* Return variables */
3277 *domains
= *r
.out
.domains
;
3278 *names
= *r
.out
.names
;
3279 *count
= *r
.out
.count
;
3282 return r
.out
.result
;
3285 NTSTATUS
rpccli_lsa_LookupNames4(struct rpc_pipe_client
*cli
,
3286 TALLOC_CTX
*mem_ctx
,
3287 uint32_t num_names
/* [in] [range(0,1000)] */,
3288 struct lsa_String
*names
/* [in] [size_is(num_names)] */,
3289 struct lsa_RefDomainList
**domains
/* [out] [ref] */,
3290 struct lsa_TransSidArray3
*sids
/* [in,out] [ref] */,
3291 enum lsa_LookupNamesLevel level
/* [in] */,
3292 uint32_t *count
/* [in,out] [ref] */,
3293 uint32_t unknown1
/* [in] */,
3294 uint32_t unknown2
/* [in] */)
3296 struct lsa_LookupNames4 r
;
3300 r
.in
.num_names
= num_names
;
3305 r
.in
.unknown1
= unknown1
;
3306 r
.in
.unknown2
= unknown2
;
3308 if (DEBUGLEVEL
>= 10) {
3309 NDR_PRINT_IN_DEBUG(lsa_LookupNames4
, &r
);
3312 status
= cli_do_rpc_ndr(cli
,
3316 NDR_LSA_LOOKUPNAMES4
,
3319 if (!NT_STATUS_IS_OK(status
)) {
3323 if (DEBUGLEVEL
>= 10) {
3324 NDR_PRINT_OUT_DEBUG(lsa_LookupNames4
, &r
);
3327 if (NT_STATUS_IS_ERR(status
)) {
3331 /* Return variables */
3332 *domains
= *r
.out
.domains
;
3333 *sids
= *r
.out
.sids
;
3334 *count
= *r
.out
.count
;
3337 return r
.out
.result
;
3340 NTSTATUS
rpccli_lsa_LSAROPENPOLICYSCE(struct rpc_pipe_client
*cli
,
3341 TALLOC_CTX
*mem_ctx
)
3343 struct lsa_LSAROPENPOLICYSCE r
;
3348 if (DEBUGLEVEL
>= 10) {
3349 NDR_PRINT_IN_DEBUG(lsa_LSAROPENPOLICYSCE
, &r
);
3352 status
= cli_do_rpc_ndr(cli
,
3356 NDR_LSA_LSAROPENPOLICYSCE
,
3359 if (!NT_STATUS_IS_OK(status
)) {
3363 if (DEBUGLEVEL
>= 10) {
3364 NDR_PRINT_OUT_DEBUG(lsa_LSAROPENPOLICYSCE
, &r
);
3367 if (NT_STATUS_IS_ERR(status
)) {
3371 /* Return variables */
3374 return r
.out
.result
;
3377 NTSTATUS
rpccli_lsa_LSARADTREGISTERSECURITYEVENTSOURCE(struct rpc_pipe_client
*cli
,
3378 TALLOC_CTX
*mem_ctx
)
3380 struct lsa_LSARADTREGISTERSECURITYEVENTSOURCE r
;
3385 if (DEBUGLEVEL
>= 10) {
3386 NDR_PRINT_IN_DEBUG(lsa_LSARADTREGISTERSECURITYEVENTSOURCE
, &r
);
3389 status
= cli_do_rpc_ndr(cli
,
3393 NDR_LSA_LSARADTREGISTERSECURITYEVENTSOURCE
,
3396 if (!NT_STATUS_IS_OK(status
)) {
3400 if (DEBUGLEVEL
>= 10) {
3401 NDR_PRINT_OUT_DEBUG(lsa_LSARADTREGISTERSECURITYEVENTSOURCE
, &r
);
3404 if (NT_STATUS_IS_ERR(status
)) {
3408 /* Return variables */
3411 return r
.out
.result
;
3414 NTSTATUS
rpccli_lsa_LSARADTUNREGISTERSECURITYEVENTSOURCE(struct rpc_pipe_client
*cli
,
3415 TALLOC_CTX
*mem_ctx
)
3417 struct lsa_LSARADTUNREGISTERSECURITYEVENTSOURCE r
;
3422 if (DEBUGLEVEL
>= 10) {
3423 NDR_PRINT_IN_DEBUG(lsa_LSARADTUNREGISTERSECURITYEVENTSOURCE
, &r
);
3426 status
= cli_do_rpc_ndr(cli
,
3430 NDR_LSA_LSARADTUNREGISTERSECURITYEVENTSOURCE
,
3433 if (!NT_STATUS_IS_OK(status
)) {
3437 if (DEBUGLEVEL
>= 10) {
3438 NDR_PRINT_OUT_DEBUG(lsa_LSARADTUNREGISTERSECURITYEVENTSOURCE
, &r
);
3441 if (NT_STATUS_IS_ERR(status
)) {
3445 /* Return variables */
3448 return r
.out
.result
;
3451 NTSTATUS
rpccli_lsa_LSARADTREPORTSECURITYEVENT(struct rpc_pipe_client
*cli
,
3452 TALLOC_CTX
*mem_ctx
)
3454 struct lsa_LSARADTREPORTSECURITYEVENT r
;
3459 if (DEBUGLEVEL
>= 10) {
3460 NDR_PRINT_IN_DEBUG(lsa_LSARADTREPORTSECURITYEVENT
, &r
);
3463 status
= cli_do_rpc_ndr(cli
,
3467 NDR_LSA_LSARADTREPORTSECURITYEVENT
,
3470 if (!NT_STATUS_IS_OK(status
)) {
3474 if (DEBUGLEVEL
>= 10) {
3475 NDR_PRINT_OUT_DEBUG(lsa_LSARADTREPORTSECURITYEVENT
, &r
);
3478 if (NT_STATUS_IS_ERR(status
)) {
3482 /* Return variables */
3485 return r
.out
.result
;