2 * Unix SMB/CIFS implementation.
3 * client auto-generated by pidl. DO NOT MODIFY!
7 #include "../librpc/gen_ndr/cli_lsa.h"
9 NTSTATUS rpccli_lsa_Close(struct rpc_pipe_client *cli,
11 struct policy_handle *handle /* [in,out] [ref] */)
19 if (DEBUGLEVEL >= 10) {
20 NDR_PRINT_IN_DEBUG(lsa_Close, &r);
23 status = cli->dispatch(cli,
29 if (!NT_STATUS_IS_OK(status)) {
33 if (DEBUGLEVEL >= 10) {
34 NDR_PRINT_OUT_DEBUG(lsa_Close, &r);
37 if (NT_STATUS_IS_ERR(status)) {
41 /* Return variables */
42 *handle = *r.out.handle;
48 NTSTATUS rpccli_lsa_Delete(struct rpc_pipe_client *cli,
50 struct policy_handle *handle /* [in] [ref] */)
58 if (DEBUGLEVEL >= 10) {
59 NDR_PRINT_IN_DEBUG(lsa_Delete, &r);
62 status = cli->dispatch(cli,
68 if (!NT_STATUS_IS_OK(status)) {
72 if (DEBUGLEVEL >= 10) {
73 NDR_PRINT_OUT_DEBUG(lsa_Delete, &r);
76 if (NT_STATUS_IS_ERR(status)) {
80 /* Return variables */
86 NTSTATUS rpccli_lsa_EnumPrivs(struct rpc_pipe_client *cli,
88 struct policy_handle *handle /* [in] [ref] */,
89 uint32_t *resume_handle /* [in,out] [ref] */,
90 struct lsa_PrivArray *privs /* [out] [ref] */,
91 uint32_t max_count /* [in] */)
93 struct lsa_EnumPrivs r;
98 r.in.resume_handle = resume_handle;
99 r.in.max_count = max_count;
101 if (DEBUGLEVEL >= 10) {
102 NDR_PRINT_IN_DEBUG(lsa_EnumPrivs, &r);
105 status = cli->dispatch(cli,
111 if (!NT_STATUS_IS_OK(status)) {
115 if (DEBUGLEVEL >= 10) {
116 NDR_PRINT_OUT_DEBUG(lsa_EnumPrivs, &r);
119 if (NT_STATUS_IS_ERR(status)) {
123 /* Return variables */
124 *resume_handle = *r.out.resume_handle;
125 *privs = *r.out.privs;
131 NTSTATUS rpccli_lsa_QuerySecurity(struct rpc_pipe_client *cli,
133 struct policy_handle *handle /* [in] [ref] */,
134 uint32_t sec_info /* [in] */,
135 struct sec_desc_buf **sdbuf /* [out] [ref] */)
137 struct lsa_QuerySecurity r;
141 r.in.handle = handle;
142 r.in.sec_info = sec_info;
144 if (DEBUGLEVEL >= 10) {
145 NDR_PRINT_IN_DEBUG(lsa_QuerySecurity, &r);
148 status = cli->dispatch(cli,
151 NDR_LSA_QUERYSECURITY,
154 if (!NT_STATUS_IS_OK(status)) {
158 if (DEBUGLEVEL >= 10) {
159 NDR_PRINT_OUT_DEBUG(lsa_QuerySecurity, &r);
162 if (NT_STATUS_IS_ERR(status)) {
166 /* Return variables */
167 *sdbuf = *r.out.sdbuf;
173 NTSTATUS rpccli_lsa_SetSecObj(struct rpc_pipe_client *cli,
175 struct policy_handle *handle /* [in] [ref] */,
176 uint32_t sec_info /* [in] */,
177 struct sec_desc_buf *sdbuf /* [in] [ref] */)
179 struct lsa_SetSecObj r;
183 r.in.handle = handle;
184 r.in.sec_info = sec_info;
187 if (DEBUGLEVEL >= 10) {
188 NDR_PRINT_IN_DEBUG(lsa_SetSecObj, &r);
191 status = cli->dispatch(cli,
197 if (!NT_STATUS_IS_OK(status)) {
201 if (DEBUGLEVEL >= 10) {
202 NDR_PRINT_OUT_DEBUG(lsa_SetSecObj, &r);
205 if (NT_STATUS_IS_ERR(status)) {
209 /* Return variables */
215 NTSTATUS rpccli_lsa_ChangePassword(struct rpc_pipe_client *cli,
218 struct lsa_ChangePassword r;
223 if (DEBUGLEVEL >= 10) {
224 NDR_PRINT_IN_DEBUG(lsa_ChangePassword, &r);
227 status = cli->dispatch(cli,
230 NDR_LSA_CHANGEPASSWORD,
233 if (!NT_STATUS_IS_OK(status)) {
237 if (DEBUGLEVEL >= 10) {
238 NDR_PRINT_OUT_DEBUG(lsa_ChangePassword, &r);
241 if (NT_STATUS_IS_ERR(status)) {
245 /* Return variables */
251 NTSTATUS rpccli_lsa_OpenPolicy(struct rpc_pipe_client *cli,
253 uint16_t *system_name /* [in] [unique] */,
254 struct lsa_ObjectAttribute *attr /* [in] [ref] */,
255 uint32_t access_mask /* [in] */,
256 struct policy_handle *handle /* [out] [ref] */)
258 struct lsa_OpenPolicy r;
262 r.in.system_name = system_name;
264 r.in.access_mask = access_mask;
266 if (DEBUGLEVEL >= 10) {
267 NDR_PRINT_IN_DEBUG(lsa_OpenPolicy, &r);
270 status = cli->dispatch(cli,
276 if (!NT_STATUS_IS_OK(status)) {
280 if (DEBUGLEVEL >= 10) {
281 NDR_PRINT_OUT_DEBUG(lsa_OpenPolicy, &r);
284 if (NT_STATUS_IS_ERR(status)) {
288 /* Return variables */
289 *handle = *r.out.handle;
295 NTSTATUS rpccli_lsa_QueryInfoPolicy(struct rpc_pipe_client *cli,
297 struct policy_handle *handle /* [in] [ref] */,
298 enum lsa_PolicyInfo level /* [in] */,
299 union lsa_PolicyInformation **info /* [out] [ref,switch_is(level)] */)
301 struct lsa_QueryInfoPolicy r;
305 r.in.handle = handle;
308 if (DEBUGLEVEL >= 10) {
309 NDR_PRINT_IN_DEBUG(lsa_QueryInfoPolicy, &r);
312 status = cli->dispatch(cli,
315 NDR_LSA_QUERYINFOPOLICY,
318 if (!NT_STATUS_IS_OK(status)) {
322 if (DEBUGLEVEL >= 10) {
323 NDR_PRINT_OUT_DEBUG(lsa_QueryInfoPolicy, &r);
326 if (NT_STATUS_IS_ERR(status)) {
330 /* Return variables */
337 NTSTATUS rpccli_lsa_SetInfoPolicy(struct rpc_pipe_client *cli,
339 struct policy_handle *handle /* [in] [ref] */,
340 enum lsa_PolicyInfo level /* [in] */,
341 union lsa_PolicyInformation *info /* [in] [ref,switch_is(level)] */)
343 struct lsa_SetInfoPolicy r;
347 r.in.handle = handle;
351 if (DEBUGLEVEL >= 10) {
352 NDR_PRINT_IN_DEBUG(lsa_SetInfoPolicy, &r);
355 status = cli->dispatch(cli,
358 NDR_LSA_SETINFOPOLICY,
361 if (!NT_STATUS_IS_OK(status)) {
365 if (DEBUGLEVEL >= 10) {
366 NDR_PRINT_OUT_DEBUG(lsa_SetInfoPolicy, &r);
369 if (NT_STATUS_IS_ERR(status)) {
373 /* Return variables */
379 NTSTATUS rpccli_lsa_ClearAuditLog(struct rpc_pipe_client *cli,
382 struct lsa_ClearAuditLog r;
387 if (DEBUGLEVEL >= 10) {
388 NDR_PRINT_IN_DEBUG(lsa_ClearAuditLog, &r);
391 status = cli->dispatch(cli,
394 NDR_LSA_CLEARAUDITLOG,
397 if (!NT_STATUS_IS_OK(status)) {
401 if (DEBUGLEVEL >= 10) {
402 NDR_PRINT_OUT_DEBUG(lsa_ClearAuditLog, &r);
405 if (NT_STATUS_IS_ERR(status)) {
409 /* Return variables */
415 NTSTATUS rpccli_lsa_CreateAccount(struct rpc_pipe_client *cli,
417 struct policy_handle *handle /* [in] [ref] */,
418 struct dom_sid2 *sid /* [in] [ref] */,
419 uint32_t access_mask /* [in] */,
420 struct policy_handle *acct_handle /* [out] [ref] */)
422 struct lsa_CreateAccount r;
426 r.in.handle = handle;
428 r.in.access_mask = access_mask;
430 if (DEBUGLEVEL >= 10) {
431 NDR_PRINT_IN_DEBUG(lsa_CreateAccount, &r);
434 status = cli->dispatch(cli,
437 NDR_LSA_CREATEACCOUNT,
440 if (!NT_STATUS_IS_OK(status)) {
444 if (DEBUGLEVEL >= 10) {
445 NDR_PRINT_OUT_DEBUG(lsa_CreateAccount, &r);
448 if (NT_STATUS_IS_ERR(status)) {
452 /* Return variables */
453 *acct_handle = *r.out.acct_handle;
459 NTSTATUS rpccli_lsa_EnumAccounts(struct rpc_pipe_client *cli,
461 struct policy_handle *handle /* [in] [ref] */,
462 uint32_t *resume_handle /* [in,out] [ref] */,
463 struct lsa_SidArray *sids /* [out] [ref] */,
464 uint32_t num_entries /* [in] [range(0,8192)] */)
466 struct lsa_EnumAccounts r;
470 r.in.handle = handle;
471 r.in.resume_handle = resume_handle;
472 r.in.num_entries = num_entries;
474 if (DEBUGLEVEL >= 10) {
475 NDR_PRINT_IN_DEBUG(lsa_EnumAccounts, &r);
478 status = cli->dispatch(cli,
481 NDR_LSA_ENUMACCOUNTS,
484 if (!NT_STATUS_IS_OK(status)) {
488 if (DEBUGLEVEL >= 10) {
489 NDR_PRINT_OUT_DEBUG(lsa_EnumAccounts, &r);
492 if (NT_STATUS_IS_ERR(status)) {
496 /* Return variables */
497 *resume_handle = *r.out.resume_handle;
504 NTSTATUS rpccli_lsa_CreateTrustedDomain(struct rpc_pipe_client *cli,
506 struct policy_handle *policy_handle /* [in] [ref] */,
507 struct lsa_DomainInfo *info /* [in] [ref] */,
508 uint32_t access_mask /* [in] */,
509 struct policy_handle *trustdom_handle /* [out] [ref] */)
511 struct lsa_CreateTrustedDomain r;
515 r.in.policy_handle = policy_handle;
517 r.in.access_mask = access_mask;
519 if (DEBUGLEVEL >= 10) {
520 NDR_PRINT_IN_DEBUG(lsa_CreateTrustedDomain, &r);
523 status = cli->dispatch(cli,
526 NDR_LSA_CREATETRUSTEDDOMAIN,
529 if (!NT_STATUS_IS_OK(status)) {
533 if (DEBUGLEVEL >= 10) {
534 NDR_PRINT_OUT_DEBUG(lsa_CreateTrustedDomain, &r);
537 if (NT_STATUS_IS_ERR(status)) {
541 /* Return variables */
542 *trustdom_handle = *r.out.trustdom_handle;
548 NTSTATUS rpccli_lsa_EnumTrustDom(struct rpc_pipe_client *cli,
550 struct policy_handle *handle /* [in] [ref] */,
551 uint32_t *resume_handle /* [in,out] [ref] */,
552 struct lsa_DomainList *domains /* [out] [ref] */,
553 uint32_t max_size /* [in] */)
555 struct lsa_EnumTrustDom r;
559 r.in.handle = handle;
560 r.in.resume_handle = resume_handle;
561 r.in.max_size = max_size;
563 if (DEBUGLEVEL >= 10) {
564 NDR_PRINT_IN_DEBUG(lsa_EnumTrustDom, &r);
567 status = cli->dispatch(cli,
570 NDR_LSA_ENUMTRUSTDOM,
573 if (!NT_STATUS_IS_OK(status)) {
577 if (DEBUGLEVEL >= 10) {
578 NDR_PRINT_OUT_DEBUG(lsa_EnumTrustDom, &r);
581 if (NT_STATUS_IS_ERR(status)) {
585 /* Return variables */
586 *resume_handle = *r.out.resume_handle;
587 *domains = *r.out.domains;
593 NTSTATUS rpccli_lsa_LookupNames(struct rpc_pipe_client *cli,
595 struct policy_handle *handle /* [in] [ref] */,
596 uint32_t num_names /* [in] [range(0,1000)] */,
597 struct lsa_String *names /* [in] [size_is(num_names)] */,
598 struct lsa_RefDomainList **domains /* [out] [ref] */,
599 struct lsa_TransSidArray *sids /* [in,out] [ref] */,
600 enum lsa_LookupNamesLevel level /* [in] */,
601 uint32_t *count /* [in,out] [ref] */)
603 struct lsa_LookupNames r;
607 r.in.handle = handle;
608 r.in.num_names = num_names;
614 if (DEBUGLEVEL >= 10) {
615 NDR_PRINT_IN_DEBUG(lsa_LookupNames, &r);
618 status = cli->dispatch(cli,
624 if (!NT_STATUS_IS_OK(status)) {
628 if (DEBUGLEVEL >= 10) {
629 NDR_PRINT_OUT_DEBUG(lsa_LookupNames, &r);
632 if (NT_STATUS_IS_ERR(status)) {
636 /* Return variables */
637 *domains = *r.out.domains;
639 *count = *r.out.count;
645 NTSTATUS rpccli_lsa_LookupSids(struct rpc_pipe_client *cli,
647 struct policy_handle *handle /* [in] [ref] */,
648 struct lsa_SidArray *sids /* [in] [ref] */,
649 struct lsa_RefDomainList **domains /* [out] [ref] */,
650 struct lsa_TransNameArray *names /* [in,out] [ref] */,
651 uint16_t level /* [in] */,
652 uint32_t *count /* [in,out] [ref] */)
654 struct lsa_LookupSids r;
658 r.in.handle = handle;
664 if (DEBUGLEVEL >= 10) {
665 NDR_PRINT_IN_DEBUG(lsa_LookupSids, &r);
668 status = cli->dispatch(cli,
674 if (!NT_STATUS_IS_OK(status)) {
678 if (DEBUGLEVEL >= 10) {
679 NDR_PRINT_OUT_DEBUG(lsa_LookupSids, &r);
682 if (NT_STATUS_IS_ERR(status)) {
686 /* Return variables */
687 *domains = *r.out.domains;
688 *names = *r.out.names;
689 *count = *r.out.count;
695 NTSTATUS rpccli_lsa_CreateSecret(struct rpc_pipe_client *cli,
697 struct policy_handle *handle /* [in] [ref] */,
698 struct lsa_String name /* [in] */,
699 uint32_t access_mask /* [in] */,
700 struct policy_handle *sec_handle /* [out] [ref] */)
702 struct lsa_CreateSecret r;
706 r.in.handle = handle;
708 r.in.access_mask = access_mask;
710 if (DEBUGLEVEL >= 10) {
711 NDR_PRINT_IN_DEBUG(lsa_CreateSecret, &r);
714 status = cli->dispatch(cli,
717 NDR_LSA_CREATESECRET,
720 if (!NT_STATUS_IS_OK(status)) {
724 if (DEBUGLEVEL >= 10) {
725 NDR_PRINT_OUT_DEBUG(lsa_CreateSecret, &r);
728 if (NT_STATUS_IS_ERR(status)) {
732 /* Return variables */
733 *sec_handle = *r.out.sec_handle;
739 NTSTATUS rpccli_lsa_OpenAccount(struct rpc_pipe_client *cli,
741 struct policy_handle *handle /* [in] [ref] */,
742 struct dom_sid2 *sid /* [in] [ref] */,
743 uint32_t access_mask /* [in] */,
744 struct policy_handle *acct_handle /* [out] [ref] */)
746 struct lsa_OpenAccount r;
750 r.in.handle = handle;
752 r.in.access_mask = access_mask;
754 if (DEBUGLEVEL >= 10) {
755 NDR_PRINT_IN_DEBUG(lsa_OpenAccount, &r);
758 status = cli->dispatch(cli,
764 if (!NT_STATUS_IS_OK(status)) {
768 if (DEBUGLEVEL >= 10) {
769 NDR_PRINT_OUT_DEBUG(lsa_OpenAccount, &r);
772 if (NT_STATUS_IS_ERR(status)) {
776 /* Return variables */
777 *acct_handle = *r.out.acct_handle;
783 NTSTATUS rpccli_lsa_EnumPrivsAccount(struct rpc_pipe_client *cli,
785 struct policy_handle *handle /* [in] [ref] */,
786 struct lsa_PrivilegeSet **privs /* [out] [ref] */)
788 struct lsa_EnumPrivsAccount r;
792 r.in.handle = handle;
794 if (DEBUGLEVEL >= 10) {
795 NDR_PRINT_IN_DEBUG(lsa_EnumPrivsAccount, &r);
798 status = cli->dispatch(cli,
801 NDR_LSA_ENUMPRIVSACCOUNT,
804 if (!NT_STATUS_IS_OK(status)) {
808 if (DEBUGLEVEL >= 10) {
809 NDR_PRINT_OUT_DEBUG(lsa_EnumPrivsAccount, &r);
812 if (NT_STATUS_IS_ERR(status)) {
816 /* Return variables */
817 *privs = *r.out.privs;
823 NTSTATUS rpccli_lsa_AddPrivilegesToAccount(struct rpc_pipe_client *cli,
825 struct policy_handle *handle /* [in] [ref] */,
826 struct lsa_PrivilegeSet *privs /* [in] [ref] */)
828 struct lsa_AddPrivilegesToAccount r;
832 r.in.handle = handle;
835 if (DEBUGLEVEL >= 10) {
836 NDR_PRINT_IN_DEBUG(lsa_AddPrivilegesToAccount, &r);
839 status = cli->dispatch(cli,
842 NDR_LSA_ADDPRIVILEGESTOACCOUNT,
845 if (!NT_STATUS_IS_OK(status)) {
849 if (DEBUGLEVEL >= 10) {
850 NDR_PRINT_OUT_DEBUG(lsa_AddPrivilegesToAccount, &r);
853 if (NT_STATUS_IS_ERR(status)) {
857 /* Return variables */
863 NTSTATUS rpccli_lsa_RemovePrivilegesFromAccount(struct rpc_pipe_client *cli,
865 struct policy_handle *handle /* [in] [ref] */,
866 uint8_t remove_all /* [in] */,
867 struct lsa_PrivilegeSet *privs /* [in] [unique] */)
869 struct lsa_RemovePrivilegesFromAccount r;
873 r.in.handle = handle;
874 r.in.remove_all = remove_all;
877 if (DEBUGLEVEL >= 10) {
878 NDR_PRINT_IN_DEBUG(lsa_RemovePrivilegesFromAccount, &r);
881 status = cli->dispatch(cli,
884 NDR_LSA_REMOVEPRIVILEGESFROMACCOUNT,
887 if (!NT_STATUS_IS_OK(status)) {
891 if (DEBUGLEVEL >= 10) {
892 NDR_PRINT_OUT_DEBUG(lsa_RemovePrivilegesFromAccount, &r);
895 if (NT_STATUS_IS_ERR(status)) {
899 /* Return variables */
905 NTSTATUS rpccli_lsa_GetQuotasForAccount(struct rpc_pipe_client *cli,
908 struct lsa_GetQuotasForAccount r;
913 if (DEBUGLEVEL >= 10) {
914 NDR_PRINT_IN_DEBUG(lsa_GetQuotasForAccount, &r);
917 status = cli->dispatch(cli,
920 NDR_LSA_GETQUOTASFORACCOUNT,
923 if (!NT_STATUS_IS_OK(status)) {
927 if (DEBUGLEVEL >= 10) {
928 NDR_PRINT_OUT_DEBUG(lsa_GetQuotasForAccount, &r);
931 if (NT_STATUS_IS_ERR(status)) {
935 /* Return variables */
941 NTSTATUS rpccli_lsa_SetQuotasForAccount(struct rpc_pipe_client *cli,
944 struct lsa_SetQuotasForAccount r;
949 if (DEBUGLEVEL >= 10) {
950 NDR_PRINT_IN_DEBUG(lsa_SetQuotasForAccount, &r);
953 status = cli->dispatch(cli,
956 NDR_LSA_SETQUOTASFORACCOUNT,
959 if (!NT_STATUS_IS_OK(status)) {
963 if (DEBUGLEVEL >= 10) {
964 NDR_PRINT_OUT_DEBUG(lsa_SetQuotasForAccount, &r);
967 if (NT_STATUS_IS_ERR(status)) {
971 /* Return variables */
977 NTSTATUS rpccli_lsa_GetSystemAccessAccount(struct rpc_pipe_client *cli,
979 struct policy_handle *handle /* [in] [ref] */,
980 uint32_t *access_mask /* [out] [ref] */)
982 struct lsa_GetSystemAccessAccount r;
986 r.in.handle = handle;
988 if (DEBUGLEVEL >= 10) {
989 NDR_PRINT_IN_DEBUG(lsa_GetSystemAccessAccount, &r);
992 status = cli->dispatch(cli,
995 NDR_LSA_GETSYSTEMACCESSACCOUNT,
998 if (!NT_STATUS_IS_OK(status)) {
1002 if (DEBUGLEVEL >= 10) {
1003 NDR_PRINT_OUT_DEBUG(lsa_GetSystemAccessAccount, &r);
1006 if (NT_STATUS_IS_ERR(status)) {
1010 /* Return variables */
1011 *access_mask = *r.out.access_mask;
1014 return r.out.result;
1017 NTSTATUS rpccli_lsa_SetSystemAccessAccount(struct rpc_pipe_client *cli,
1018 TALLOC_CTX *mem_ctx,
1019 struct policy_handle *handle /* [in] [ref] */,
1020 uint32_t access_mask /* [in] */)
1022 struct lsa_SetSystemAccessAccount r;
1026 r.in.handle = handle;
1027 r.in.access_mask = access_mask;
1029 if (DEBUGLEVEL >= 10) {
1030 NDR_PRINT_IN_DEBUG(lsa_SetSystemAccessAccount, &r);
1033 status = cli->dispatch(cli,
1036 NDR_LSA_SETSYSTEMACCESSACCOUNT,
1039 if (!NT_STATUS_IS_OK(status)) {
1043 if (DEBUGLEVEL >= 10) {
1044 NDR_PRINT_OUT_DEBUG(lsa_SetSystemAccessAccount, &r);
1047 if (NT_STATUS_IS_ERR(status)) {
1051 /* Return variables */
1054 return r.out.result;
1057 NTSTATUS rpccli_lsa_OpenTrustedDomain(struct rpc_pipe_client *cli,
1058 TALLOC_CTX *mem_ctx,
1059 struct policy_handle *handle /* [in] [ref] */,
1060 struct dom_sid2 *sid /* [in] [ref] */,
1061 uint32_t access_mask /* [in] */,
1062 struct policy_handle *trustdom_handle /* [out] [ref] */)
1064 struct lsa_OpenTrustedDomain r;
1068 r.in.handle = handle;
1070 r.in.access_mask = access_mask;
1072 if (DEBUGLEVEL >= 10) {
1073 NDR_PRINT_IN_DEBUG(lsa_OpenTrustedDomain, &r);
1076 status = cli->dispatch(cli,
1079 NDR_LSA_OPENTRUSTEDDOMAIN,
1082 if (!NT_STATUS_IS_OK(status)) {
1086 if (DEBUGLEVEL >= 10) {
1087 NDR_PRINT_OUT_DEBUG(lsa_OpenTrustedDomain, &r);
1090 if (NT_STATUS_IS_ERR(status)) {
1094 /* Return variables */
1095 *trustdom_handle = *r.out.trustdom_handle;
1098 return r.out.result;
1101 NTSTATUS rpccli_lsa_QueryTrustedDomainInfo(struct rpc_pipe_client *cli,
1102 TALLOC_CTX *mem_ctx,
1103 struct policy_handle *trustdom_handle /* [in] [ref] */,
1104 enum lsa_TrustDomInfoEnum level /* [in] */,
1105 union lsa_TrustedDomainInfo **info /* [out] [ref,switch_is(level)] */)
1107 struct lsa_QueryTrustedDomainInfo r;
1111 r.in.trustdom_handle = trustdom_handle;
1114 if (DEBUGLEVEL >= 10) {
1115 NDR_PRINT_IN_DEBUG(lsa_QueryTrustedDomainInfo, &r);
1118 status = cli->dispatch(cli,
1121 NDR_LSA_QUERYTRUSTEDDOMAININFO,
1124 if (!NT_STATUS_IS_OK(status)) {
1128 if (DEBUGLEVEL >= 10) {
1129 NDR_PRINT_OUT_DEBUG(lsa_QueryTrustedDomainInfo, &r);
1132 if (NT_STATUS_IS_ERR(status)) {
1136 /* Return variables */
1137 *info = *r.out.info;
1140 return r.out.result;
1143 NTSTATUS rpccli_lsa_SetInformationTrustedDomain(struct rpc_pipe_client *cli,
1144 TALLOC_CTX *mem_ctx,
1145 struct policy_handle *trustdom_handle /* [in] [ref] */,
1146 enum lsa_TrustDomInfoEnum level /* [in] */,
1147 union lsa_TrustedDomainInfo *info /* [in] [ref,switch_is(level)] */)
1149 struct lsa_SetInformationTrustedDomain r;
1153 r.in.trustdom_handle = trustdom_handle;
1157 if (DEBUGLEVEL >= 10) {
1158 NDR_PRINT_IN_DEBUG(lsa_SetInformationTrustedDomain, &r);
1161 status = cli->dispatch(cli,
1164 NDR_LSA_SETINFORMATIONTRUSTEDDOMAIN,
1167 if (!NT_STATUS_IS_OK(status)) {
1171 if (DEBUGLEVEL >= 10) {
1172 NDR_PRINT_OUT_DEBUG(lsa_SetInformationTrustedDomain, &r);
1175 if (NT_STATUS_IS_ERR(status)) {
1179 /* Return variables */
1182 return r.out.result;
1185 NTSTATUS rpccli_lsa_OpenSecret(struct rpc_pipe_client *cli,
1186 TALLOC_CTX *mem_ctx,
1187 struct policy_handle *handle /* [in] [ref] */,
1188 struct lsa_String name /* [in] */,
1189 uint32_t access_mask /* [in] */,
1190 struct policy_handle *sec_handle /* [out] [ref] */)
1192 struct lsa_OpenSecret r;
1196 r.in.handle = handle;
1198 r.in.access_mask = access_mask;
1200 if (DEBUGLEVEL >= 10) {
1201 NDR_PRINT_IN_DEBUG(lsa_OpenSecret, &r);
1204 status = cli->dispatch(cli,
1210 if (!NT_STATUS_IS_OK(status)) {
1214 if (DEBUGLEVEL >= 10) {
1215 NDR_PRINT_OUT_DEBUG(lsa_OpenSecret, &r);
1218 if (NT_STATUS_IS_ERR(status)) {
1222 /* Return variables */
1223 *sec_handle = *r.out.sec_handle;
1226 return r.out.result;
1229 NTSTATUS rpccli_lsa_SetSecret(struct rpc_pipe_client *cli,
1230 TALLOC_CTX *mem_ctx,
1231 struct policy_handle *sec_handle /* [in] [ref] */,
1232 struct lsa_DATA_BUF *new_val /* [in] [unique] */,
1233 struct lsa_DATA_BUF *old_val /* [in] [unique] */)
1235 struct lsa_SetSecret r;
1239 r.in.sec_handle = sec_handle;
1240 r.in.new_val = new_val;
1241 r.in.old_val = old_val;
1243 if (DEBUGLEVEL >= 10) {
1244 NDR_PRINT_IN_DEBUG(lsa_SetSecret, &r);
1247 status = cli->dispatch(cli,
1253 if (!NT_STATUS_IS_OK(status)) {
1257 if (DEBUGLEVEL >= 10) {
1258 NDR_PRINT_OUT_DEBUG(lsa_SetSecret, &r);
1261 if (NT_STATUS_IS_ERR(status)) {
1265 /* Return variables */
1268 return r.out.result;
1271 NTSTATUS rpccli_lsa_QuerySecret(struct rpc_pipe_client *cli,
1272 TALLOC_CTX *mem_ctx,
1273 struct policy_handle *sec_handle /* [in] [ref] */,
1274 struct lsa_DATA_BUF_PTR *new_val /* [in,out] [unique] */,
1275 NTTIME *new_mtime /* [in,out] [unique] */,
1276 struct lsa_DATA_BUF_PTR *old_val /* [in,out] [unique] */,
1277 NTTIME *old_mtime /* [in,out] [unique] */)
1279 struct lsa_QuerySecret r;
1283 r.in.sec_handle = sec_handle;
1284 r.in.new_val = new_val;
1285 r.in.new_mtime = new_mtime;
1286 r.in.old_val = old_val;
1287 r.in.old_mtime = old_mtime;
1289 if (DEBUGLEVEL >= 10) {
1290 NDR_PRINT_IN_DEBUG(lsa_QuerySecret, &r);
1293 status = cli->dispatch(cli,
1296 NDR_LSA_QUERYSECRET,
1299 if (!NT_STATUS_IS_OK(status)) {
1303 if (DEBUGLEVEL >= 10) {
1304 NDR_PRINT_OUT_DEBUG(lsa_QuerySecret, &r);
1307 if (NT_STATUS_IS_ERR(status)) {
1311 /* Return variables */
1312 if (new_val && r.out.new_val) {
1313 *new_val = *r.out.new_val;
1315 if (new_mtime && r.out.new_mtime) {
1316 *new_mtime = *r.out.new_mtime;
1318 if (old_val && r.out.old_val) {
1319 *old_val = *r.out.old_val;
1321 if (old_mtime && r.out.old_mtime) {
1322 *old_mtime = *r.out.old_mtime;
1326 return r.out.result;
1329 NTSTATUS rpccli_lsa_LookupPrivValue(struct rpc_pipe_client *cli,
1330 TALLOC_CTX *mem_ctx,
1331 struct policy_handle *handle /* [in] [ref] */,
1332 struct lsa_String *name /* [in] [ref] */,
1333 struct lsa_LUID *luid /* [out] [ref] */)
1335 struct lsa_LookupPrivValue r;
1339 r.in.handle = handle;
1342 if (DEBUGLEVEL >= 10) {
1343 NDR_PRINT_IN_DEBUG(lsa_LookupPrivValue, &r);
1346 status = cli->dispatch(cli,
1349 NDR_LSA_LOOKUPPRIVVALUE,
1352 if (!NT_STATUS_IS_OK(status)) {
1356 if (DEBUGLEVEL >= 10) {
1357 NDR_PRINT_OUT_DEBUG(lsa_LookupPrivValue, &r);
1360 if (NT_STATUS_IS_ERR(status)) {
1364 /* Return variables */
1365 *luid = *r.out.luid;
1368 return r.out.result;
1371 NTSTATUS rpccli_lsa_LookupPrivName(struct rpc_pipe_client *cli,
1372 TALLOC_CTX *mem_ctx,
1373 struct policy_handle *handle /* [in] [ref] */,
1374 struct lsa_LUID *luid /* [in] [ref] */,
1375 struct lsa_StringLarge **name /* [out] [ref] */)
1377 struct lsa_LookupPrivName r;
1381 r.in.handle = handle;
1384 if (DEBUGLEVEL >= 10) {
1385 NDR_PRINT_IN_DEBUG(lsa_LookupPrivName, &r);
1388 status = cli->dispatch(cli,
1391 NDR_LSA_LOOKUPPRIVNAME,
1394 if (!NT_STATUS_IS_OK(status)) {
1398 if (DEBUGLEVEL >= 10) {
1399 NDR_PRINT_OUT_DEBUG(lsa_LookupPrivName, &r);
1402 if (NT_STATUS_IS_ERR(status)) {
1406 /* Return variables */
1407 *name = *r.out.name;
1410 return r.out.result;
1413 NTSTATUS rpccli_lsa_LookupPrivDisplayName(struct rpc_pipe_client *cli,
1414 TALLOC_CTX *mem_ctx,
1415 struct policy_handle *handle /* [in] [ref] */,
1416 struct lsa_String *name /* [in] [ref] */,
1417 uint16_t language_id /* [in] */,
1418 uint16_t language_id_sys /* [in] */,
1419 struct lsa_StringLarge **disp_name /* [out] [ref] */,
1420 uint16_t *returned_language_id /* [out] [ref] */)
1422 struct lsa_LookupPrivDisplayName r;
1426 r.in.handle = handle;
1428 r.in.language_id = language_id;
1429 r.in.language_id_sys = language_id_sys;
1431 if (DEBUGLEVEL >= 10) {
1432 NDR_PRINT_IN_DEBUG(lsa_LookupPrivDisplayName, &r);
1435 status = cli->dispatch(cli,
1438 NDR_LSA_LOOKUPPRIVDISPLAYNAME,
1441 if (!NT_STATUS_IS_OK(status)) {
1445 if (DEBUGLEVEL >= 10) {
1446 NDR_PRINT_OUT_DEBUG(lsa_LookupPrivDisplayName, &r);
1449 if (NT_STATUS_IS_ERR(status)) {
1453 /* Return variables */
1454 *disp_name = *r.out.disp_name;
1455 *returned_language_id = *r.out.returned_language_id;
1458 return r.out.result;
1461 NTSTATUS rpccli_lsa_DeleteObject(struct rpc_pipe_client *cli,
1462 TALLOC_CTX *mem_ctx,
1463 struct policy_handle *handle /* [in,out] [ref] */)
1465 struct lsa_DeleteObject r;
1469 r.in.handle = handle;
1471 if (DEBUGLEVEL >= 10) {
1472 NDR_PRINT_IN_DEBUG(lsa_DeleteObject, &r);
1475 status = cli->dispatch(cli,
1478 NDR_LSA_DELETEOBJECT,
1481 if (!NT_STATUS_IS_OK(status)) {
1485 if (DEBUGLEVEL >= 10) {
1486 NDR_PRINT_OUT_DEBUG(lsa_DeleteObject, &r);
1489 if (NT_STATUS_IS_ERR(status)) {
1493 /* Return variables */
1494 *handle = *r.out.handle;
1497 return r.out.result;
1500 NTSTATUS rpccli_lsa_EnumAccountsWithUserRight(struct rpc_pipe_client *cli,
1501 TALLOC_CTX *mem_ctx,
1502 struct policy_handle *handle /* [in] [ref] */,
1503 struct lsa_String *name /* [in] [unique] */,
1504 struct lsa_SidArray *sids /* [out] [ref] */)
1506 struct lsa_EnumAccountsWithUserRight r;
1510 r.in.handle = handle;
1513 if (DEBUGLEVEL >= 10) {
1514 NDR_PRINT_IN_DEBUG(lsa_EnumAccountsWithUserRight, &r);
1517 status = cli->dispatch(cli,
1520 NDR_LSA_ENUMACCOUNTSWITHUSERRIGHT,
1523 if (!NT_STATUS_IS_OK(status)) {
1527 if (DEBUGLEVEL >= 10) {
1528 NDR_PRINT_OUT_DEBUG(lsa_EnumAccountsWithUserRight, &r);
1531 if (NT_STATUS_IS_ERR(status)) {
1535 /* Return variables */
1536 *sids = *r.out.sids;
1539 return r.out.result;
1542 NTSTATUS rpccli_lsa_EnumAccountRights(struct rpc_pipe_client *cli,
1543 TALLOC_CTX *mem_ctx,
1544 struct policy_handle *handle /* [in] [ref] */,
1545 struct dom_sid2 *sid /* [in] [ref] */,
1546 struct lsa_RightSet *rights /* [out] [ref] */)
1548 struct lsa_EnumAccountRights r;
1552 r.in.handle = handle;
1555 if (DEBUGLEVEL >= 10) {
1556 NDR_PRINT_IN_DEBUG(lsa_EnumAccountRights, &r);
1559 status = cli->dispatch(cli,
1562 NDR_LSA_ENUMACCOUNTRIGHTS,
1565 if (!NT_STATUS_IS_OK(status)) {
1569 if (DEBUGLEVEL >= 10) {
1570 NDR_PRINT_OUT_DEBUG(lsa_EnumAccountRights, &r);
1573 if (NT_STATUS_IS_ERR(status)) {
1577 /* Return variables */
1578 *rights = *r.out.rights;
1581 return r.out.result;
1584 NTSTATUS rpccli_lsa_AddAccountRights(struct rpc_pipe_client *cli,
1585 TALLOC_CTX *mem_ctx,
1586 struct policy_handle *handle /* [in] [ref] */,
1587 struct dom_sid2 *sid /* [in] [ref] */,
1588 struct lsa_RightSet *rights /* [in] [ref] */)
1590 struct lsa_AddAccountRights r;
1594 r.in.handle = handle;
1596 r.in.rights = rights;
1598 if (DEBUGLEVEL >= 10) {
1599 NDR_PRINT_IN_DEBUG(lsa_AddAccountRights, &r);
1602 status = cli->dispatch(cli,
1605 NDR_LSA_ADDACCOUNTRIGHTS,
1608 if (!NT_STATUS_IS_OK(status)) {
1612 if (DEBUGLEVEL >= 10) {
1613 NDR_PRINT_OUT_DEBUG(lsa_AddAccountRights, &r);
1616 if (NT_STATUS_IS_ERR(status)) {
1620 /* Return variables */
1623 return r.out.result;
1626 NTSTATUS rpccli_lsa_RemoveAccountRights(struct rpc_pipe_client *cli,
1627 TALLOC_CTX *mem_ctx,
1628 struct policy_handle *handle /* [in] [ref] */,
1629 struct dom_sid2 *sid /* [in] [ref] */,
1630 uint8_t remove_all /* [in] */,
1631 struct lsa_RightSet *rights /* [in] [ref] */)
1633 struct lsa_RemoveAccountRights r;
1637 r.in.handle = handle;
1639 r.in.remove_all = remove_all;
1640 r.in.rights = rights;
1642 if (DEBUGLEVEL >= 10) {
1643 NDR_PRINT_IN_DEBUG(lsa_RemoveAccountRights, &r);
1646 status = cli->dispatch(cli,
1649 NDR_LSA_REMOVEACCOUNTRIGHTS,
1652 if (!NT_STATUS_IS_OK(status)) {
1656 if (DEBUGLEVEL >= 10) {
1657 NDR_PRINT_OUT_DEBUG(lsa_RemoveAccountRights, &r);
1660 if (NT_STATUS_IS_ERR(status)) {
1664 /* Return variables */
1667 return r.out.result;
1670 NTSTATUS rpccli_lsa_QueryTrustedDomainInfoBySid(struct rpc_pipe_client *cli,
1671 TALLOC_CTX *mem_ctx,
1672 struct policy_handle *handle /* [in] [ref] */,
1673 struct dom_sid2 *dom_sid /* [in] [ref] */,
1674 enum lsa_TrustDomInfoEnum level /* [in] */,
1675 union lsa_TrustedDomainInfo **info /* [out] [ref,switch_is(level)] */)
1677 struct lsa_QueryTrustedDomainInfoBySid r;
1681 r.in.handle = handle;
1682 r.in.dom_sid = dom_sid;
1685 if (DEBUGLEVEL >= 10) {
1686 NDR_PRINT_IN_DEBUG(lsa_QueryTrustedDomainInfoBySid, &r);
1689 status = cli->dispatch(cli,
1692 NDR_LSA_QUERYTRUSTEDDOMAININFOBYSID,
1695 if (!NT_STATUS_IS_OK(status)) {
1699 if (DEBUGLEVEL >= 10) {
1700 NDR_PRINT_OUT_DEBUG(lsa_QueryTrustedDomainInfoBySid, &r);
1703 if (NT_STATUS_IS_ERR(status)) {
1707 /* Return variables */
1708 *info = *r.out.info;
1711 return r.out.result;
1714 NTSTATUS rpccli_lsa_SetTrustedDomainInfo(struct rpc_pipe_client *cli,
1715 TALLOC_CTX *mem_ctx,
1716 struct policy_handle *handle /* [in] [ref] */,
1717 struct dom_sid2 *dom_sid /* [in] [ref] */,
1718 enum lsa_TrustDomInfoEnum level /* [in] */,
1719 union lsa_TrustedDomainInfo *info /* [in] [ref,switch_is(level)] */)
1721 struct lsa_SetTrustedDomainInfo r;
1725 r.in.handle = handle;
1726 r.in.dom_sid = dom_sid;
1730 if (DEBUGLEVEL >= 10) {
1731 NDR_PRINT_IN_DEBUG(lsa_SetTrustedDomainInfo, &r);
1734 status = cli->dispatch(cli,
1737 NDR_LSA_SETTRUSTEDDOMAININFO,
1740 if (!NT_STATUS_IS_OK(status)) {
1744 if (DEBUGLEVEL >= 10) {
1745 NDR_PRINT_OUT_DEBUG(lsa_SetTrustedDomainInfo, &r);
1748 if (NT_STATUS_IS_ERR(status)) {
1752 /* Return variables */
1755 return r.out.result;
1758 NTSTATUS rpccli_lsa_DeleteTrustedDomain(struct rpc_pipe_client *cli,
1759 TALLOC_CTX *mem_ctx,
1760 struct policy_handle *handle /* [in] [ref] */,
1761 struct dom_sid2 *dom_sid /* [in] [ref] */)
1763 struct lsa_DeleteTrustedDomain r;
1767 r.in.handle = handle;
1768 r.in.dom_sid = dom_sid;
1770 if (DEBUGLEVEL >= 10) {
1771 NDR_PRINT_IN_DEBUG(lsa_DeleteTrustedDomain, &r);
1774 status = cli->dispatch(cli,
1777 NDR_LSA_DELETETRUSTEDDOMAIN,
1780 if (!NT_STATUS_IS_OK(status)) {
1784 if (DEBUGLEVEL >= 10) {
1785 NDR_PRINT_OUT_DEBUG(lsa_DeleteTrustedDomain, &r);
1788 if (NT_STATUS_IS_ERR(status)) {
1792 /* Return variables */
1795 return r.out.result;
1798 NTSTATUS rpccli_lsa_StorePrivateData(struct rpc_pipe_client *cli,
1799 TALLOC_CTX *mem_ctx,
1800 struct policy_handle *handle /* [in] [ref] */,
1801 struct lsa_String *name /* [in] [ref] */,
1802 struct lsa_DATA_BUF *val /* [in] [unique] */)
1804 struct lsa_StorePrivateData r;
1808 r.in.handle = handle;
1812 if (DEBUGLEVEL >= 10) {
1813 NDR_PRINT_IN_DEBUG(lsa_StorePrivateData, &r);
1816 status = cli->dispatch(cli,
1819 NDR_LSA_STOREPRIVATEDATA,
1822 if (!NT_STATUS_IS_OK(status)) {
1826 if (DEBUGLEVEL >= 10) {
1827 NDR_PRINT_OUT_DEBUG(lsa_StorePrivateData, &r);
1830 if (NT_STATUS_IS_ERR(status)) {
1834 /* Return variables */
1837 return r.out.result;
1840 NTSTATUS rpccli_lsa_RetrievePrivateData(struct rpc_pipe_client *cli,
1841 TALLOC_CTX *mem_ctx,
1842 struct policy_handle *handle /* [in] [ref] */,
1843 struct lsa_String *name /* [in] [ref] */,
1844 struct lsa_DATA_BUF **val /* [in,out] [ref] */)
1846 struct lsa_RetrievePrivateData r;
1850 r.in.handle = handle;
1854 if (DEBUGLEVEL >= 10) {
1855 NDR_PRINT_IN_DEBUG(lsa_RetrievePrivateData, &r);
1858 status = cli->dispatch(cli,
1861 NDR_LSA_RETRIEVEPRIVATEDATA,
1864 if (!NT_STATUS_IS_OK(status)) {
1868 if (DEBUGLEVEL >= 10) {
1869 NDR_PRINT_OUT_DEBUG(lsa_RetrievePrivateData, &r);
1872 if (NT_STATUS_IS_ERR(status)) {
1876 /* Return variables */
1880 return r.out.result;
1883 NTSTATUS rpccli_lsa_OpenPolicy2(struct rpc_pipe_client *cli,
1884 TALLOC_CTX *mem_ctx,
1885 const char *system_name /* [in] [unique,charset(UTF16)] */,
1886 struct lsa_ObjectAttribute *attr /* [in] [ref] */,
1887 uint32_t access_mask /* [in] */,
1888 struct policy_handle *handle /* [out] [ref] */)
1890 struct lsa_OpenPolicy2 r;
1894 r.in.system_name = system_name;
1896 r.in.access_mask = access_mask;
1898 if (DEBUGLEVEL >= 10) {
1899 NDR_PRINT_IN_DEBUG(lsa_OpenPolicy2, &r);
1902 status = cli->dispatch(cli,
1905 NDR_LSA_OPENPOLICY2,
1908 if (!NT_STATUS_IS_OK(status)) {
1912 if (DEBUGLEVEL >= 10) {
1913 NDR_PRINT_OUT_DEBUG(lsa_OpenPolicy2, &r);
1916 if (NT_STATUS_IS_ERR(status)) {
1920 /* Return variables */
1921 *handle = *r.out.handle;
1924 return r.out.result;
1927 NTSTATUS rpccli_lsa_GetUserName(struct rpc_pipe_client *cli,
1928 TALLOC_CTX *mem_ctx,
1929 const char *system_name /* [in] [unique,charset(UTF16)] */,
1930 struct lsa_String **account_name /* [in,out] [ref] */,
1931 struct lsa_String **authority_name /* [in,out] [unique] */)
1933 struct lsa_GetUserName r;
1937 r.in.system_name = system_name;
1938 r.in.account_name = account_name;
1939 r.in.authority_name = authority_name;
1941 if (DEBUGLEVEL >= 10) {
1942 NDR_PRINT_IN_DEBUG(lsa_GetUserName, &r);
1945 status = cli->dispatch(cli,
1948 NDR_LSA_GETUSERNAME,
1951 if (!NT_STATUS_IS_OK(status)) {
1955 if (DEBUGLEVEL >= 10) {
1956 NDR_PRINT_OUT_DEBUG(lsa_GetUserName, &r);
1959 if (NT_STATUS_IS_ERR(status)) {
1963 /* Return variables */
1964 *account_name = *r.out.account_name;
1965 if (authority_name && r.out.authority_name) {
1966 *authority_name = *r.out.authority_name;
1970 return r.out.result;
1973 NTSTATUS rpccli_lsa_QueryInfoPolicy2(struct rpc_pipe_client *cli,
1974 TALLOC_CTX *mem_ctx,
1975 struct policy_handle *handle /* [in] [ref] */,
1976 enum lsa_PolicyInfo level /* [in] */,
1977 union lsa_PolicyInformation **info /* [out] [ref,switch_is(level)] */)
1979 struct lsa_QueryInfoPolicy2 r;
1983 r.in.handle = handle;
1986 if (DEBUGLEVEL >= 10) {
1987 NDR_PRINT_IN_DEBUG(lsa_QueryInfoPolicy2, &r);
1990 status = cli->dispatch(cli,
1993 NDR_LSA_QUERYINFOPOLICY2,
1996 if (!NT_STATUS_IS_OK(status)) {
2000 if (DEBUGLEVEL >= 10) {
2001 NDR_PRINT_OUT_DEBUG(lsa_QueryInfoPolicy2, &r);
2004 if (NT_STATUS_IS_ERR(status)) {
2008 /* Return variables */
2009 *info = *r.out.info;
2012 return r.out.result;
2015 NTSTATUS rpccli_lsa_SetInfoPolicy2(struct rpc_pipe_client *cli,
2016 TALLOC_CTX *mem_ctx,
2017 struct policy_handle *handle /* [in] [ref] */,
2018 enum lsa_PolicyInfo level /* [in] */,
2019 union lsa_PolicyInformation *info /* [in] [ref,switch_is(level)] */)
2021 struct lsa_SetInfoPolicy2 r;
2025 r.in.handle = handle;
2029 if (DEBUGLEVEL >= 10) {
2030 NDR_PRINT_IN_DEBUG(lsa_SetInfoPolicy2, &r);
2033 status = cli->dispatch(cli,
2036 NDR_LSA_SETINFOPOLICY2,
2039 if (!NT_STATUS_IS_OK(status)) {
2043 if (DEBUGLEVEL >= 10) {
2044 NDR_PRINT_OUT_DEBUG(lsa_SetInfoPolicy2, &r);
2047 if (NT_STATUS_IS_ERR(status)) {
2051 /* Return variables */
2054 return r.out.result;
2057 NTSTATUS rpccli_lsa_QueryTrustedDomainInfoByName(struct rpc_pipe_client *cli,
2058 TALLOC_CTX *mem_ctx,
2059 struct policy_handle *handle /* [in] [ref] */,
2060 struct lsa_String *trusted_domain /* [in] [ref] */,
2061 enum lsa_TrustDomInfoEnum level /* [in] */,
2062 union lsa_TrustedDomainInfo **info /* [out] [ref,switch_is(level)] */)
2064 struct lsa_QueryTrustedDomainInfoByName r;
2068 r.in.handle = handle;
2069 r.in.trusted_domain = trusted_domain;
2072 if (DEBUGLEVEL >= 10) {
2073 NDR_PRINT_IN_DEBUG(lsa_QueryTrustedDomainInfoByName, &r);
2076 status = cli->dispatch(cli,
2079 NDR_LSA_QUERYTRUSTEDDOMAININFOBYNAME,
2082 if (!NT_STATUS_IS_OK(status)) {
2086 if (DEBUGLEVEL >= 10) {
2087 NDR_PRINT_OUT_DEBUG(lsa_QueryTrustedDomainInfoByName, &r);
2090 if (NT_STATUS_IS_ERR(status)) {
2094 /* Return variables */
2095 *info = *r.out.info;
2098 return r.out.result;
2101 NTSTATUS rpccli_lsa_SetTrustedDomainInfoByName(struct rpc_pipe_client *cli,
2102 TALLOC_CTX *mem_ctx,
2103 struct policy_handle *handle /* [in] [ref] */,
2104 struct lsa_String trusted_domain /* [in] */,
2105 enum lsa_TrustDomInfoEnum level /* [in] */,
2106 union lsa_TrustedDomainInfo *info /* [in] [unique,switch_is(level)] */)
2108 struct lsa_SetTrustedDomainInfoByName r;
2112 r.in.handle = handle;
2113 r.in.trusted_domain = trusted_domain;
2117 if (DEBUGLEVEL >= 10) {
2118 NDR_PRINT_IN_DEBUG(lsa_SetTrustedDomainInfoByName, &r);
2121 status = cli->dispatch(cli,
2124 NDR_LSA_SETTRUSTEDDOMAININFOBYNAME,
2127 if (!NT_STATUS_IS_OK(status)) {
2131 if (DEBUGLEVEL >= 10) {
2132 NDR_PRINT_OUT_DEBUG(lsa_SetTrustedDomainInfoByName, &r);
2135 if (NT_STATUS_IS_ERR(status)) {
2139 /* Return variables */
2142 return r.out.result;
2145 NTSTATUS rpccli_lsa_EnumTrustedDomainsEx(struct rpc_pipe_client *cli,
2146 TALLOC_CTX *mem_ctx,
2147 struct policy_handle *handle /* [in] [ref] */,
2148 uint32_t *resume_handle /* [in,out] [ref] */,
2149 struct lsa_DomainListEx *domains /* [out] [ref] */,
2150 uint32_t max_size /* [in] */)
2152 struct lsa_EnumTrustedDomainsEx r;
2156 r.in.handle = handle;
2157 r.in.resume_handle = resume_handle;
2158 r.in.max_size = max_size;
2160 if (DEBUGLEVEL >= 10) {
2161 NDR_PRINT_IN_DEBUG(lsa_EnumTrustedDomainsEx, &r);
2164 status = cli->dispatch(cli,
2167 NDR_LSA_ENUMTRUSTEDDOMAINSEX,
2170 if (!NT_STATUS_IS_OK(status)) {
2174 if (DEBUGLEVEL >= 10) {
2175 NDR_PRINT_OUT_DEBUG(lsa_EnumTrustedDomainsEx, &r);
2178 if (NT_STATUS_IS_ERR(status)) {
2182 /* Return variables */
2183 *resume_handle = *r.out.resume_handle;
2184 *domains = *r.out.domains;
2187 return r.out.result;
2190 NTSTATUS rpccli_lsa_CreateTrustedDomainEx(struct rpc_pipe_client *cli,
2191 TALLOC_CTX *mem_ctx,
2192 struct policy_handle *policy_handle /* [in] [ref] */,
2193 struct lsa_TrustDomainInfoInfoEx *info /* [in] [ref] */,
2194 struct lsa_TrustDomainInfoAuthInfoInternal *auth_info /* [in] [ref] */,
2195 uint32_t access_mask /* [in] */,
2196 struct policy_handle *trustdom_handle /* [out] [ref] */)
2198 struct lsa_CreateTrustedDomainEx r;
2202 r.in.policy_handle = policy_handle;
2204 r.in.auth_info = auth_info;
2205 r.in.access_mask = access_mask;
2207 if (DEBUGLEVEL >= 10) {
2208 NDR_PRINT_IN_DEBUG(lsa_CreateTrustedDomainEx, &r);
2211 status = cli->dispatch(cli,
2214 NDR_LSA_CREATETRUSTEDDOMAINEX,
2217 if (!NT_STATUS_IS_OK(status)) {
2221 if (DEBUGLEVEL >= 10) {
2222 NDR_PRINT_OUT_DEBUG(lsa_CreateTrustedDomainEx, &r);
2225 if (NT_STATUS_IS_ERR(status)) {
2229 /* Return variables */
2230 *trustdom_handle = *r.out.trustdom_handle;
2233 return r.out.result;
2236 NTSTATUS rpccli_lsa_CloseTrustedDomainEx(struct rpc_pipe_client *cli,
2237 TALLOC_CTX *mem_ctx,
2238 struct policy_handle *handle /* [in,out] [ref] */)
2240 struct lsa_CloseTrustedDomainEx r;
2244 r.in.handle = handle;
2246 if (DEBUGLEVEL >= 10) {
2247 NDR_PRINT_IN_DEBUG(lsa_CloseTrustedDomainEx, &r);
2250 status = cli->dispatch(cli,
2253 NDR_LSA_CLOSETRUSTEDDOMAINEX,
2256 if (!NT_STATUS_IS_OK(status)) {
2260 if (DEBUGLEVEL >= 10) {
2261 NDR_PRINT_OUT_DEBUG(lsa_CloseTrustedDomainEx, &r);
2264 if (NT_STATUS_IS_ERR(status)) {
2268 /* Return variables */
2269 *handle = *r.out.handle;
2272 return r.out.result;
2275 NTSTATUS rpccli_lsa_QueryDomainInformationPolicy(struct rpc_pipe_client *cli,
2276 TALLOC_CTX *mem_ctx,
2277 struct policy_handle *handle /* [in] [ref] */,
2278 uint16_t level /* [in] */,
2279 union lsa_DomainInformationPolicy **info /* [out] [ref,switch_is(level)] */)
2281 struct lsa_QueryDomainInformationPolicy r;
2285 r.in.handle = handle;
2288 if (DEBUGLEVEL >= 10) {
2289 NDR_PRINT_IN_DEBUG(lsa_QueryDomainInformationPolicy, &r);
2292 status = cli->dispatch(cli,
2295 NDR_LSA_QUERYDOMAININFORMATIONPOLICY,
2298 if (!NT_STATUS_IS_OK(status)) {
2302 if (DEBUGLEVEL >= 10) {
2303 NDR_PRINT_OUT_DEBUG(lsa_QueryDomainInformationPolicy, &r);
2306 if (NT_STATUS_IS_ERR(status)) {
2310 /* Return variables */
2311 *info = *r.out.info;
2314 return r.out.result;
2317 NTSTATUS rpccli_lsa_SetDomainInformationPolicy(struct rpc_pipe_client *cli,
2318 TALLOC_CTX *mem_ctx,
2319 struct policy_handle *handle /* [in] [ref] */,
2320 uint16_t level /* [in] */,
2321 union lsa_DomainInformationPolicy *info /* [in] [unique,switch_is(level)] */)
2323 struct lsa_SetDomainInformationPolicy r;
2327 r.in.handle = handle;
2331 if (DEBUGLEVEL >= 10) {
2332 NDR_PRINT_IN_DEBUG(lsa_SetDomainInformationPolicy, &r);
2335 status = cli->dispatch(cli,
2338 NDR_LSA_SETDOMAININFORMATIONPOLICY,
2341 if (!NT_STATUS_IS_OK(status)) {
2345 if (DEBUGLEVEL >= 10) {
2346 NDR_PRINT_OUT_DEBUG(lsa_SetDomainInformationPolicy, &r);
2349 if (NT_STATUS_IS_ERR(status)) {
2353 /* Return variables */
2356 return r.out.result;
2359 NTSTATUS rpccli_lsa_OpenTrustedDomainByName(struct rpc_pipe_client *cli,
2360 TALLOC_CTX *mem_ctx,
2361 struct policy_handle *handle /* [in] [ref] */,
2362 struct lsa_String name /* [in] */,
2363 uint32_t access_mask /* [in] */,
2364 struct policy_handle *trustdom_handle /* [out] [ref] */)
2366 struct lsa_OpenTrustedDomainByName r;
2370 r.in.handle = handle;
2372 r.in.access_mask = access_mask;
2374 if (DEBUGLEVEL >= 10) {
2375 NDR_PRINT_IN_DEBUG(lsa_OpenTrustedDomainByName, &r);
2378 status = cli->dispatch(cli,
2381 NDR_LSA_OPENTRUSTEDDOMAINBYNAME,
2384 if (!NT_STATUS_IS_OK(status)) {
2388 if (DEBUGLEVEL >= 10) {
2389 NDR_PRINT_OUT_DEBUG(lsa_OpenTrustedDomainByName, &r);
2392 if (NT_STATUS_IS_ERR(status)) {
2396 /* Return variables */
2397 *trustdom_handle = *r.out.trustdom_handle;
2400 return r.out.result;
2403 NTSTATUS rpccli_lsa_TestCall(struct rpc_pipe_client *cli,
2404 TALLOC_CTX *mem_ctx)
2406 struct lsa_TestCall r;
2411 if (DEBUGLEVEL >= 10) {
2412 NDR_PRINT_IN_DEBUG(lsa_TestCall, &r);
2415 status = cli->dispatch(cli,
2421 if (!NT_STATUS_IS_OK(status)) {
2425 if (DEBUGLEVEL >= 10) {
2426 NDR_PRINT_OUT_DEBUG(lsa_TestCall, &r);
2429 if (NT_STATUS_IS_ERR(status)) {
2433 /* Return variables */
2436 return r.out.result;
2439 NTSTATUS rpccli_lsa_LookupSids2(struct rpc_pipe_client *cli,
2440 TALLOC_CTX *mem_ctx,
2441 struct policy_handle *handle /* [in] [ref] */,
2442 struct lsa_SidArray *sids /* [in] [ref] */,
2443 struct lsa_RefDomainList **domains /* [out] [ref] */,
2444 struct lsa_TransNameArray2 *names /* [in,out] [ref] */,
2445 uint16_t level /* [in] */,
2446 uint32_t *count /* [in,out] [ref] */,
2447 uint32_t unknown1 /* [in] */,
2448 uint32_t unknown2 /* [in] */)
2450 struct lsa_LookupSids2 r;
2454 r.in.handle = handle;
2459 r.in.unknown1 = unknown1;
2460 r.in.unknown2 = unknown2;
2462 if (DEBUGLEVEL >= 10) {
2463 NDR_PRINT_IN_DEBUG(lsa_LookupSids2, &r);
2466 status = cli->dispatch(cli,
2469 NDR_LSA_LOOKUPSIDS2,
2472 if (!NT_STATUS_IS_OK(status)) {
2476 if (DEBUGLEVEL >= 10) {
2477 NDR_PRINT_OUT_DEBUG(lsa_LookupSids2, &r);
2480 if (NT_STATUS_IS_ERR(status)) {
2484 /* Return variables */
2485 *domains = *r.out.domains;
2486 *names = *r.out.names;
2487 *count = *r.out.count;
2490 return r.out.result;
2493 NTSTATUS rpccli_lsa_LookupNames2(struct rpc_pipe_client *cli,
2494 TALLOC_CTX *mem_ctx,
2495 struct policy_handle *handle /* [in] [ref] */,
2496 uint32_t num_names /* [in] [range(0,1000)] */,
2497 struct lsa_String *names /* [in] [size_is(num_names)] */,
2498 struct lsa_RefDomainList **domains /* [out] [ref] */,
2499 struct lsa_TransSidArray2 *sids /* [in,out] [ref] */,
2500 enum lsa_LookupNamesLevel level /* [in] */,
2501 uint32_t *count /* [in,out] [ref] */,
2502 uint32_t lookup_options /* [in] */,
2503 uint32_t client_revision /* [in] */)
2505 struct lsa_LookupNames2 r;
2509 r.in.handle = handle;
2510 r.in.num_names = num_names;
2515 r.in.lookup_options = lookup_options;
2516 r.in.client_revision = client_revision;
2518 if (DEBUGLEVEL >= 10) {
2519 NDR_PRINT_IN_DEBUG(lsa_LookupNames2, &r);
2522 status = cli->dispatch(cli,
2525 NDR_LSA_LOOKUPNAMES2,
2528 if (!NT_STATUS_IS_OK(status)) {
2532 if (DEBUGLEVEL >= 10) {
2533 NDR_PRINT_OUT_DEBUG(lsa_LookupNames2, &r);
2536 if (NT_STATUS_IS_ERR(status)) {
2540 /* Return variables */
2541 *domains = *r.out.domains;
2542 *sids = *r.out.sids;
2543 *count = *r.out.count;
2546 return r.out.result;
2549 NTSTATUS rpccli_lsa_CreateTrustedDomainEx2(struct rpc_pipe_client *cli,
2550 TALLOC_CTX *mem_ctx,
2551 struct policy_handle *policy_handle /* [in] [ref] */,
2552 struct lsa_TrustDomainInfoInfoEx *info /* [in] [ref] */,
2553 struct lsa_TrustDomainInfoAuthInfoInternal *auth_info /* [in] [ref] */,
2554 uint32_t access_mask /* [in] */,
2555 struct policy_handle *trustdom_handle /* [out] [ref] */)
2557 struct lsa_CreateTrustedDomainEx2 r;
2561 r.in.policy_handle = policy_handle;
2563 r.in.auth_info = auth_info;
2564 r.in.access_mask = access_mask;
2566 if (DEBUGLEVEL >= 10) {
2567 NDR_PRINT_IN_DEBUG(lsa_CreateTrustedDomainEx2, &r);
2570 status = cli->dispatch(cli,
2573 NDR_LSA_CREATETRUSTEDDOMAINEX2,
2576 if (!NT_STATUS_IS_OK(status)) {
2580 if (DEBUGLEVEL >= 10) {
2581 NDR_PRINT_OUT_DEBUG(lsa_CreateTrustedDomainEx2, &r);
2584 if (NT_STATUS_IS_ERR(status)) {
2588 /* Return variables */
2589 *trustdom_handle = *r.out.trustdom_handle;
2592 return r.out.result;
2595 NTSTATUS rpccli_lsa_CREDRWRITE(struct rpc_pipe_client *cli,
2596 TALLOC_CTX *mem_ctx)
2598 struct lsa_CREDRWRITE r;
2603 if (DEBUGLEVEL >= 10) {
2604 NDR_PRINT_IN_DEBUG(lsa_CREDRWRITE, &r);
2607 status = cli->dispatch(cli,
2613 if (!NT_STATUS_IS_OK(status)) {
2617 if (DEBUGLEVEL >= 10) {
2618 NDR_PRINT_OUT_DEBUG(lsa_CREDRWRITE, &r);
2621 if (NT_STATUS_IS_ERR(status)) {
2625 /* Return variables */
2628 return r.out.result;
2631 NTSTATUS rpccli_lsa_CREDRREAD(struct rpc_pipe_client *cli,
2632 TALLOC_CTX *mem_ctx)
2634 struct lsa_CREDRREAD r;
2639 if (DEBUGLEVEL >= 10) {
2640 NDR_PRINT_IN_DEBUG(lsa_CREDRREAD, &r);
2643 status = cli->dispatch(cli,
2649 if (!NT_STATUS_IS_OK(status)) {
2653 if (DEBUGLEVEL >= 10) {
2654 NDR_PRINT_OUT_DEBUG(lsa_CREDRREAD, &r);
2657 if (NT_STATUS_IS_ERR(status)) {
2661 /* Return variables */
2664 return r.out.result;
2667 NTSTATUS rpccli_lsa_CREDRENUMERATE(struct rpc_pipe_client *cli,
2668 TALLOC_CTX *mem_ctx)
2670 struct lsa_CREDRENUMERATE r;
2675 if (DEBUGLEVEL >= 10) {
2676 NDR_PRINT_IN_DEBUG(lsa_CREDRENUMERATE, &r);
2679 status = cli->dispatch(cli,
2682 NDR_LSA_CREDRENUMERATE,
2685 if (!NT_STATUS_IS_OK(status)) {
2689 if (DEBUGLEVEL >= 10) {
2690 NDR_PRINT_OUT_DEBUG(lsa_CREDRENUMERATE, &r);
2693 if (NT_STATUS_IS_ERR(status)) {
2697 /* Return variables */
2700 return r.out.result;
2703 NTSTATUS rpccli_lsa_CREDRWRITEDOMAINCREDENTIALS(struct rpc_pipe_client *cli,
2704 TALLOC_CTX *mem_ctx)
2706 struct lsa_CREDRWRITEDOMAINCREDENTIALS r;
2711 if (DEBUGLEVEL >= 10) {
2712 NDR_PRINT_IN_DEBUG(lsa_CREDRWRITEDOMAINCREDENTIALS, &r);
2715 status = cli->dispatch(cli,
2718 NDR_LSA_CREDRWRITEDOMAINCREDENTIALS,
2721 if (!NT_STATUS_IS_OK(status)) {
2725 if (DEBUGLEVEL >= 10) {
2726 NDR_PRINT_OUT_DEBUG(lsa_CREDRWRITEDOMAINCREDENTIALS, &r);
2729 if (NT_STATUS_IS_ERR(status)) {
2733 /* Return variables */
2736 return r.out.result;
2739 NTSTATUS rpccli_lsa_CREDRREADDOMAINCREDENTIALS(struct rpc_pipe_client *cli,
2740 TALLOC_CTX *mem_ctx)
2742 struct lsa_CREDRREADDOMAINCREDENTIALS r;
2747 if (DEBUGLEVEL >= 10) {
2748 NDR_PRINT_IN_DEBUG(lsa_CREDRREADDOMAINCREDENTIALS, &r);
2751 status = cli->dispatch(cli,
2754 NDR_LSA_CREDRREADDOMAINCREDENTIALS,
2757 if (!NT_STATUS_IS_OK(status)) {
2761 if (DEBUGLEVEL >= 10) {
2762 NDR_PRINT_OUT_DEBUG(lsa_CREDRREADDOMAINCREDENTIALS, &r);
2765 if (NT_STATUS_IS_ERR(status)) {
2769 /* Return variables */
2772 return r.out.result;
2775 NTSTATUS rpccli_lsa_CREDRDELETE(struct rpc_pipe_client *cli,
2776 TALLOC_CTX *mem_ctx)
2778 struct lsa_CREDRDELETE r;
2783 if (DEBUGLEVEL >= 10) {
2784 NDR_PRINT_IN_DEBUG(lsa_CREDRDELETE, &r);
2787 status = cli->dispatch(cli,
2790 NDR_LSA_CREDRDELETE,
2793 if (!NT_STATUS_IS_OK(status)) {
2797 if (DEBUGLEVEL >= 10) {
2798 NDR_PRINT_OUT_DEBUG(lsa_CREDRDELETE, &r);
2801 if (NT_STATUS_IS_ERR(status)) {
2805 /* Return variables */
2808 return r.out.result;
2811 NTSTATUS rpccli_lsa_CREDRGETTARGETINFO(struct rpc_pipe_client *cli,
2812 TALLOC_CTX *mem_ctx)
2814 struct lsa_CREDRGETTARGETINFO r;
2819 if (DEBUGLEVEL >= 10) {
2820 NDR_PRINT_IN_DEBUG(lsa_CREDRGETTARGETINFO, &r);
2823 status = cli->dispatch(cli,
2826 NDR_LSA_CREDRGETTARGETINFO,
2829 if (!NT_STATUS_IS_OK(status)) {
2833 if (DEBUGLEVEL >= 10) {
2834 NDR_PRINT_OUT_DEBUG(lsa_CREDRGETTARGETINFO, &r);
2837 if (NT_STATUS_IS_ERR(status)) {
2841 /* Return variables */
2844 return r.out.result;
2847 NTSTATUS rpccli_lsa_CREDRPROFILELOADED(struct rpc_pipe_client *cli,
2848 TALLOC_CTX *mem_ctx)
2850 struct lsa_CREDRPROFILELOADED r;
2855 if (DEBUGLEVEL >= 10) {
2856 NDR_PRINT_IN_DEBUG(lsa_CREDRPROFILELOADED, &r);
2859 status = cli->dispatch(cli,
2862 NDR_LSA_CREDRPROFILELOADED,
2865 if (!NT_STATUS_IS_OK(status)) {
2869 if (DEBUGLEVEL >= 10) {
2870 NDR_PRINT_OUT_DEBUG(lsa_CREDRPROFILELOADED, &r);
2873 if (NT_STATUS_IS_ERR(status)) {
2877 /* Return variables */
2880 return r.out.result;
2883 NTSTATUS rpccli_lsa_LookupNames3(struct rpc_pipe_client *cli,
2884 TALLOC_CTX *mem_ctx,
2885 struct policy_handle *handle /* [in] [ref] */,
2886 uint32_t num_names /* [in] [range(0,1000)] */,
2887 struct lsa_String *names /* [in] [size_is(num_names)] */,
2888 struct lsa_RefDomainList **domains /* [out] [ref] */,
2889 struct lsa_TransSidArray3 *sids /* [in,out] [ref] */,
2890 enum lsa_LookupNamesLevel level /* [in] */,
2891 uint32_t *count /* [in,out] [ref] */,
2892 uint32_t lookup_options /* [in] */,
2893 uint32_t client_revision /* [in] */)
2895 struct lsa_LookupNames3 r;
2899 r.in.handle = handle;
2900 r.in.num_names = num_names;
2905 r.in.lookup_options = lookup_options;
2906 r.in.client_revision = client_revision;
2908 if (DEBUGLEVEL >= 10) {
2909 NDR_PRINT_IN_DEBUG(lsa_LookupNames3, &r);
2912 status = cli->dispatch(cli,
2915 NDR_LSA_LOOKUPNAMES3,
2918 if (!NT_STATUS_IS_OK(status)) {
2922 if (DEBUGLEVEL >= 10) {
2923 NDR_PRINT_OUT_DEBUG(lsa_LookupNames3, &r);
2926 if (NT_STATUS_IS_ERR(status)) {
2930 /* Return variables */
2931 *domains = *r.out.domains;
2932 *sids = *r.out.sids;
2933 *count = *r.out.count;
2936 return r.out.result;
2939 NTSTATUS rpccli_lsa_CREDRGETSESSIONTYPES(struct rpc_pipe_client *cli,
2940 TALLOC_CTX *mem_ctx)
2942 struct lsa_CREDRGETSESSIONTYPES r;
2947 if (DEBUGLEVEL >= 10) {
2948 NDR_PRINT_IN_DEBUG(lsa_CREDRGETSESSIONTYPES, &r);
2951 status = cli->dispatch(cli,
2954 NDR_LSA_CREDRGETSESSIONTYPES,
2957 if (!NT_STATUS_IS_OK(status)) {
2961 if (DEBUGLEVEL >= 10) {
2962 NDR_PRINT_OUT_DEBUG(lsa_CREDRGETSESSIONTYPES, &r);
2965 if (NT_STATUS_IS_ERR(status)) {
2969 /* Return variables */
2972 return r.out.result;
2975 NTSTATUS rpccli_lsa_LSARREGISTERAUDITEVENT(struct rpc_pipe_client *cli,
2976 TALLOC_CTX *mem_ctx)
2978 struct lsa_LSARREGISTERAUDITEVENT r;
2983 if (DEBUGLEVEL >= 10) {
2984 NDR_PRINT_IN_DEBUG(lsa_LSARREGISTERAUDITEVENT, &r);
2987 status = cli->dispatch(cli,
2990 NDR_LSA_LSARREGISTERAUDITEVENT,
2993 if (!NT_STATUS_IS_OK(status)) {
2997 if (DEBUGLEVEL >= 10) {
2998 NDR_PRINT_OUT_DEBUG(lsa_LSARREGISTERAUDITEVENT, &r);
3001 if (NT_STATUS_IS_ERR(status)) {
3005 /* Return variables */
3008 return r.out.result;
3011 NTSTATUS rpccli_lsa_LSARGENAUDITEVENT(struct rpc_pipe_client *cli,
3012 TALLOC_CTX *mem_ctx)
3014 struct lsa_LSARGENAUDITEVENT r;
3019 if (DEBUGLEVEL >= 10) {
3020 NDR_PRINT_IN_DEBUG(lsa_LSARGENAUDITEVENT, &r);
3023 status = cli->dispatch(cli,
3026 NDR_LSA_LSARGENAUDITEVENT,
3029 if (!NT_STATUS_IS_OK(status)) {
3033 if (DEBUGLEVEL >= 10) {
3034 NDR_PRINT_OUT_DEBUG(lsa_LSARGENAUDITEVENT, &r);
3037 if (NT_STATUS_IS_ERR(status)) {
3041 /* Return variables */
3044 return r.out.result;
3047 NTSTATUS rpccli_lsa_LSARUNREGISTERAUDITEVENT(struct rpc_pipe_client *cli,
3048 TALLOC_CTX *mem_ctx)
3050 struct lsa_LSARUNREGISTERAUDITEVENT r;
3055 if (DEBUGLEVEL >= 10) {
3056 NDR_PRINT_IN_DEBUG(lsa_LSARUNREGISTERAUDITEVENT, &r);
3059 status = cli->dispatch(cli,
3062 NDR_LSA_LSARUNREGISTERAUDITEVENT,
3065 if (!NT_STATUS_IS_OK(status)) {
3069 if (DEBUGLEVEL >= 10) {
3070 NDR_PRINT_OUT_DEBUG(lsa_LSARUNREGISTERAUDITEVENT, &r);
3073 if (NT_STATUS_IS_ERR(status)) {
3077 /* Return variables */
3080 return r.out.result;
3083 NTSTATUS rpccli_lsa_lsaRQueryForestTrustInformation(struct rpc_pipe_client *cli,
3084 TALLOC_CTX *mem_ctx,
3085 struct policy_handle *handle /* [in] [ref] */,
3086 struct lsa_String *trusted_domain_name /* [in] [ref] */,
3087 uint16_t unknown /* [in] */,
3088 struct lsa_ForestTrustInformation **forest_trust_info /* [out] [ref] */)
3090 struct lsa_lsaRQueryForestTrustInformation r;
3094 r.in.handle = handle;
3095 r.in.trusted_domain_name = trusted_domain_name;
3096 r.in.unknown = unknown;
3098 if (DEBUGLEVEL >= 10) {
3099 NDR_PRINT_IN_DEBUG(lsa_lsaRQueryForestTrustInformation, &r);
3102 status = cli->dispatch(cli,
3105 NDR_LSA_LSARQUERYFORESTTRUSTINFORMATION,
3108 if (!NT_STATUS_IS_OK(status)) {
3112 if (DEBUGLEVEL >= 10) {
3113 NDR_PRINT_OUT_DEBUG(lsa_lsaRQueryForestTrustInformation, &r);
3116 if (NT_STATUS_IS_ERR(status)) {
3120 /* Return variables */
3121 *forest_trust_info = *r.out.forest_trust_info;
3124 return r.out.result;
3127 NTSTATUS rpccli_lsa_LSARSETFORESTTRUSTINFORMATION(struct rpc_pipe_client *cli,
3128 TALLOC_CTX *mem_ctx)
3130 struct lsa_LSARSETFORESTTRUSTINFORMATION r;
3135 if (DEBUGLEVEL >= 10) {
3136 NDR_PRINT_IN_DEBUG(lsa_LSARSETFORESTTRUSTINFORMATION, &r);
3139 status = cli->dispatch(cli,
3142 NDR_LSA_LSARSETFORESTTRUSTINFORMATION,
3145 if (!NT_STATUS_IS_OK(status)) {
3149 if (DEBUGLEVEL >= 10) {
3150 NDR_PRINT_OUT_DEBUG(lsa_LSARSETFORESTTRUSTINFORMATION, &r);
3153 if (NT_STATUS_IS_ERR(status)) {
3157 /* Return variables */
3160 return r.out.result;
3163 NTSTATUS rpccli_lsa_CREDRRENAME(struct rpc_pipe_client *cli,
3164 TALLOC_CTX *mem_ctx)
3166 struct lsa_CREDRRENAME r;
3171 if (DEBUGLEVEL >= 10) {
3172 NDR_PRINT_IN_DEBUG(lsa_CREDRRENAME, &r);
3175 status = cli->dispatch(cli,
3178 NDR_LSA_CREDRRENAME,
3181 if (!NT_STATUS_IS_OK(status)) {
3185 if (DEBUGLEVEL >= 10) {
3186 NDR_PRINT_OUT_DEBUG(lsa_CREDRRENAME, &r);
3189 if (NT_STATUS_IS_ERR(status)) {
3193 /* Return variables */
3196 return r.out.result;
3199 NTSTATUS rpccli_lsa_LookupSids3(struct rpc_pipe_client *cli,
3200 TALLOC_CTX *mem_ctx,
3201 struct lsa_SidArray *sids /* [in] [ref] */,
3202 struct lsa_RefDomainList **domains /* [out] [ref] */,
3203 struct lsa_TransNameArray2 *names /* [in,out] [ref] */,
3204 uint16_t level /* [in] */,
3205 uint32_t *count /* [in,out] [ref] */,
3206 uint32_t unknown1 /* [in] */,
3207 uint32_t unknown2 /* [in] */)
3209 struct lsa_LookupSids3 r;
3217 r.in.unknown1 = unknown1;
3218 r.in.unknown2 = unknown2;
3220 if (DEBUGLEVEL >= 10) {
3221 NDR_PRINT_IN_DEBUG(lsa_LookupSids3, &r);
3224 status = cli->dispatch(cli,
3227 NDR_LSA_LOOKUPSIDS3,
3230 if (!NT_STATUS_IS_OK(status)) {
3234 if (DEBUGLEVEL >= 10) {
3235 NDR_PRINT_OUT_DEBUG(lsa_LookupSids3, &r);
3238 if (NT_STATUS_IS_ERR(status)) {
3242 /* Return variables */
3243 *domains = *r.out.domains;
3244 *names = *r.out.names;
3245 *count = *r.out.count;
3248 return r.out.result;
3251 NTSTATUS rpccli_lsa_LookupNames4(struct rpc_pipe_client *cli,
3252 TALLOC_CTX *mem_ctx,
3253 uint32_t num_names /* [in] [range(0,1000)] */,
3254 struct lsa_String *names /* [in] [size_is(num_names)] */,
3255 struct lsa_RefDomainList **domains /* [out] [ref] */,
3256 struct lsa_TransSidArray3 *sids /* [in,out] [ref] */,
3257 enum lsa_LookupNamesLevel level /* [in] */,
3258 uint32_t *count /* [in,out] [ref] */,
3259 uint32_t lookup_options /* [in] */,
3260 uint32_t client_revision /* [in] */)
3262 struct lsa_LookupNames4 r;
3266 r.in.num_names = num_names;
3271 r.in.lookup_options = lookup_options;
3272 r.in.client_revision = client_revision;
3274 if (DEBUGLEVEL >= 10) {
3275 NDR_PRINT_IN_DEBUG(lsa_LookupNames4, &r);
3278 status = cli->dispatch(cli,
3281 NDR_LSA_LOOKUPNAMES4,
3284 if (!NT_STATUS_IS_OK(status)) {
3288 if (DEBUGLEVEL >= 10) {
3289 NDR_PRINT_OUT_DEBUG(lsa_LookupNames4, &r);
3292 if (NT_STATUS_IS_ERR(status)) {
3296 /* Return variables */
3297 *domains = *r.out.domains;
3298 *sids = *r.out.sids;
3299 *count = *r.out.count;
3302 return r.out.result;
3305 NTSTATUS rpccli_lsa_LSAROPENPOLICYSCE(struct rpc_pipe_client *cli,
3306 TALLOC_CTX *mem_ctx)
3308 struct lsa_LSAROPENPOLICYSCE r;
3313 if (DEBUGLEVEL >= 10) {
3314 NDR_PRINT_IN_DEBUG(lsa_LSAROPENPOLICYSCE, &r);
3317 status = cli->dispatch(cli,
3320 NDR_LSA_LSAROPENPOLICYSCE,
3323 if (!NT_STATUS_IS_OK(status)) {
3327 if (DEBUGLEVEL >= 10) {
3328 NDR_PRINT_OUT_DEBUG(lsa_LSAROPENPOLICYSCE, &r);
3331 if (NT_STATUS_IS_ERR(status)) {
3335 /* Return variables */
3338 return r.out.result;
3341 NTSTATUS rpccli_lsa_LSARADTREGISTERSECURITYEVENTSOURCE(struct rpc_pipe_client *cli,
3342 TALLOC_CTX *mem_ctx)
3344 struct lsa_LSARADTREGISTERSECURITYEVENTSOURCE r;
3349 if (DEBUGLEVEL >= 10) {
3350 NDR_PRINT_IN_DEBUG(lsa_LSARADTREGISTERSECURITYEVENTSOURCE, &r);
3353 status = cli->dispatch(cli,
3356 NDR_LSA_LSARADTREGISTERSECURITYEVENTSOURCE,
3359 if (!NT_STATUS_IS_OK(status)) {
3363 if (DEBUGLEVEL >= 10) {
3364 NDR_PRINT_OUT_DEBUG(lsa_LSARADTREGISTERSECURITYEVENTSOURCE, &r);
3367 if (NT_STATUS_IS_ERR(status)) {
3371 /* Return variables */
3374 return r.out.result;
3377 NTSTATUS rpccli_lsa_LSARADTUNREGISTERSECURITYEVENTSOURCE(struct rpc_pipe_client *cli,
3378 TALLOC_CTX *mem_ctx)
3380 struct lsa_LSARADTUNREGISTERSECURITYEVENTSOURCE r;
3385 if (DEBUGLEVEL >= 10) {
3386 NDR_PRINT_IN_DEBUG(lsa_LSARADTUNREGISTERSECURITYEVENTSOURCE, &r);
3389 status = cli->dispatch(cli,
3392 NDR_LSA_LSARADTUNREGISTERSECURITYEVENTSOURCE,
3395 if (!NT_STATUS_IS_OK(status)) {
3399 if (DEBUGLEVEL >= 10) {
3400 NDR_PRINT_OUT_DEBUG(lsa_LSARADTUNREGISTERSECURITYEVENTSOURCE, &r);
3403 if (NT_STATUS_IS_ERR(status)) {
3407 /* Return variables */
3410 return r.out.result;
3413 NTSTATUS rpccli_lsa_LSARADTREPORTSECURITYEVENT(struct rpc_pipe_client *cli,
3414 TALLOC_CTX *mem_ctx)
3416 struct lsa_LSARADTREPORTSECURITYEVENT r;
3421 if (DEBUGLEVEL >= 10) {
3422 NDR_PRINT_IN_DEBUG(lsa_LSARADTREPORTSECURITYEVENT, &r);
3425 status = cli->dispatch(cli,
3428 NDR_LSA_LSARADTREPORTSECURITYEVENT,
3431 if (!NT_STATUS_IS_OK(status)) {
3435 if (DEBUGLEVEL >= 10) {
3436 NDR_PRINT_OUT_DEBUG(lsa_LSARADTREPORTSECURITYEVENT, &r);
3439 if (NT_STATUS_IS_ERR(status)) {
3443 /* Return variables */
3446 return r.out.result;