3 much of this was derived from the ethereal sources - thanks to everyone
7 import "misc.idl", "lsa.idl", "samr.idl", "security.idl", "nbt.idl";
12 uuid("12345678-1234-abcd-ef00-01234567cffb"),
14 endpoint("ncacn_np:[\\pipe\\netlogon]","ncacn_ip_tcp:","ncalrpc:"),
15 pointer_default(unique)
20 typedef bitmap samr_AcctFlags samr_AcctFlags;
21 typedef bitmap samr_GroupAttrs samr_GroupAttrs;
27 [string,charset(UTF16)] uint16 *account_name;
38 time_t pw_must_change;
39 [string,charset(UTF16)] uint16 *computer;
40 [string,charset(UTF16)] uint16 *domain;
41 [string,charset(UTF16)] uint16 *script_path;
45 WERROR netr_LogonUasLogon(
46 [in,unique] [string,charset(UTF16)] uint16 *server_name,
47 [in] [string,charset(UTF16)] uint16 account_name[],
48 [in] [string,charset(UTF16)] uint16 workstation[],
49 [out,ref] netr_UasInfo **info
61 WERROR netr_LogonUasLogoff(
62 [in,unique] [string,charset(UTF16)] uint16 *server_name,
63 [in] [string,charset(UTF16)] uint16 account_name[],
64 [in] [string,charset(UTF16)] uint16 workstation[],
65 [out,ref] netr_UasLogoffInfo *info
72 /* in netr_AcctLockStr size seems to be be 24, and rrenard thinks
73 that the structure of the bindata looks like this:
75 dlong lockout_duration;
77 uint32 bad_attempt_lockout;
80 but it doesn't look as though this structure is reflected at the
81 NDR level. Maybe it is left to the application to decode the bindata array.
83 typedef [public] struct {
84 dlong lockout_duration;
86 uint32 bad_attempt_lockout;
90 /* - MSV1_0_ALLOW_SERVER_TRUST_ACCOUNT
91 * sets the NETLOGON_SERVER_TRUST_ACCOUNT user_flag
92 * - MSV1_0_UPDATE_LOGON_STATISTICS
93 * sets the logon time on network logon
94 * - MSV1_0_RETURN_USER_PARAMETERS
95 * sets the user parameters in the driveletter
96 * - MSV1_0_RETURN_PROFILE_PATH
97 * returns the profilepath in the driveletter and
98 * sets LOGON_PROFILE_PATH_RETURNED user_flag
101 typedef [public,bitmap32bit] bitmap {
102 MSV1_0_CLEARTEXT_PASSWORD_ALLOWED = 0x00000002,
103 MSV1_0_UPDATE_LOGON_STATISTICS = 0x00000004,
104 MSV1_0_RETURN_USER_PARAMETERS = 0x00000008,
105 MSV1_0_ALLOW_SERVER_TRUST_ACCOUNT = 0x00000020,
106 MSV1_0_RETURN_PROFILE_PATH = 0x00000200,
107 MSV1_0_ALLOW_WORKSTATION_TRUST_ACCOUNT = 0x00000800
108 } netr_LogonParameterControl;
111 lsa_String domain_name;
112 netr_LogonParameterControl parameter_control; /* see MSV1_0_* */
114 uint32 logon_id_high;
115 lsa_String account_name;
116 lsa_String workstation;
120 netr_IdentityInfo identity_info;
121 samr_Password lmpassword;
122 samr_Password ntpassword;
125 typedef [flag(NDR_PAHEX)] struct {
127 [value(length)] uint16 size;
128 [size_is(length),length_is(length)] uint8 *data;
129 } netr_ChallengeResponse;
131 typedef [flag(NDR_PAHEX)] struct {
132 netr_IdentityInfo identity_info;
134 netr_ChallengeResponse nt;
135 netr_ChallengeResponse lm;
138 typedef [flag(NDR_PAHEX)] struct {
139 netr_IdentityInfo identity_info;
140 lsa_String package_name;
142 [size_is(length)] uint8 *data;
146 NetlogonInteractiveInformation = 1,
147 NetlogonNetworkInformation = 2,
148 NetlogonServiceInformation = 3,
149 NetlogonGenericInformation = 4,
150 NetlogonInteractiveTransitiveInformation = 5,
151 NetlogonNetworkTransitiveInformation = 6,
152 NetlogonServiceTransitiveInformation = 7
153 } netr_LogonInfoClass;
155 typedef [public,switch_type(netr_LogonInfoClass)] union {
156 [case(NetlogonInteractiveInformation)] netr_PasswordInfo *password;
157 [case(NetlogonNetworkInformation)] netr_NetworkInfo *network;
158 [case(NetlogonServiceInformation)] netr_PasswordInfo *password;
159 [case(NetlogonGenericInformation)] netr_GenericInfo *generic;
160 [case(NetlogonInteractiveTransitiveInformation)] netr_PasswordInfo *password;
161 [case(NetlogonNetworkTransitiveInformation)] netr_NetworkInfo *network;
162 [case(NetlogonServiceTransitiveInformation)] netr_PasswordInfo *password;
165 typedef [public,flag(NDR_PAHEX)] struct {
167 } netr_UserSessionKey;
169 typedef [public,flag(NDR_PAHEX)] struct {
173 /* Flags for user_flags below */
174 typedef [public,bitmap32bit] bitmap {
175 NETLOGON_GUEST = 0x00000001,
176 NETLOGON_NOENCRYPTION = 0x00000002,
177 NETLOGON_CACHED_ACCOUNT = 0x00000004,
178 NETLOGON_USED_LM_PASSWORD = 0x00000008,
179 NETLOGON_EXTRA_SIDS = 0x00000020,
180 NETLOGON_SUBAUTH_SESSION_KEY = 0x00000040,
181 NETLOGON_SERVER_TRUST_ACCOUNT = 0x00000080,
182 NETLOGON_NTLMV2_ENABLED = 0x00000100,
183 NETLOGON_RESOURCE_GROUPS = 0x00000200,
184 NETLOGON_PROFILE_PATH_RETURNED = 0x00000400,
185 NETLOGON_GRACE_LOGON = 0x01000000
192 NTTIME last_password_change;
193 NTTIME allow_password_change;
194 NTTIME force_password_change;
195 lsa_String account_name;
196 lsa_String full_name;
197 lsa_String logon_script;
198 lsa_String profile_path;
199 lsa_String home_directory;
200 lsa_String home_drive;
202 uint16 bad_password_count;
205 samr_RidWithAttributeArray groups;
206 netr_UserFlags user_flags;
207 netr_UserSessionKey key;
208 lsa_StringLarge logon_server;
209 lsa_StringLarge domain;
210 dom_sid2 *domain_sid;
211 netr_LMSessionKey LMSessKey;
212 samr_AcctFlags acct_flags;
217 netr_SamBaseInfo base;
222 samr_GroupAttrs attributes;
225 typedef [public] struct {
226 netr_SamBaseInfo base;
228 [size_is(sidcount)] netr_SidAttr *sids;
232 netr_SamBaseInfo base;
234 [size_is(sidcount)] netr_SidAttr *sids;
236 lsa_String principle;
242 [size_is(pac_size)] uint8 *pac;
243 lsa_String logon_domain;
244 lsa_String logon_server;
245 lsa_String principal_name;
247 [size_is(auth_size)] uint8 *auth;
248 netr_UserSessionKey user_session_key;
249 uint32 expansionroom[10];
256 typedef [flag(NDR_PAHEX)] struct {
258 [size_is(length)] uint8 *data;
262 NetlogonValidationUasInfo = 1,
263 NetlogonValidationSamInfo = 2,
264 NetlogonValidationSamInfo2 = 3,
265 NetlogonValidationGenericInfo2 = 5,
266 NetlogonValidationSamInfo4 = 6
267 } netr_ValidationInfoClass;
269 typedef [public,switch_type(uint16)] union {
270 [case(NetlogonValidationSamInfo)] netr_SamInfo2 *sam2;
271 [case(NetlogonValidationSamInfo2)] netr_SamInfo3 *sam3;
272 [case(4)] netr_PacInfo *pac;
273 [case(NetlogonValidationGenericInfo2)] netr_GenericInfo2 *generic;
274 [case(NetlogonValidationSamInfo4)] netr_SamInfo6 *sam6;
277 typedef [public, flag(NDR_PAHEX)] struct {
281 typedef [public] struct {
282 netr_Credential cred;
284 } netr_Authenticator;
286 NTSTATUS netr_LogonSamLogon(
287 [in,unique] [string,charset(UTF16)] uint16 *server_name,
288 [in,unique] [string,charset(UTF16)] uint16 *computer_name,
289 [in,unique] netr_Authenticator *credential,
290 [in,out,unique] netr_Authenticator *return_authenticator,
291 [in] netr_LogonInfoClass logon_level,
292 [in,ref] [switch_is(logon_level)] netr_LogonLevel *logon,
293 [in] uint16 validation_level,
294 [out,ref] [switch_is(validation_level)] netr_Validation *validation,
295 [out,ref] uint8 *authoritative
302 NTSTATUS netr_LogonSamLogoff(
303 [in,unique] [string,charset(UTF16)] uint16 *server_name,
304 [in,unique] [string,charset(UTF16)] uint16 *computer_name,
305 [in,unique] netr_Authenticator *credential,
306 [in,out,unique] netr_Authenticator *return_authenticator,
307 [in] netr_LogonInfoClass logon_level,
308 [in] [switch_is(logon_level)] netr_LogonLevel logon
316 [public] NTSTATUS netr_ServerReqChallenge(
317 [in,unique,string,charset(UTF16)] uint16 *server_name,
318 [in,string,charset(UTF16)] uint16 computer_name[],
319 [in,ref] netr_Credential *credentials,
320 [out,ref] netr_Credential *return_credentials
327 typedef enum netr_SchannelType netr_SchannelType;
329 NTSTATUS netr_ServerAuthenticate(
330 [in,unique,string,charset(UTF16)] uint16 *server_name,
331 [in,string,charset(UTF16)] uint16 account_name[],
332 [in] netr_SchannelType secure_channel_type,
333 [in,string,charset(UTF16)] uint16 computer_name[],
334 [in,ref] netr_Credential *credentials,
335 [out,ref] netr_Credential *return_credentials
342 NTSTATUS netr_ServerPasswordSet(
343 [in,unique] [string,charset(UTF16)] uint16 *server_name,
344 [in] [string,charset(UTF16)] uint16 account_name[],
345 [in] netr_SchannelType secure_channel_type,
346 [in] [string,charset(UTF16)] uint16 computer_name[],
347 [in,ref] netr_Authenticator *credential,
348 [out,ref] netr_Authenticator *return_authenticator,
349 [in,ref] samr_Password *new_password
356 typedef enum netr_SamDatabaseID netr_SamDatabaseID;
359 [string,charset(UTF16)] uint16 *account_name;
368 } netr_DELTA_DELETE_USER;
372 [value(length)] uint16 size;
379 [value(nt_length)] uint16 nt_size;
382 [value(lm_length)] uint16 lm_size;
384 uint8 nt_history[nt_length];
385 uint8 lm_history[lm_length];
386 } netr_PasswordHistory;
389 netr_USER_KEY16 lmpassword;
390 netr_USER_KEY16 ntpassword;
391 netr_PasswordHistory history;
394 typedef struct { /* TODO: make this a union! */
395 netr_USER_KEYS2 keys2;
396 } netr_USER_KEY_UNION;
398 typedef [public] struct {
400 netr_USER_KEY_UNION keys;
404 boolean8 SensitiveDataFlag;
407 /* netr_USER_KEYS encrypted with the session key */
408 [size_is(DataLength)][flag(NDR_PAHEX)] uint8 *SensitiveData;
409 } netr_USER_PRIVATE_INFO;
412 lsa_String account_name;
413 lsa_String full_name;
416 lsa_String home_directory;
417 lsa_String home_drive;
418 lsa_String logon_script;
419 lsa_String description;
420 lsa_String workstations;
423 samr_LogonHours logon_hours;
424 uint16 bad_password_count;
426 NTTIME last_password_change;
428 samr_AcctFlags acct_flags;
429 samr_Password lmpassword;
430 samr_Password ntpassword;
431 boolean8 nt_password_present;
432 boolean8 lm_password_present;
433 boolean8 password_expired;
435 lsa_String parameters;
438 netr_USER_PRIVATE_INFO user_private_info;
439 uint32 SecurityInformation;
441 lsa_String profile_path;
452 lsa_String domain_name;
453 lsa_String oem_information; /* comment */
454 dlong force_logoff_time;
455 uint16 min_password_length;
456 uint16 password_history_length;
457 /* yes, these are signed. They are in negative 100ns */
458 dlong max_password_age;
459 dlong min_password_age;
461 NTTIME domain_create_time;
462 uint32 SecurityInformation;
464 lsa_BinaryString account_lockout;
468 uint32 logon_to_chgpass;
475 lsa_String group_name;
478 lsa_String description;
479 uint32 SecurityInformation;
505 [size_is(num_rids)] uint32 *rids;
506 [size_is(num_rids)] uint32 *attribs;
512 } netr_DELTA_GROUP_MEMBER;
515 lsa_String alias_name;
517 uint32 SecurityInformation;
519 lsa_String description;
535 } netr_DELTA_ALIAS_MEMBER;
538 uint32 pagedpoollimit;
539 uint32 nonpagedpoollimit;
540 uint32 minimumworkingsetsize;
541 uint32 maximumworkingsetsize;
542 uint32 pagefilelimit;
548 NTTIME auditretentionperiod;
549 boolean8 auditingmode;
550 uint32 maxauditeventcount;
551 [size_is(maxauditeventcount+1)] uint32 *eventauditoptions;
552 lsa_String primary_domain_name;
554 netr_QUOTA_LIMITS quota_limits;
556 NTTIME db_create_time;
557 uint32 SecurityInformation;
570 lsa_String domain_name;
571 uint32 num_controllers;
572 [size_is(num_controllers)] lsa_String *controller_names;
573 uint32 SecurityInformation;
583 } netr_DELTA_TRUSTED_DOMAIN;
587 } netr_DELTA_DELETE_TRUST;
590 uint32 privilege_entries;
591 uint32 privilege_control;
592 [size_is(privilege_entries)] uint32 *privilege_attrib;
593 [size_is(privilege_entries)] lsa_String *privilege_name;
594 netr_QUOTA_LIMITS quotalimits;
596 uint32 SecurityInformation;
606 } netr_DELTA_ACCOUNT;
610 } netr_DELTA_DELETE_ACCOUNT;
614 } netr_DELTA_DELETE_SECRET;
619 [size_is(maxlen)][length_is(len)] uint8 *cipher_data;
623 netr_CIPHER_VALUE current_cipher;
624 NTTIME current_cipher_set_time;
625 netr_CIPHER_VALUE old_cipher;
626 NTTIME old_cipher_set_time;
627 uint32 SecurityInformation;
640 NETR_DELTA_DOMAIN = 1,
641 NETR_DELTA_GROUP = 2,
642 NETR_DELTA_DELETE_GROUP = 3,
643 NETR_DELTA_RENAME_GROUP = 4,
645 NETR_DELTA_DELETE_USER = 6,
646 NETR_DELTA_RENAME_USER = 7,
647 NETR_DELTA_GROUP_MEMBER = 8,
648 NETR_DELTA_ALIAS = 9,
649 NETR_DELTA_DELETE_ALIAS = 10,
650 NETR_DELTA_RENAME_ALIAS = 11,
651 NETR_DELTA_ALIAS_MEMBER = 12,
652 NETR_DELTA_POLICY = 13,
653 NETR_DELTA_TRUSTED_DOMAIN = 14,
654 NETR_DELTA_DELETE_TRUST = 15,
655 NETR_DELTA_ACCOUNT = 16,
656 NETR_DELTA_DELETE_ACCOUNT = 17,
657 NETR_DELTA_SECRET = 18,
658 NETR_DELTA_DELETE_SECRET = 19,
659 NETR_DELTA_DELETE_GROUP2 = 20,
660 NETR_DELTA_DELETE_USER2 = 21,
661 NETR_DELTA_MODIFY_COUNT = 22
664 typedef [switch_type(netr_DeltaEnum)] union {
665 [case(NETR_DELTA_DOMAIN)] netr_DELTA_DOMAIN *domain;
666 [case(NETR_DELTA_GROUP)] netr_DELTA_GROUP *group;
667 [case(NETR_DELTA_DELETE_GROUP)] ; /* rid only */
668 [case(NETR_DELTA_RENAME_GROUP)] netr_DELTA_RENAME *rename_group;
669 [case(NETR_DELTA_USER)] netr_DELTA_USER *user;
670 [case(NETR_DELTA_DELETE_USER)] ; /* rid only */
671 [case(NETR_DELTA_RENAME_USER)] netr_DELTA_RENAME *rename_user;
672 [case(NETR_DELTA_GROUP_MEMBER)] netr_DELTA_GROUP_MEMBER *group_member;
673 [case(NETR_DELTA_ALIAS)] netr_DELTA_ALIAS *alias;
674 [case(NETR_DELTA_DELETE_ALIAS)] ; /* rid only */
675 [case(NETR_DELTA_RENAME_ALIAS)] netr_DELTA_RENAME *rename_alias;
676 [case(NETR_DELTA_ALIAS_MEMBER)] netr_DELTA_ALIAS_MEMBER *alias_member;
677 [case(NETR_DELTA_POLICY)] netr_DELTA_POLICY *policy;
678 [case(NETR_DELTA_TRUSTED_DOMAIN)] netr_DELTA_TRUSTED_DOMAIN *trusted_domain;
679 [case(NETR_DELTA_DELETE_TRUST)] netr_DELTA_DELETE_TRUST delete_trust;
680 [case(NETR_DELTA_ACCOUNT)] netr_DELTA_ACCOUNT *account;
681 [case(NETR_DELTA_DELETE_ACCOUNT)] netr_DELTA_DELETE_ACCOUNT delete_account;
682 [case(NETR_DELTA_SECRET)] netr_DELTA_SECRET *secret;
683 [case(NETR_DELTA_DELETE_SECRET)] netr_DELTA_DELETE_SECRET delete_secret;
684 [case(NETR_DELTA_DELETE_GROUP2)] netr_DELTA_DELETE_USER *delete_group;
685 [case(NETR_DELTA_DELETE_USER2)] netr_DELTA_DELETE_USER *delete_user;
686 [case(NETR_DELTA_MODIFY_COUNT)] udlong *modified_count;
689 typedef [switch_type(netr_DeltaEnum)] union {
690 [case(NETR_DELTA_DOMAIN)] uint32 rid;
691 [case(NETR_DELTA_GROUP)] uint32 rid;
692 [case(NETR_DELTA_DELETE_GROUP)] uint32 rid;
693 [case(NETR_DELTA_RENAME_GROUP)] uint32 rid;
694 [case(NETR_DELTA_USER)] uint32 rid;
695 [case(NETR_DELTA_DELETE_USER)] uint32 rid;
696 [case(NETR_DELTA_RENAME_USER)] uint32 rid;
697 [case(NETR_DELTA_GROUP_MEMBER)] uint32 rid;
698 [case(NETR_DELTA_ALIAS)] uint32 rid;
699 [case(NETR_DELTA_DELETE_ALIAS)] uint32 rid;
700 [case(NETR_DELTA_RENAME_ALIAS)] uint32 rid;
701 [case(NETR_DELTA_ALIAS_MEMBER)] uint32 rid;
702 [case(NETR_DELTA_POLICY)] dom_sid2 *sid;
703 [case(NETR_DELTA_TRUSTED_DOMAIN)] dom_sid2 *sid;
704 [case(NETR_DELTA_DELETE_TRUST)] dom_sid2 *sid;
705 [case(NETR_DELTA_ACCOUNT)] dom_sid2 *sid;
706 [case(NETR_DELTA_DELETE_ACCOUNT)] dom_sid2 *sid;
707 [case(NETR_DELTA_SECRET)] [string,charset(UTF16)] uint16 *name;
708 [case(NETR_DELTA_DELETE_SECRET)] [string,charset(UTF16)] uint16 *name;
709 [case(NETR_DELTA_DELETE_GROUP2)] uint32 rid;
710 [case(NETR_DELTA_DELETE_USER2)] uint32 rid;
711 [case(NETR_DELTA_MODIFY_COUNT)] ;
712 } netr_DELTA_ID_UNION;
715 netr_DeltaEnum delta_type;
716 [switch_is(delta_type)] netr_DELTA_ID_UNION delta_id_union;
717 [switch_is(delta_type)] netr_DELTA_UNION delta_union;
722 [size_is(num_deltas)] netr_DELTA_ENUM *delta_enum;
723 } netr_DELTA_ENUM_ARRAY;
726 NTSTATUS netr_DatabaseDeltas(
727 [in] [string,charset(UTF16)] uint16 logon_server[],
728 [in] [string,charset(UTF16)] uint16 computername[],
729 [in,ref] netr_Authenticator *credential,
730 [in,out,ref] netr_Authenticator *return_authenticator,
731 [in] netr_SamDatabaseID database_id,
732 [in,out,ref] udlong *sequence_num,
733 [out,ref] netr_DELTA_ENUM_ARRAY **delta_enum_array,
734 [in] uint32 preferredmaximumlength
741 NTSTATUS netr_DatabaseSync(
742 [in] [string,charset(UTF16)] uint16 logon_server[],
743 [in] [string,charset(UTF16)] uint16 computername[],
744 [in,ref] netr_Authenticator *credential,
745 [in,out,ref] netr_Authenticator *return_authenticator,
746 [in] netr_SamDatabaseID database_id,
747 [in,out,ref] uint32 *sync_context,
748 [out,ref] netr_DELTA_ENUM_ARRAY **delta_enum_array,
749 [in] uint32 preferredmaximumlength
756 /* w2k3 returns NT_STATUS_NOT_IMPLEMENTED for this call */
758 typedef [flag(NDR_PAHEX)] struct {
759 uint8 computer_name[16];
761 uint32 serial_number;
765 [flag(NDR_REMAINING)] DATA_BLOB blob;
766 } netr_AccountBuffer;
768 NTSTATUS netr_AccountDeltas(
769 [in,unique] [string,charset(UTF16)] uint16 *logon_server,
770 [in] [string,charset(UTF16)] uint16 computername[],
771 [in] netr_Authenticator credential,
772 [in,out,ref] netr_Authenticator *return_authenticator,
773 [in] netr_UAS_INFO_0 uas,
776 [in] uint32 buffersize,
777 [out,ref,subcontext(4)] netr_AccountBuffer *buffer,
778 [out,ref] uint32 *count_returned,
779 [out,ref] uint32 *total_entries,
780 [out,ref] netr_UAS_INFO_0 *recordid
787 NTSTATUS netr_AccountSync(
788 [in,unique] [string,charset(UTF16)] uint16 *logon_server,
789 [in] [string,charset(UTF16)] uint16 computername[],
790 [in] netr_Authenticator credential,
791 [in,out,ref] netr_Authenticator *return_authenticator,
792 [in] uint32 reference,
794 [in] uint32 buffersize,
795 [out,ref,subcontext(4)] netr_AccountBuffer *buffer,
796 [out,ref] uint32 *count_returned,
797 [out,ref] uint32 *total_entries,
798 [out,ref] uint32 *next_reference,
799 [in,out,ref] netr_UAS_INFO_0 *recordid
806 WERROR netr_GetDcName(
807 [in] [string,charset(UTF16)] uint16 logon_server[],
808 [in,unique] [string,charset(UTF16)] uint16 *domainname,
809 [out,ref] [string,charset(UTF16)] uint16 **dcname
815 typedef [bitmap32bit] bitmap {
816 NETLOGON_CTRL_REPL_NEEDED = 0x0001,
817 NETLOGON_CTRL_REPL_IN_PROGRESS = 0x0002,
818 NETLOGON_CTRL_REPL_FULL_SYNC = 0x0004
822 netr_InfoFlags flags;
823 uint32 pdc_connection_status;
824 } netr_NETLOGON_INFO_1;
827 netr_InfoFlags flags;
828 uint32 pdc_connection_status;
829 [string,charset(UTF16)] uint16 *trusted_dc_name;
830 uint32 tc_connection_status;
831 } netr_NETLOGON_INFO_2;
834 netr_InfoFlags flags;
835 uint32 logon_attempts;
841 } netr_NETLOGON_INFO_3;
844 [case(1)] netr_NETLOGON_INFO_1 *info1;
845 [case(2)] netr_NETLOGON_INFO_2 *info2;
846 [case(3)] netr_NETLOGON_INFO_3 *info3;
847 } netr_CONTROL_QUERY_INFORMATION;
849 /* function_code values */
850 typedef [v1_enum] enum {
851 NETLOGON_CONTROL_SYNC = 2,
852 NETLOGON_CONTROL_REDISCOVER = 5,
853 NETLOGON_CONTROL_TC_QUERY = 6,
854 NETLOGON_CONTROL_TRANSPORT_NOTIFY = 7,
855 NETLOGON_CONTROL_SET_DBFLAG = 65534
856 } netr_LogonControlCode;
858 WERROR netr_LogonControl(
859 [in,unique] [string,charset(UTF16)] uint16 *logon_server,
860 [in] netr_LogonControlCode function_code,
862 [out,ref,switch_is(level)] netr_CONTROL_QUERY_INFORMATION *info
869 WERROR netr_GetAnyDCName(
870 [in,unique] [string,charset(UTF16)] uint16 *logon_server,
871 [in,unique] [string,charset(UTF16)] uint16 *domainname,
872 [out,ref] [string,charset(UTF16)] uint16 **dcname
880 [case(NETLOGON_CONTROL_REDISCOVER)] [string,charset(UTF16)] uint16 *domain;
881 [case(NETLOGON_CONTROL_TC_QUERY)] [string,charset(UTF16)] uint16 *domain;
882 [case(NETLOGON_CONTROL_TRANSPORT_NOTIFY)] [string,charset(UTF16)] uint16 *domain;
883 [case(NETLOGON_CONTROL_SET_DBFLAG)] uint32 debug_level;
884 } netr_CONTROL_DATA_INFORMATION;
886 WERROR netr_LogonControl2(
887 [in,unique] [string,charset(UTF16)] uint16 *logon_server,
888 [in] netr_LogonControlCode function_code,
890 [in,ref][switch_is(function_code)] netr_CONTROL_DATA_INFORMATION *data,
891 [out,ref][switch_is(level)] netr_CONTROL_QUERY_INFORMATION *query
895 /* If NETLOGON_NEG_ARCFOUR flag is not set, then the passwords and LM
896 * session keys are encrypted with DES calls. (And the user session key
902 typedef [bitmap32bit] bitmap {
903 NETLOGON_NEG_ACCOUNT_LOCKOUT = 0x00000001,
904 NETLOGON_NEG_PERSISTENT_SAMREPL = 0x00000002,
905 NETLOGON_NEG_ARCFOUR = 0x00000004,
906 NETLOGON_NEG_PROMOTION_COUNT = 0x00000008,
907 NETLOGON_NEG_CHANGELOG_BDC = 0x00000010,
908 NETLOGON_NEG_FULL_SYNC_REPL = 0x00000020,
909 NETLOGON_NEG_MULTIPLE_SIDS = 0x00000040,
910 NETLOGON_NEG_REDO = 0x00000080,
911 NETLOGON_NEG_PASSWORD_CHANGE_REFUSAL = 0x00000100,
912 NETLOGON_NEG_SEND_PASSWORD_INFO_PDC = 0x00000200,
913 NETLOGON_NEG_GENERIC_PASSTHROUGH = 0x00000400,
914 NETLOGON_NEG_CONCURRENT_RPC = 0x00000800,
915 NETLOGON_NEG_AVOID_ACCOUNT_DB_REPL = 0x00001000,
916 NETLOGON_NEG_AVOID_SECURITYAUTH_DB_REPL = 0x00002000,
917 NETLOGON_NEG_128BIT = 0x00004000, /* STRONG_KEYS */
918 NETLOGON_NEG_TRANSITIVE_TRUSTS = 0x00008000,
919 NETLOGON_NEG_DNS_DOMAIN_TRUSTS = 0x00010000,
920 NETLOGON_NEG_PASSWORD_SET2 = 0x00020000,
921 NETLOGON_NEG_GETDOMAININFO = 0x00040000,
922 NETLOGON_NEG_CROSS_FOREST_TRUSTS = 0x00080000,
923 NETLOGON_NEG_NEUTRALIZE_NT4_EMULATION = 0x00100000,
924 NETLOGON_NEG_RODC_PASSTHROUGH = 0x00200000,
925 NETLOGON_NEG_AUTHENTICATED_RPC_LSASS = 0x20000000,
926 NETLOGON_NEG_SCHANNEL = 0x40000000 /* AUTHENTICATED_RPC */
927 } netr_NegotiateFlags;
929 NTSTATUS netr_ServerAuthenticate2(
930 [in,unique] [string,charset(UTF16)] uint16 *server_name,
931 [in] [string,charset(UTF16)] uint16 account_name[],
932 [in] netr_SchannelType secure_channel_type,
933 [in] [string,charset(UTF16)] uint16 computer_name[],
934 [in,ref] netr_Credential *credentials,
935 [out,ref] netr_Credential *return_credentials,
936 [in,out,ref] netr_NegotiateFlags *negotiate_flags
943 NTSTATUS netr_DatabaseSync2(
944 [in] [string,charset(UTF16)] uint16 logon_server[],
945 [in] [string,charset(UTF16)] uint16 computername[],
946 [in,ref] netr_Authenticator *credential,
947 [in,out,ref] netr_Authenticator *return_authenticator,
948 [in] netr_SamDatabaseID database_id,
949 [in] uint16 restart_state,
950 [in,out,ref] uint32 *sync_context,
951 [out,ref] netr_DELTA_ENUM_ARRAY **delta_enum_array,
952 [in] uint32 preferredmaximumlength
959 /* i'm not at all sure how this call works */
961 typedef [public] struct {
962 uint32 serial_number1;
963 uint32 serial_number2;
968 [value(ndr_size_dom_sid0(&object_sid, ndr->flags))] uint32 sid_size;
969 [subcontext(0),subcontext_size(sid_size)] dom_sid0 object_sid;
970 [string,charset(UTF16)] uint16 *object_name;
971 } netr_ChangeLogEntry;
973 NTSTATUS netr_DatabaseRedo(
974 [in] [string,charset(UTF16)] uint16 logon_server[],
975 [in] [string,charset(UTF16)] uint16 computername[],
976 [in] netr_Authenticator *credential,
977 [in,out,ref] netr_Authenticator *return_authenticator,
978 [in,ref][size_is(change_log_entry_size)] uint8 *change_log_entry,
979 [in] uint32 change_log_entry_size,
980 [out,ref] netr_DELTA_ENUM_ARRAY **delta_enum_array
987 WERROR netr_LogonControl2Ex(
988 [in,unique] [string,charset(UTF16)] uint16 *logon_server,
989 [in] uint32 function_code,
991 [in][switch_is(function_code)] netr_CONTROL_DATA_INFORMATION data,
992 [out,ref][switch_is(level)] netr_CONTROL_QUERY_INFORMATION *query
999 [size_is(length)] uint8 *data;
1002 WERROR netr_NetrEnumerateTrustedDomains(
1003 [in,unique] [string,charset(UTF16)] uint16 *server_name,
1004 [out,ref] netr_Blob *trusted_domains_blob
1010 /* one unkown bit still: DS_IP_VERSION_AGNOSTIC - gd*/
1012 const int DSGETDC_VALID_FLAGS = (DS_FORCE_REDISCOVERY |
1013 DS_DIRECTORY_SERVICE_REQUIRED |
1014 DS_DIRECTORY_SERVICE_PREFERRED |
1015 DS_GC_SERVER_REQUIRED |
1017 DS_BACKGROUND_ONLY |
1020 DS_TIMESERV_REQUIRED |
1021 DS_WRITABLE_REQUIRED |
1022 DS_GOOD_TIMESERV_PREFERRED |
1024 DS_ONLY_LDAP_NEEDED |
1027 DS_RETURN_FLAT_NAME |
1028 DS_RETURN_DNS_NAME);
1030 typedef [bitmap32bit] bitmap {
1031 DS_FORCE_REDISCOVERY = 0x00000001,
1032 DS_DIRECTORY_SERVICE_REQUIRED = 0x00000010,
1033 DS_DIRECTORY_SERVICE_PREFERRED = 0x00000020,
1034 DS_GC_SERVER_REQUIRED = 0x00000040,
1035 DS_PDC_REQUIRED = 0x00000080,
1036 DS_BACKGROUND_ONLY = 0x00000100,
1037 DS_IP_REQUIRED = 0x00000200,
1038 DS_KDC_REQUIRED = 0x00000400,
1039 DS_TIMESERV_REQUIRED = 0x00000800,
1040 DS_WRITABLE_REQUIRED = 0x00001000,
1041 DS_GOOD_TIMESERV_PREFERRED = 0x00002000,
1042 DS_AVOID_SELF = 0x00004000,
1043 DS_ONLY_LDAP_NEEDED = 0x00008000,
1044 DS_IS_FLAT_NAME = 0x00010000,
1045 DS_IS_DNS_NAME = 0x00020000,
1046 DS_TRY_NEXTCLOSEST_SITE = 0x00040000,
1047 DS_DIRECTORY_SERVICE_6_REQUIRED = 0x00080000,
1048 DS_RETURN_DNS_NAME = 0x40000000,
1049 DS_RETURN_FLAT_NAME = 0x80000000
1050 } netr_DsRGetDCName_flags;
1052 typedef [v1_enum] enum {
1053 DS_ADDRESS_TYPE_INET = 1,
1054 DS_ADDRESS_TYPE_NETBIOS = 2
1055 } netr_DsRGetDCNameInfo_AddressType;
1057 typedef [bitmap32bit] bitmap {
1058 DS_SERVER_PDC = NBT_SERVER_PDC,
1059 DS_SERVER_GC = NBT_SERVER_GC,
1060 DS_SERVER_LDAP = NBT_SERVER_LDAP,
1061 DS_SERVER_DS = NBT_SERVER_DS,
1062 DS_SERVER_KDC = NBT_SERVER_KDC,
1063 DS_SERVER_TIMESERV = NBT_SERVER_TIMESERV,
1064 DS_SERVER_CLOSEST = NBT_SERVER_CLOSEST,
1065 DS_SERVER_WRITABLE = NBT_SERVER_WRITABLE,
1066 DS_SERVER_GOOD_TIMESERV = NBT_SERVER_GOOD_TIMESERV,
1067 DS_SERVER_NDNC = NBT_SERVER_NDNC,
1068 DS_SERVER_SELECT_SECRET_DOMAIN_6 = NBT_SERVER_SELECT_SECRET_DOMAIN_6,
1069 DS_SERVER_FULL_SECRET_DOMAIN_6 = NBT_SERVER_FULL_SECRET_DOMAIN_6,
1070 DS_DNS_CONTROLLER = 0x20000000,
1071 DS_DNS_DOMAIN = 0x40000000,
1072 DS_DNS_FOREST = 0x80000000
1075 typedef [public] struct {
1076 [string,charset(UTF16)] uint16 *dc_unc;
1077 [string,charset(UTF16)] uint16 *dc_address;
1078 netr_DsRGetDCNameInfo_AddressType dc_address_type;
1080 [string,charset(UTF16)] uint16 *domain_name;
1081 [string,charset(UTF16)] uint16 *forest_name;
1082 netr_DsR_DcFlags dc_flags;
1083 [string,charset(UTF16)] uint16 *dc_site_name;
1084 [string,charset(UTF16)] uint16 *client_site_name;
1085 } netr_DsRGetDCNameInfo;
1087 WERROR netr_DsRGetDCName(
1088 [in,unique] [string,charset(UTF16)] uint16 *server_unc,
1089 [in,unique] [string,charset(UTF16)] uint16 *domain_name,
1090 [in,unique] GUID *domain_guid,
1091 [in,unique] GUID *site_guid,
1092 [in] netr_DsRGetDCName_flags flags,
1093 [out,ref] netr_DsRGetDCNameInfo **info
1098 [todo] WERROR netr_NETRLOGONDUMMYROUTINE1();
1102 [todo] WERROR netr_NETRLOGONSETSERVICEBITS();
1106 WERROR netr_LogonGetTrustRid(
1107 [in,unique] [string,charset(UTF16)] uint16 *server_name,
1108 [in,unique] [string,charset(UTF16)] uint16 *domain_name,
1109 [out,ref] uint32 *rid
1114 [todo] WERROR netr_NETRLOGONCOMPUTESERVERDIGEST();
1118 [todo] WERROR netr_NETRLOGONCOMPUTECLIENTDIGEST();
1122 [public] NTSTATUS netr_ServerAuthenticate3(
1123 [in,unique] [string,charset(UTF16)] uint16 *server_name,
1124 [in] [string,charset(UTF16)] uint16 account_name[],
1125 [in] netr_SchannelType secure_channel_type,
1126 [in] [string,charset(UTF16)] uint16 computer_name[],
1127 [in,ref] netr_Credential *credentials,
1128 [out,ref] netr_Credential *return_credentials,
1129 [in,out,ref] netr_NegotiateFlags *negotiate_flags,
1130 [out,ref] uint32 *rid
1136 WERROR netr_DsRGetDCNameEx(
1137 [in,unique] [string,charset(UTF16)] uint16 *server_unc,
1138 [in,unique] [string,charset(UTF16)] uint16 *domain_name,
1139 [in,unique] GUID *domain_guid,
1140 [in,unique] [string,charset(UTF16)] uint16 *site_name,
1141 [in] netr_DsRGetDCName_flags flags,
1142 [out,ref] netr_DsRGetDCNameInfo **info
1148 WERROR netr_DsRGetSiteName(
1149 [in,unique] [string,charset(UTF16)] uint16 *computer_name,
1150 [out,ref] [string,charset(UTF16)] uint16 **site
1155 typedef [bitmap32bit] bitmap {
1156 NETR_TRUST_FLAG_IN_FOREST = 0x00000001,
1157 NETR_TRUST_FLAG_OUTBOUND = 0x00000002,
1158 NETR_TRUST_FLAG_TREEROOT = 0x00000004,
1159 NETR_TRUST_FLAG_PRIMARY = 0x00000008,
1160 NETR_TRUST_FLAG_NATIVE = 0x00000010,
1161 NETR_TRUST_FLAG_INBOUND = 0x00000020,
1162 NETR_TRUST_FLAG_MIT_KRB5 = 0x00000080,
1163 NETR_TRUST_FLAG_AES = 0x00000100
1166 typedef [flag(NDR_PAHEX)] struct {
1169 [size_is(size/2),length_is(length/2)] uint16 *data;
1170 } netr_BinaryString;
1174 [string,charset(UTF16)] uint16 *workstation_domain;
1175 [string,charset(UTF16)] uint16 *workstation_site;
1176 [string,charset(UTF16)] uint16 *unknown1;
1177 [string,charset(UTF16)] uint16 *unknown2;
1178 [string,charset(UTF16)] uint16 *unknown3;
1179 [string,charset(UTF16)] uint16 *unknown4;
1180 netr_BinaryString blob2;
1182 lsa_String unknown5;
1183 lsa_String unknown6;
1185 } netr_DomainQuery1;
1188 [case(1)] netr_DomainQuery1 *query1;
1189 [case(2)] netr_DomainQuery1 *query1;
1193 /* these first 3 values come from the fact windows
1194 actually encodes this structure as a UNICODE_STRING
1195 - see MS-NRPC section 2.2.1.3.9 */
1196 [value(8)] uint32 length;
1197 [value(0)] uint32 dummy;
1198 [value(8)] uint32 size;
1199 netr_TrustFlags flags;
1200 uint32 parent_index;
1202 uint32 trust_attributes;
1203 } netr_trust_extension;
1206 uint16 length; /* value is 16 when info != NULL, otherwise 0 */
1207 [value(length)] uint16 size; /* value is 16 when info != NULL, otherwise 0 */
1208 netr_trust_extension *info;
1209 } netr_trust_extension_container;
1212 lsa_String domainname;
1213 lsa_String fulldomainname;
1217 netr_trust_extension_container trust_extension;
1218 lsa_String dummystring[3];
1220 } netr_DomainTrustInfo;
1224 [size_is(policy_size)] uint8 *policy;
1225 } netr_LsaPolicyInfo;
1227 typedef [public,bitmap32bit] bitmap {
1228 NETR_WS_FLAG_HANDLES_INBOUND_TRUSTS = 0x00000001,
1229 NETR_WS_FLAG_HANDLES_SPN_UPDATE = 0x00000002
1230 } netr_WorkstationFlags;
1233 netr_DomainTrustInfo domaininfo;
1235 [size_is(num_trusts)] netr_DomainTrustInfo *trusts;
1236 netr_LsaPolicyInfo lsa_policy;
1237 lsa_String dns_hostname;
1238 lsa_String dummystring[3];
1239 netr_WorkstationFlags workstation_flags;
1240 uint32 supported_enc_types;
1245 [case(1)] netr_DomainInfo1 *info1;
1246 [case(2)] netr_DomainInfo1 *info2;
1249 NTSTATUS netr_LogonGetDomainInfo(
1250 [in] [string,charset(UTF16)] uint16 server_name[],
1251 [in,unique] [string,charset(UTF16)] uint16 *computer_name,
1252 [in,ref] netr_Authenticator *credential,
1253 [in,out,ref] netr_Authenticator *return_authenticator,
1255 [in,switch_is(level)] netr_DomainQuery query,
1256 [out,ref,switch_is(level)] netr_DomainInfo *info
1259 typedef [flag(NDR_PAHEX)] struct {
1262 } netr_CryptPassword;
1266 NTSTATUS netr_ServerPasswordSet2(
1267 [in,unique] [string,charset(UTF16)] uint16 *server_name,
1268 [in] [string,charset(UTF16)] uint16 account_name[],
1269 [in] netr_SchannelType secure_channel_type,
1270 [in] [string,charset(UTF16)] uint16 computer_name[],
1271 [in,ref] netr_Authenticator *credential,
1272 [out,ref] netr_Authenticator *return_authenticator,
1273 [in,ref] netr_CryptPassword *new_password
1278 WERROR netr_ServerPasswordGet(
1279 [in,unique] [string,charset(UTF16)] uint16 *server_name,
1280 [in] [string,charset(UTF16)] uint16 account_name[],
1281 [in] netr_SchannelType secure_channel_type,
1282 [in] [string,charset(UTF16)] uint16 computer_name[],
1283 [in,ref] netr_Authenticator *credential,
1284 [out,ref] netr_Authenticator *return_authenticator,
1285 [out,ref] samr_Password *password
1290 [todo] WERROR netr_NETRLOGONSENDTOSAM();
1296 [size_is(count)] lsa_String *sitename;
1297 } netr_DsRAddressToSitenamesWCtr;
1300 [size_is(size)] uint8 *buffer;
1304 WERROR netr_DsRAddressToSitenamesW(
1305 [in,unique] [string,charset(UTF16)] uint16 *server_name,
1306 [in] [range(0,32000)] uint32 count,
1307 [in] [size_is(count)] [ref] netr_DsRAddress *addresses,
1308 [out] [ref] netr_DsRAddressToSitenamesWCtr **ctr
1313 WERROR netr_DsRGetDCNameEx2(
1314 [in,unique] [string,charset(UTF16)] uint16 *server_unc,
1315 [in,unique] [string,charset(UTF16)] uint16 *client_account,
1316 [in] samr_AcctFlags mask,
1317 [in,unique] [string,charset(UTF16)] uint16 *domain_name,
1318 [in,unique] GUID *domain_guid,
1319 [in,unique] [string,charset(UTF16)] uint16 *site_name,
1320 [in] netr_DsRGetDCName_flags flags,
1321 [out,ref] netr_DsRGetDCNameInfo **info
1326 [todo] WERROR netr_NETRLOGONGETTIMESERVICEPARENTDOMAIN();
1331 typedef [v1_enum] enum {
1332 NETR_TRUST_TYPE_DOWNLEVEL = 1,
1333 NETR_TRUST_TYPE_UPLEVEL = 2,
1334 NETR_TRUST_TYPE_MIT = 3,
1335 NETR_TRUST_TYPE_DCE = 4
1338 typedef [bitmap32bit] bitmap {
1339 NETR_TRUST_ATTRIBUTE_NON_TRANSITIVE = 0x00000001,
1340 NETR_TRUST_ATTRIBUTE_UPLEVEL_ONLY = 0x00000002,
1341 NETR_TRUST_ATTRIBUTE_QUARANTINED_DOMAIN = 0x00000004,
1342 NETR_TRUST_ATTRIBUTE_FOREST_TRANSITIVE = 0x00000008,
1343 NETR_TRUST_ATTRIBUTE_CROSS_ORGANIZATION = 0x00000010,
1344 NETR_TRUST_ATTRIBUTE_WITHIN_FOREST = 0x00000020,
1345 NETR_TRUST_ATTRIBUTE_TREAT_AS_EXTERNAL = 0x00000040
1346 } netr_TrustAttributes;
1349 [string,charset(UTF16)] uint16 *netbios_name;
1350 [string,charset(UTF16)] uint16 *dns_name;
1351 netr_TrustFlags trust_flags;
1352 uint32 parent_index;
1353 netr_TrustType trust_type;
1354 netr_TrustAttributes trust_attributes;
1361 [size_is(count)] netr_DomainTrust *array;
1362 } netr_DomainTrustList;
1364 WERROR netr_NetrEnumerateTrustedDomainsEx(
1365 [in,unique] [string,charset(UTF16)] uint16 *server_name,
1366 [out,ref] netr_DomainTrustList *dom_trust_list
1373 [size_is(count)] lsa_String *sitename;
1374 [size_is(count)] lsa_String *subnetname;
1375 } netr_DsRAddressToSitenamesExWCtr;
1377 WERROR netr_DsRAddressToSitenamesExW(
1378 [in,unique] [string,charset(UTF16)] uint16 *server_name,
1379 [in] [range(0,32000)] uint32 count,
1380 [in] [size_is(count)] [ref] netr_DsRAddress *addresses,
1381 [out] [ref] netr_DsRAddressToSitenamesExWCtr **ctr
1389 [size_is(num_sites)] [unique] lsa_String *sites;
1392 WERROR netr_DsrGetDcSiteCoverageW(
1393 [in,unique] [string,charset(UTF16)] uint16 *server_name,
1394 [out,ref] DcSitesCtr **ctr
1399 NTSTATUS netr_LogonSamLogonEx(
1400 [in,unique] [string,charset(UTF16)] uint16 *server_name,
1401 [in,unique] [string,charset(UTF16)] uint16 *computer_name,
1402 [in] netr_LogonInfoClass logon_level,
1403 [in,ref] [switch_is(logon_level)] netr_LogonLevel *logon,
1404 [in] uint16 validation_level,
1405 [out,ref] [switch_is(validation_level)] netr_Validation *validation,
1406 [out,ref] uint8 *authoritative,
1407 [in,out,ref] uint32 *flags
1413 WERROR netr_DsrEnumerateDomainTrusts(
1414 [in,unique] [string,charset(UTF16)] uint16 *server_name,
1415 [in] netr_TrustFlags trust_flags,
1416 [out,ref] netr_DomainTrustList *trusts
1422 WERROR netr_DsrDeregisterDNSHostRecords(
1423 [in,unique] [string,charset(UTF16)] uint16 *server_name,
1424 [in,unique] [string,charset(UTF16)] uint16 *domain,
1425 [in,unique] GUID *domain_guid,
1426 [in,unique] GUID *dsa_guid,
1427 [in,ref] [string,charset(UTF16)] uint16 *dns_host
1432 NTSTATUS netr_ServerTrustPasswordsGet(
1433 [in,unique] [string,charset(UTF16)] uint16 *server_name,
1434 [in] [string,charset(UTF16)] uint16 account_name[],
1435 [in] netr_SchannelType secure_channel_type,
1436 [in] [string,charset(UTF16)] uint16 computer_name[],
1437 [in,ref] netr_Authenticator *credential,
1438 [out,ref] netr_Authenticator *return_authenticator,
1439 [out,ref] samr_Password *password,
1440 [out,ref] samr_Password *password2
1446 const int DS_GFTI_UPDATE_TDO = 0x1;
1448 WERROR netr_DsRGetForestTrustInformation(
1449 [in,unique] [string,charset(UTF16)] uint16 *server_name,
1450 [in,unique] [string,charset(UTF16)] uint16 *trusted_domain_name,
1452 [out,ref] lsa_ForestTrustInformation **forest_trust_info
1457 WERROR netr_GetForestTrustInformation(
1458 [in,unique] [string,charset(UTF16)] uint16 *server_name,
1459 [in,ref] [string,charset(UTF16)] uint16 *trusted_domain_name,
1460 [in,ref] netr_Authenticator *credential,
1461 [out,ref] netr_Authenticator *return_authenticator,
1463 [out,ref] lsa_ForestTrustInformation **forest_trust_info
1469 /* this is the ADS varient. I don't yet know what the "flags" are for */
1470 NTSTATUS netr_LogonSamLogonWithFlags(
1471 [in,unique] [string,charset(UTF16)] uint16 *server_name,
1472 [in,unique] [string,charset(UTF16)] uint16 *computer_name,
1473 [in,unique] netr_Authenticator *credential,
1474 [in,out,unique] netr_Authenticator *return_authenticator,
1475 [in] netr_LogonInfoClass logon_level,
1476 [in,ref] [switch_is(logon_level)] netr_LogonLevel *logon,
1477 [in] uint16 validation_level,
1478 [out,ref] [switch_is(validation_level)] netr_Validation *validation,
1479 [out,ref] uint8 *authoritative,
1480 [in,out,ref] uint32 *flags
1485 [todo] WERROR netr_NETRSERVERGETTRUSTINFO();