2 * Unix SMB/CIFS implementation.
3 * client auto-generated by pidl. DO NOT MODIFY!
7 #include "../librpc/gen_ndr/cli_lsa.h"
9 NTSTATUS rpccli_lsa_Close(struct rpc_pipe_client *cli,
11 struct policy_handle *handle /* [in,out] [ref] */)
19 if (DEBUGLEVEL >= 10) {
20 NDR_PRINT_IN_DEBUG(lsa_Close, &r);
23 status = cli->dispatch(cli,
29 if (!NT_STATUS_IS_OK(status)) {
33 if (DEBUGLEVEL >= 10) {
34 NDR_PRINT_OUT_DEBUG(lsa_Close, &r);
37 if (NT_STATUS_IS_ERR(status)) {
41 /* Return variables */
42 *handle = *r.out.handle;
48 NTSTATUS rpccli_lsa_Delete(struct rpc_pipe_client *cli,
50 struct policy_handle *handle /* [in] [ref] */)
58 if (DEBUGLEVEL >= 10) {
59 NDR_PRINT_IN_DEBUG(lsa_Delete, &r);
62 status = cli->dispatch(cli,
68 if (!NT_STATUS_IS_OK(status)) {
72 if (DEBUGLEVEL >= 10) {
73 NDR_PRINT_OUT_DEBUG(lsa_Delete, &r);
76 if (NT_STATUS_IS_ERR(status)) {
80 /* Return variables */
86 NTSTATUS rpccli_lsa_EnumPrivs(struct rpc_pipe_client *cli,
88 struct policy_handle *handle /* [in] [ref] */,
89 uint32_t *resume_handle /* [in,out] [ref] */,
90 struct lsa_PrivArray *privs /* [out] [ref] */,
91 uint32_t max_count /* [in] */)
93 struct lsa_EnumPrivs r;
98 r.in.resume_handle = resume_handle;
99 r.in.max_count = max_count;
101 if (DEBUGLEVEL >= 10) {
102 NDR_PRINT_IN_DEBUG(lsa_EnumPrivs, &r);
105 status = cli->dispatch(cli,
111 if (!NT_STATUS_IS_OK(status)) {
115 if (DEBUGLEVEL >= 10) {
116 NDR_PRINT_OUT_DEBUG(lsa_EnumPrivs, &r);
119 if (NT_STATUS_IS_ERR(status)) {
123 /* Return variables */
124 *resume_handle = *r.out.resume_handle;
125 *privs = *r.out.privs;
131 NTSTATUS rpccli_lsa_QuerySecurity(struct rpc_pipe_client *cli,
133 struct policy_handle *handle /* [in] [ref] */,
134 uint32_t sec_info /* [in] */,
135 struct sec_desc_buf **sdbuf /* [out] [ref] */)
137 struct lsa_QuerySecurity r;
141 r.in.handle = handle;
142 r.in.sec_info = sec_info;
144 if (DEBUGLEVEL >= 10) {
145 NDR_PRINT_IN_DEBUG(lsa_QuerySecurity, &r);
148 status = cli->dispatch(cli,
151 NDR_LSA_QUERYSECURITY,
154 if (!NT_STATUS_IS_OK(status)) {
158 if (DEBUGLEVEL >= 10) {
159 NDR_PRINT_OUT_DEBUG(lsa_QuerySecurity, &r);
162 if (NT_STATUS_IS_ERR(status)) {
166 /* Return variables */
167 *sdbuf = *r.out.sdbuf;
173 NTSTATUS rpccli_lsa_SetSecObj(struct rpc_pipe_client *cli,
175 struct policy_handle *handle /* [in] [ref] */,
176 uint32_t sec_info /* [in] */,
177 struct sec_desc_buf *sdbuf /* [in] [ref] */)
179 struct lsa_SetSecObj r;
183 r.in.handle = handle;
184 r.in.sec_info = sec_info;
187 if (DEBUGLEVEL >= 10) {
188 NDR_PRINT_IN_DEBUG(lsa_SetSecObj, &r);
191 status = cli->dispatch(cli,
197 if (!NT_STATUS_IS_OK(status)) {
201 if (DEBUGLEVEL >= 10) {
202 NDR_PRINT_OUT_DEBUG(lsa_SetSecObj, &r);
205 if (NT_STATUS_IS_ERR(status)) {
209 /* Return variables */
215 NTSTATUS rpccli_lsa_ChangePassword(struct rpc_pipe_client *cli,
218 struct lsa_ChangePassword r;
223 if (DEBUGLEVEL >= 10) {
224 NDR_PRINT_IN_DEBUG(lsa_ChangePassword, &r);
227 status = cli->dispatch(cli,
230 NDR_LSA_CHANGEPASSWORD,
233 if (!NT_STATUS_IS_OK(status)) {
237 if (DEBUGLEVEL >= 10) {
238 NDR_PRINT_OUT_DEBUG(lsa_ChangePassword, &r);
241 if (NT_STATUS_IS_ERR(status)) {
245 /* Return variables */
251 NTSTATUS rpccli_lsa_OpenPolicy(struct rpc_pipe_client *cli,
253 uint16_t *system_name /* [in] [unique] */,
254 struct lsa_ObjectAttribute *attr /* [in] [ref] */,
255 uint32_t access_mask /* [in] */,
256 struct policy_handle *handle /* [out] [ref] */)
258 struct lsa_OpenPolicy r;
262 r.in.system_name = system_name;
264 r.in.access_mask = access_mask;
266 if (DEBUGLEVEL >= 10) {
267 NDR_PRINT_IN_DEBUG(lsa_OpenPolicy, &r);
270 status = cli->dispatch(cli,
276 if (!NT_STATUS_IS_OK(status)) {
280 if (DEBUGLEVEL >= 10) {
281 NDR_PRINT_OUT_DEBUG(lsa_OpenPolicy, &r);
284 if (NT_STATUS_IS_ERR(status)) {
288 /* Return variables */
289 *handle = *r.out.handle;
295 NTSTATUS rpccli_lsa_QueryInfoPolicy(struct rpc_pipe_client *cli,
297 struct policy_handle *handle /* [in] [ref] */,
298 enum lsa_PolicyInfo level /* [in] */,
299 union lsa_PolicyInformation **info /* [out] [ref,switch_is(level)] */)
301 struct lsa_QueryInfoPolicy r;
305 r.in.handle = handle;
308 if (DEBUGLEVEL >= 10) {
309 NDR_PRINT_IN_DEBUG(lsa_QueryInfoPolicy, &r);
312 status = cli->dispatch(cli,
315 NDR_LSA_QUERYINFOPOLICY,
318 if (!NT_STATUS_IS_OK(status)) {
322 if (DEBUGLEVEL >= 10) {
323 NDR_PRINT_OUT_DEBUG(lsa_QueryInfoPolicy, &r);
326 if (NT_STATUS_IS_ERR(status)) {
330 /* Return variables */
337 NTSTATUS rpccli_lsa_SetInfoPolicy(struct rpc_pipe_client *cli,
339 struct policy_handle *handle /* [in] [ref] */,
340 enum lsa_PolicyInfo level /* [in] */,
341 union lsa_PolicyInformation *info /* [in] [ref,switch_is(level)] */)
343 struct lsa_SetInfoPolicy r;
347 r.in.handle = handle;
351 if (DEBUGLEVEL >= 10) {
352 NDR_PRINT_IN_DEBUG(lsa_SetInfoPolicy, &r);
355 status = cli->dispatch(cli,
358 NDR_LSA_SETINFOPOLICY,
361 if (!NT_STATUS_IS_OK(status)) {
365 if (DEBUGLEVEL >= 10) {
366 NDR_PRINT_OUT_DEBUG(lsa_SetInfoPolicy, &r);
369 if (NT_STATUS_IS_ERR(status)) {
373 /* Return variables */
379 NTSTATUS rpccli_lsa_ClearAuditLog(struct rpc_pipe_client *cli,
382 struct lsa_ClearAuditLog r;
387 if (DEBUGLEVEL >= 10) {
388 NDR_PRINT_IN_DEBUG(lsa_ClearAuditLog, &r);
391 status = cli->dispatch(cli,
394 NDR_LSA_CLEARAUDITLOG,
397 if (!NT_STATUS_IS_OK(status)) {
401 if (DEBUGLEVEL >= 10) {
402 NDR_PRINT_OUT_DEBUG(lsa_ClearAuditLog, &r);
405 if (NT_STATUS_IS_ERR(status)) {
409 /* Return variables */
415 NTSTATUS rpccli_lsa_CreateAccount(struct rpc_pipe_client *cli,
417 struct policy_handle *handle /* [in] [ref] */,
418 struct dom_sid2 *sid /* [in] [ref] */,
419 uint32_t access_mask /* [in] */,
420 struct policy_handle *acct_handle /* [out] [ref] */)
422 struct lsa_CreateAccount r;
426 r.in.handle = handle;
428 r.in.access_mask = access_mask;
430 if (DEBUGLEVEL >= 10) {
431 NDR_PRINT_IN_DEBUG(lsa_CreateAccount, &r);
434 status = cli->dispatch(cli,
437 NDR_LSA_CREATEACCOUNT,
440 if (!NT_STATUS_IS_OK(status)) {
444 if (DEBUGLEVEL >= 10) {
445 NDR_PRINT_OUT_DEBUG(lsa_CreateAccount, &r);
448 if (NT_STATUS_IS_ERR(status)) {
452 /* Return variables */
453 *acct_handle = *r.out.acct_handle;
459 NTSTATUS rpccli_lsa_EnumAccounts(struct rpc_pipe_client *cli,
461 struct policy_handle *handle /* [in] [ref] */,
462 uint32_t *resume_handle /* [in,out] [ref] */,
463 struct lsa_SidArray *sids /* [out] [ref] */,
464 uint32_t num_entries /* [in] [range(0,8192)] */)
466 struct lsa_EnumAccounts r;
470 r.in.handle = handle;
471 r.in.resume_handle = resume_handle;
472 r.in.num_entries = num_entries;
474 if (DEBUGLEVEL >= 10) {
475 NDR_PRINT_IN_DEBUG(lsa_EnumAccounts, &r);
478 status = cli->dispatch(cli,
481 NDR_LSA_ENUMACCOUNTS,
484 if (!NT_STATUS_IS_OK(status)) {
488 if (DEBUGLEVEL >= 10) {
489 NDR_PRINT_OUT_DEBUG(lsa_EnumAccounts, &r);
492 if (NT_STATUS_IS_ERR(status)) {
496 /* Return variables */
497 *resume_handle = *r.out.resume_handle;
504 NTSTATUS rpccli_lsa_CreateTrustedDomain(struct rpc_pipe_client *cli,
506 struct policy_handle *policy_handle /* [in] [ref] */,
507 struct lsa_DomainInfo *info /* [in] [ref] */,
508 uint32_t access_mask /* [in] */,
509 struct policy_handle *trustdom_handle /* [out] [ref] */)
511 struct lsa_CreateTrustedDomain r;
515 r.in.policy_handle = policy_handle;
517 r.in.access_mask = access_mask;
519 if (DEBUGLEVEL >= 10) {
520 NDR_PRINT_IN_DEBUG(lsa_CreateTrustedDomain, &r);
523 status = cli->dispatch(cli,
526 NDR_LSA_CREATETRUSTEDDOMAIN,
529 if (!NT_STATUS_IS_OK(status)) {
533 if (DEBUGLEVEL >= 10) {
534 NDR_PRINT_OUT_DEBUG(lsa_CreateTrustedDomain, &r);
537 if (NT_STATUS_IS_ERR(status)) {
541 /* Return variables */
542 *trustdom_handle = *r.out.trustdom_handle;
548 NTSTATUS rpccli_lsa_EnumTrustDom(struct rpc_pipe_client *cli,
550 struct policy_handle *handle /* [in] [ref] */,
551 uint32_t *resume_handle /* [in,out] [ref] */,
552 struct lsa_DomainList *domains /* [out] [ref] */,
553 uint32_t max_size /* [in] */)
555 struct lsa_EnumTrustDom r;
559 r.in.handle = handle;
560 r.in.resume_handle = resume_handle;
561 r.in.max_size = max_size;
563 if (DEBUGLEVEL >= 10) {
564 NDR_PRINT_IN_DEBUG(lsa_EnumTrustDom, &r);
567 status = cli->dispatch(cli,
570 NDR_LSA_ENUMTRUSTDOM,
573 if (!NT_STATUS_IS_OK(status)) {
577 if (DEBUGLEVEL >= 10) {
578 NDR_PRINT_OUT_DEBUG(lsa_EnumTrustDom, &r);
581 if (NT_STATUS_IS_ERR(status)) {
585 /* Return variables */
586 *resume_handle = *r.out.resume_handle;
587 *domains = *r.out.domains;
593 NTSTATUS rpccli_lsa_LookupNames(struct rpc_pipe_client *cli,
595 struct policy_handle *handle /* [in] [ref] */,
596 uint32_t num_names /* [in] [range(0,1000)] */,
597 struct lsa_String *names /* [in] [size_is(num_names)] */,
598 struct lsa_RefDomainList **domains /* [out] [ref] */,
599 struct lsa_TransSidArray *sids /* [in,out] [ref] */,
600 enum lsa_LookupNamesLevel level /* [in] */,
601 uint32_t *count /* [in,out] [ref] */)
603 struct lsa_LookupNames r;
607 r.in.handle = handle;
608 r.in.num_names = num_names;
614 if (DEBUGLEVEL >= 10) {
615 NDR_PRINT_IN_DEBUG(lsa_LookupNames, &r);
618 status = cli->dispatch(cli,
624 if (!NT_STATUS_IS_OK(status)) {
628 if (DEBUGLEVEL >= 10) {
629 NDR_PRINT_OUT_DEBUG(lsa_LookupNames, &r);
632 if (NT_STATUS_IS_ERR(status)) {
636 /* Return variables */
637 *domains = *r.out.domains;
639 *count = *r.out.count;
645 NTSTATUS rpccli_lsa_LookupSids(struct rpc_pipe_client *cli,
647 struct policy_handle *handle /* [in] [ref] */,
648 struct lsa_SidArray *sids /* [in] [ref] */,
649 struct lsa_RefDomainList **domains /* [out] [ref] */,
650 struct lsa_TransNameArray *names /* [in,out] [ref] */,
651 uint16_t level /* [in] */,
652 uint32_t *count /* [in,out] [ref] */)
654 struct lsa_LookupSids r;
658 r.in.handle = handle;
664 if (DEBUGLEVEL >= 10) {
665 NDR_PRINT_IN_DEBUG(lsa_LookupSids, &r);
668 status = cli->dispatch(cli,
674 if (!NT_STATUS_IS_OK(status)) {
678 if (DEBUGLEVEL >= 10) {
679 NDR_PRINT_OUT_DEBUG(lsa_LookupSids, &r);
682 if (NT_STATUS_IS_ERR(status)) {
686 /* Return variables */
687 *domains = *r.out.domains;
688 *names = *r.out.names;
689 *count = *r.out.count;
695 NTSTATUS rpccli_lsa_CreateSecret(struct rpc_pipe_client *cli,
697 struct policy_handle *handle /* [in] [ref] */,
698 struct lsa_String name /* [in] */,
699 uint32_t access_mask /* [in] */,
700 struct policy_handle *sec_handle /* [out] [ref] */)
702 struct lsa_CreateSecret r;
706 r.in.handle = handle;
708 r.in.access_mask = access_mask;
710 if (DEBUGLEVEL >= 10) {
711 NDR_PRINT_IN_DEBUG(lsa_CreateSecret, &r);
714 status = cli->dispatch(cli,
717 NDR_LSA_CREATESECRET,
720 if (!NT_STATUS_IS_OK(status)) {
724 if (DEBUGLEVEL >= 10) {
725 NDR_PRINT_OUT_DEBUG(lsa_CreateSecret, &r);
728 if (NT_STATUS_IS_ERR(status)) {
732 /* Return variables */
733 *sec_handle = *r.out.sec_handle;
739 NTSTATUS rpccli_lsa_OpenAccount(struct rpc_pipe_client *cli,
741 struct policy_handle *handle /* [in] [ref] */,
742 struct dom_sid2 *sid /* [in] [ref] */,
743 uint32_t access_mask /* [in] */,
744 struct policy_handle *acct_handle /* [out] [ref] */)
746 struct lsa_OpenAccount r;
750 r.in.handle = handle;
752 r.in.access_mask = access_mask;
754 if (DEBUGLEVEL >= 10) {
755 NDR_PRINT_IN_DEBUG(lsa_OpenAccount, &r);
758 status = cli->dispatch(cli,
764 if (!NT_STATUS_IS_OK(status)) {
768 if (DEBUGLEVEL >= 10) {
769 NDR_PRINT_OUT_DEBUG(lsa_OpenAccount, &r);
772 if (NT_STATUS_IS_ERR(status)) {
776 /* Return variables */
777 *acct_handle = *r.out.acct_handle;
783 NTSTATUS rpccli_lsa_EnumPrivsAccount(struct rpc_pipe_client *cli,
785 struct policy_handle *handle /* [in] [ref] */,
786 struct lsa_PrivilegeSet **privs /* [out] [ref] */)
788 struct lsa_EnumPrivsAccount r;
792 r.in.handle = handle;
794 if (DEBUGLEVEL >= 10) {
795 NDR_PRINT_IN_DEBUG(lsa_EnumPrivsAccount, &r);
798 status = cli->dispatch(cli,
801 NDR_LSA_ENUMPRIVSACCOUNT,
804 if (!NT_STATUS_IS_OK(status)) {
808 if (DEBUGLEVEL >= 10) {
809 NDR_PRINT_OUT_DEBUG(lsa_EnumPrivsAccount, &r);
812 if (NT_STATUS_IS_ERR(status)) {
816 /* Return variables */
817 *privs = *r.out.privs;
823 NTSTATUS rpccli_lsa_AddPrivilegesToAccount(struct rpc_pipe_client *cli,
825 struct policy_handle *handle /* [in] [ref] */,
826 struct lsa_PrivilegeSet *privs /* [in] [ref] */)
828 struct lsa_AddPrivilegesToAccount r;
832 r.in.handle = handle;
835 if (DEBUGLEVEL >= 10) {
836 NDR_PRINT_IN_DEBUG(lsa_AddPrivilegesToAccount, &r);
839 status = cli->dispatch(cli,
842 NDR_LSA_ADDPRIVILEGESTOACCOUNT,
845 if (!NT_STATUS_IS_OK(status)) {
849 if (DEBUGLEVEL >= 10) {
850 NDR_PRINT_OUT_DEBUG(lsa_AddPrivilegesToAccount, &r);
853 if (NT_STATUS_IS_ERR(status)) {
857 /* Return variables */
863 NTSTATUS rpccli_lsa_RemovePrivilegesFromAccount(struct rpc_pipe_client *cli,
865 struct policy_handle *handle /* [in] [ref] */,
866 uint8_t remove_all /* [in] */,
867 struct lsa_PrivilegeSet *privs /* [in] [unique] */)
869 struct lsa_RemovePrivilegesFromAccount r;
873 r.in.handle = handle;
874 r.in.remove_all = remove_all;
877 if (DEBUGLEVEL >= 10) {
878 NDR_PRINT_IN_DEBUG(lsa_RemovePrivilegesFromAccount, &r);
881 status = cli->dispatch(cli,
884 NDR_LSA_REMOVEPRIVILEGESFROMACCOUNT,
887 if (!NT_STATUS_IS_OK(status)) {
891 if (DEBUGLEVEL >= 10) {
892 NDR_PRINT_OUT_DEBUG(lsa_RemovePrivilegesFromAccount, &r);
895 if (NT_STATUS_IS_ERR(status)) {
899 /* Return variables */
905 NTSTATUS rpccli_lsa_GetQuotasForAccount(struct rpc_pipe_client *cli,
908 struct lsa_GetQuotasForAccount r;
913 if (DEBUGLEVEL >= 10) {
914 NDR_PRINT_IN_DEBUG(lsa_GetQuotasForAccount, &r);
917 status = cli->dispatch(cli,
920 NDR_LSA_GETQUOTASFORACCOUNT,
923 if (!NT_STATUS_IS_OK(status)) {
927 if (DEBUGLEVEL >= 10) {
928 NDR_PRINT_OUT_DEBUG(lsa_GetQuotasForAccount, &r);
931 if (NT_STATUS_IS_ERR(status)) {
935 /* Return variables */
941 NTSTATUS rpccli_lsa_SetQuotasForAccount(struct rpc_pipe_client *cli,
944 struct lsa_SetQuotasForAccount r;
949 if (DEBUGLEVEL >= 10) {
950 NDR_PRINT_IN_DEBUG(lsa_SetQuotasForAccount, &r);
953 status = cli->dispatch(cli,
956 NDR_LSA_SETQUOTASFORACCOUNT,
959 if (!NT_STATUS_IS_OK(status)) {
963 if (DEBUGLEVEL >= 10) {
964 NDR_PRINT_OUT_DEBUG(lsa_SetQuotasForAccount, &r);
967 if (NT_STATUS_IS_ERR(status)) {
971 /* Return variables */
977 NTSTATUS rpccli_lsa_GetSystemAccessAccount(struct rpc_pipe_client *cli,
979 struct policy_handle *handle /* [in] [ref] */,
980 uint32_t *access_mask /* [out] [ref] */)
982 struct lsa_GetSystemAccessAccount r;
986 r.in.handle = handle;
988 if (DEBUGLEVEL >= 10) {
989 NDR_PRINT_IN_DEBUG(lsa_GetSystemAccessAccount, &r);
992 status = cli->dispatch(cli,
995 NDR_LSA_GETSYSTEMACCESSACCOUNT,
998 if (!NT_STATUS_IS_OK(status)) {
1002 if (DEBUGLEVEL >= 10) {
1003 NDR_PRINT_OUT_DEBUG(lsa_GetSystemAccessAccount, &r);
1006 if (NT_STATUS_IS_ERR(status)) {
1010 /* Return variables */
1011 *access_mask = *r.out.access_mask;
1014 return r.out.result;
1017 NTSTATUS rpccli_lsa_SetSystemAccessAccount(struct rpc_pipe_client *cli,
1018 TALLOC_CTX *mem_ctx,
1019 struct policy_handle *handle /* [in] [ref] */,
1020 uint32_t access_mask /* [in] */)
1022 struct lsa_SetSystemAccessAccount r;
1026 r.in.handle = handle;
1027 r.in.access_mask = access_mask;
1029 if (DEBUGLEVEL >= 10) {
1030 NDR_PRINT_IN_DEBUG(lsa_SetSystemAccessAccount, &r);
1033 status = cli->dispatch(cli,
1036 NDR_LSA_SETSYSTEMACCESSACCOUNT,
1039 if (!NT_STATUS_IS_OK(status)) {
1043 if (DEBUGLEVEL >= 10) {
1044 NDR_PRINT_OUT_DEBUG(lsa_SetSystemAccessAccount, &r);
1047 if (NT_STATUS_IS_ERR(status)) {
1051 /* Return variables */
1054 return r.out.result;
1057 NTSTATUS rpccli_lsa_OpenTrustedDomain(struct rpc_pipe_client *cli,
1058 TALLOC_CTX *mem_ctx,
1059 struct policy_handle *handle /* [in] [ref] */,
1060 struct dom_sid2 *sid /* [in] [ref] */,
1061 uint32_t access_mask /* [in] */,
1062 struct policy_handle *trustdom_handle /* [out] [ref] */)
1064 struct lsa_OpenTrustedDomain r;
1068 r.in.handle = handle;
1070 r.in.access_mask = access_mask;
1072 if (DEBUGLEVEL >= 10) {
1073 NDR_PRINT_IN_DEBUG(lsa_OpenTrustedDomain, &r);
1076 status = cli->dispatch(cli,
1079 NDR_LSA_OPENTRUSTEDDOMAIN,
1082 if (!NT_STATUS_IS_OK(status)) {
1086 if (DEBUGLEVEL >= 10) {
1087 NDR_PRINT_OUT_DEBUG(lsa_OpenTrustedDomain, &r);
1090 if (NT_STATUS_IS_ERR(status)) {
1094 /* Return variables */
1095 *trustdom_handle = *r.out.trustdom_handle;
1098 return r.out.result;
1101 NTSTATUS rpccli_lsa_QueryTrustedDomainInfo(struct rpc_pipe_client *cli,
1102 TALLOC_CTX *mem_ctx,
1103 struct policy_handle *trustdom_handle /* [in] [ref] */,
1104 enum lsa_TrustDomInfoEnum level /* [in] */,
1105 union lsa_TrustedDomainInfo **info /* [out] [ref,switch_is(level)] */)
1107 struct lsa_QueryTrustedDomainInfo r;
1111 r.in.trustdom_handle = trustdom_handle;
1114 if (DEBUGLEVEL >= 10) {
1115 NDR_PRINT_IN_DEBUG(lsa_QueryTrustedDomainInfo, &r);
1118 status = cli->dispatch(cli,
1121 NDR_LSA_QUERYTRUSTEDDOMAININFO,
1124 if (!NT_STATUS_IS_OK(status)) {
1128 if (DEBUGLEVEL >= 10) {
1129 NDR_PRINT_OUT_DEBUG(lsa_QueryTrustedDomainInfo, &r);
1132 if (NT_STATUS_IS_ERR(status)) {
1136 /* Return variables */
1137 *info = *r.out.info;
1140 return r.out.result;
1143 NTSTATUS rpccli_lsa_SetInformationTrustedDomain(struct rpc_pipe_client *cli,
1144 TALLOC_CTX *mem_ctx,
1145 struct policy_handle *trustdom_handle /* [in] [ref] */,
1146 enum lsa_TrustDomInfoEnum level /* [in] */,
1147 union lsa_TrustedDomainInfo *info /* [in] [ref,switch_is(level)] */)
1149 struct lsa_SetInformationTrustedDomain r;
1153 r.in.trustdom_handle = trustdom_handle;
1157 if (DEBUGLEVEL >= 10) {
1158 NDR_PRINT_IN_DEBUG(lsa_SetInformationTrustedDomain, &r);
1161 status = cli->dispatch(cli,
1164 NDR_LSA_SETINFORMATIONTRUSTEDDOMAIN,
1167 if (!NT_STATUS_IS_OK(status)) {
1171 if (DEBUGLEVEL >= 10) {
1172 NDR_PRINT_OUT_DEBUG(lsa_SetInformationTrustedDomain, &r);
1175 if (NT_STATUS_IS_ERR(status)) {
1179 /* Return variables */
1182 return r.out.result;
1185 NTSTATUS rpccli_lsa_OpenSecret(struct rpc_pipe_client *cli,
1186 TALLOC_CTX *mem_ctx,
1187 struct policy_handle *handle /* [in] [ref] */,
1188 struct lsa_String name /* [in] */,
1189 uint32_t access_mask /* [in] */,
1190 struct policy_handle *sec_handle /* [out] [ref] */)
1192 struct lsa_OpenSecret r;
1196 r.in.handle = handle;
1198 r.in.access_mask = access_mask;
1200 if (DEBUGLEVEL >= 10) {
1201 NDR_PRINT_IN_DEBUG(lsa_OpenSecret, &r);
1204 status = cli->dispatch(cli,
1210 if (!NT_STATUS_IS_OK(status)) {
1214 if (DEBUGLEVEL >= 10) {
1215 NDR_PRINT_OUT_DEBUG(lsa_OpenSecret, &r);
1218 if (NT_STATUS_IS_ERR(status)) {
1222 /* Return variables */
1223 *sec_handle = *r.out.sec_handle;
1226 return r.out.result;
1229 NTSTATUS rpccli_lsa_SetSecret(struct rpc_pipe_client *cli,
1230 TALLOC_CTX *mem_ctx,
1231 struct policy_handle *sec_handle /* [in] [ref] */,
1232 struct lsa_DATA_BUF *new_val /* [in] [unique] */,
1233 struct lsa_DATA_BUF *old_val /* [in] [unique] */)
1235 struct lsa_SetSecret r;
1239 r.in.sec_handle = sec_handle;
1240 r.in.new_val = new_val;
1241 r.in.old_val = old_val;
1243 if (DEBUGLEVEL >= 10) {
1244 NDR_PRINT_IN_DEBUG(lsa_SetSecret, &r);
1247 status = cli->dispatch(cli,
1253 if (!NT_STATUS_IS_OK(status)) {
1257 if (DEBUGLEVEL >= 10) {
1258 NDR_PRINT_OUT_DEBUG(lsa_SetSecret, &r);
1261 if (NT_STATUS_IS_ERR(status)) {
1265 /* Return variables */
1268 return r.out.result;
1271 NTSTATUS rpccli_lsa_QuerySecret(struct rpc_pipe_client *cli,
1272 TALLOC_CTX *mem_ctx,
1273 struct policy_handle *sec_handle /* [in] [ref] */,
1274 struct lsa_DATA_BUF_PTR *new_val /* [in,out] [unique] */,
1275 NTTIME *new_mtime /* [in,out] [unique] */,
1276 struct lsa_DATA_BUF_PTR *old_val /* [in,out] [unique] */,
1277 NTTIME *old_mtime /* [in,out] [unique] */)
1279 struct lsa_QuerySecret r;
1283 r.in.sec_handle = sec_handle;
1284 r.in.new_val = new_val;
1285 r.in.new_mtime = new_mtime;
1286 r.in.old_val = old_val;
1287 r.in.old_mtime = old_mtime;
1289 if (DEBUGLEVEL >= 10) {
1290 NDR_PRINT_IN_DEBUG(lsa_QuerySecret, &r);
1293 status = cli->dispatch(cli,
1296 NDR_LSA_QUERYSECRET,
1299 if (!NT_STATUS_IS_OK(status)) {
1303 if (DEBUGLEVEL >= 10) {
1304 NDR_PRINT_OUT_DEBUG(lsa_QuerySecret, &r);
1307 if (NT_STATUS_IS_ERR(status)) {
1311 /* Return variables */
1312 if (new_val && r.out.new_val) {
1313 *new_val = *r.out.new_val;
1315 if (new_mtime && r.out.new_mtime) {
1316 *new_mtime = *r.out.new_mtime;
1318 if (old_val && r.out.old_val) {
1319 *old_val = *r.out.old_val;
1321 if (old_mtime && r.out.old_mtime) {
1322 *old_mtime = *r.out.old_mtime;
1326 return r.out.result;
1329 NTSTATUS rpccli_lsa_LookupPrivValue(struct rpc_pipe_client *cli,
1330 TALLOC_CTX *mem_ctx,
1331 struct policy_handle *handle /* [in] [ref] */,
1332 struct lsa_String *name /* [in] [ref] */,
1333 struct lsa_LUID *luid /* [out] [ref] */)
1335 struct lsa_LookupPrivValue r;
1339 r.in.handle = handle;
1342 if (DEBUGLEVEL >= 10) {
1343 NDR_PRINT_IN_DEBUG(lsa_LookupPrivValue, &r);
1346 status = cli->dispatch(cli,
1349 NDR_LSA_LOOKUPPRIVVALUE,
1352 if (!NT_STATUS_IS_OK(status)) {
1356 if (DEBUGLEVEL >= 10) {
1357 NDR_PRINT_OUT_DEBUG(lsa_LookupPrivValue, &r);
1360 if (NT_STATUS_IS_ERR(status)) {
1364 /* Return variables */
1365 *luid = *r.out.luid;
1368 return r.out.result;
1371 NTSTATUS rpccli_lsa_LookupPrivName(struct rpc_pipe_client *cli,
1372 TALLOC_CTX *mem_ctx,
1373 struct policy_handle *handle /* [in] [ref] */,
1374 struct lsa_LUID *luid /* [in] [ref] */,
1375 struct lsa_StringLarge **name /* [out] [ref] */)
1377 struct lsa_LookupPrivName r;
1381 r.in.handle = handle;
1384 if (DEBUGLEVEL >= 10) {
1385 NDR_PRINT_IN_DEBUG(lsa_LookupPrivName, &r);
1388 status = cli->dispatch(cli,
1391 NDR_LSA_LOOKUPPRIVNAME,
1394 if (!NT_STATUS_IS_OK(status)) {
1398 if (DEBUGLEVEL >= 10) {
1399 NDR_PRINT_OUT_DEBUG(lsa_LookupPrivName, &r);
1402 if (NT_STATUS_IS_ERR(status)) {
1406 /* Return variables */
1407 *name = *r.out.name;
1410 return r.out.result;
1413 NTSTATUS rpccli_lsa_LookupPrivDisplayName(struct rpc_pipe_client *cli,
1414 TALLOC_CTX *mem_ctx,
1415 struct policy_handle *handle /* [in] [ref] */,
1416 struct lsa_String *name /* [in] [ref] */,
1417 uint16_t language_id /* [in] */,
1418 uint16_t language_id_sys /* [in] */,
1419 struct lsa_StringLarge **disp_name /* [out] [ref] */,
1420 uint16_t *returned_language_id /* [out] [ref] */)
1422 struct lsa_LookupPrivDisplayName r;
1426 r.in.handle = handle;
1428 r.in.language_id = language_id;
1429 r.in.language_id_sys = language_id_sys;
1431 if (DEBUGLEVEL >= 10) {
1432 NDR_PRINT_IN_DEBUG(lsa_LookupPrivDisplayName, &r);
1435 status = cli->dispatch(cli,
1438 NDR_LSA_LOOKUPPRIVDISPLAYNAME,
1441 if (!NT_STATUS_IS_OK(status)) {
1445 if (DEBUGLEVEL >= 10) {
1446 NDR_PRINT_OUT_DEBUG(lsa_LookupPrivDisplayName, &r);
1449 if (NT_STATUS_IS_ERR(status)) {
1453 /* Return variables */
1454 *disp_name = *r.out.disp_name;
1455 *returned_language_id = *r.out.returned_language_id;
1458 return r.out.result;
1461 NTSTATUS rpccli_lsa_DeleteObject(struct rpc_pipe_client *cli,
1462 TALLOC_CTX *mem_ctx,
1463 struct policy_handle *handle /* [in,out] [ref] */)
1465 struct lsa_DeleteObject r;
1469 r.in.handle = handle;
1471 if (DEBUGLEVEL >= 10) {
1472 NDR_PRINT_IN_DEBUG(lsa_DeleteObject, &r);
1475 status = cli->dispatch(cli,
1478 NDR_LSA_DELETEOBJECT,
1481 if (!NT_STATUS_IS_OK(status)) {
1485 if (DEBUGLEVEL >= 10) {
1486 NDR_PRINT_OUT_DEBUG(lsa_DeleteObject, &r);
1489 if (NT_STATUS_IS_ERR(status)) {
1493 /* Return variables */
1494 *handle = *r.out.handle;
1497 return r.out.result;
1500 NTSTATUS rpccli_lsa_EnumAccountsWithUserRight(struct rpc_pipe_client *cli,
1501 TALLOC_CTX *mem_ctx,
1502 struct policy_handle *handle /* [in] [ref] */,
1503 struct lsa_String *name /* [in] [unique] */,
1504 struct lsa_SidArray *sids /* [out] [ref] */)
1506 struct lsa_EnumAccountsWithUserRight r;
1510 r.in.handle = handle;
1513 if (DEBUGLEVEL >= 10) {
1514 NDR_PRINT_IN_DEBUG(lsa_EnumAccountsWithUserRight, &r);
1517 status = cli->dispatch(cli,
1520 NDR_LSA_ENUMACCOUNTSWITHUSERRIGHT,
1523 if (!NT_STATUS_IS_OK(status)) {
1527 if (DEBUGLEVEL >= 10) {
1528 NDR_PRINT_OUT_DEBUG(lsa_EnumAccountsWithUserRight, &r);
1531 if (NT_STATUS_IS_ERR(status)) {
1535 /* Return variables */
1536 *sids = *r.out.sids;
1539 return r.out.result;
1542 NTSTATUS rpccli_lsa_EnumAccountRights(struct rpc_pipe_client *cli,
1543 TALLOC_CTX *mem_ctx,
1544 struct policy_handle *handle /* [in] [ref] */,
1545 struct dom_sid2 *sid /* [in] [ref] */,
1546 struct lsa_RightSet *rights /* [out] [ref] */)
1548 struct lsa_EnumAccountRights r;
1552 r.in.handle = handle;
1555 if (DEBUGLEVEL >= 10) {
1556 NDR_PRINT_IN_DEBUG(lsa_EnumAccountRights, &r);
1559 status = cli->dispatch(cli,
1562 NDR_LSA_ENUMACCOUNTRIGHTS,
1565 if (!NT_STATUS_IS_OK(status)) {
1569 if (DEBUGLEVEL >= 10) {
1570 NDR_PRINT_OUT_DEBUG(lsa_EnumAccountRights, &r);
1573 if (NT_STATUS_IS_ERR(status)) {
1577 /* Return variables */
1578 *rights = *r.out.rights;
1581 return r.out.result;
1584 NTSTATUS rpccli_lsa_AddAccountRights(struct rpc_pipe_client *cli,
1585 TALLOC_CTX *mem_ctx,
1586 struct policy_handle *handle /* [in] [ref] */,
1587 struct dom_sid2 *sid /* [in] [ref] */,
1588 struct lsa_RightSet *rights /* [in] [ref] */)
1590 struct lsa_AddAccountRights r;
1594 r.in.handle = handle;
1596 r.in.rights = rights;
1598 if (DEBUGLEVEL >= 10) {
1599 NDR_PRINT_IN_DEBUG(lsa_AddAccountRights, &r);
1602 status = cli->dispatch(cli,
1605 NDR_LSA_ADDACCOUNTRIGHTS,
1608 if (!NT_STATUS_IS_OK(status)) {
1612 if (DEBUGLEVEL >= 10) {
1613 NDR_PRINT_OUT_DEBUG(lsa_AddAccountRights, &r);
1616 if (NT_STATUS_IS_ERR(status)) {
1620 /* Return variables */
1623 return r.out.result;
1626 NTSTATUS rpccli_lsa_RemoveAccountRights(struct rpc_pipe_client *cli,
1627 TALLOC_CTX *mem_ctx,
1628 struct policy_handle *handle /* [in] [ref] */,
1629 struct dom_sid2 *sid /* [in] [ref] */,
1630 uint8_t remove_all /* [in] */,
1631 struct lsa_RightSet *rights /* [in] [ref] */)
1633 struct lsa_RemoveAccountRights r;
1637 r.in.handle = handle;
1639 r.in.remove_all = remove_all;
1640 r.in.rights = rights;
1642 if (DEBUGLEVEL >= 10) {
1643 NDR_PRINT_IN_DEBUG(lsa_RemoveAccountRights, &r);
1646 status = cli->dispatch(cli,
1649 NDR_LSA_REMOVEACCOUNTRIGHTS,
1652 if (!NT_STATUS_IS_OK(status)) {
1656 if (DEBUGLEVEL >= 10) {
1657 NDR_PRINT_OUT_DEBUG(lsa_RemoveAccountRights, &r);
1660 if (NT_STATUS_IS_ERR(status)) {
1664 /* Return variables */
1667 return r.out.result;
1670 NTSTATUS rpccli_lsa_QueryTrustedDomainInfoBySid(struct rpc_pipe_client *cli,
1671 TALLOC_CTX *mem_ctx,
1672 struct policy_handle *handle /* [in] [ref] */,
1673 struct dom_sid2 *dom_sid /* [in] [ref] */,
1674 enum lsa_TrustDomInfoEnum level /* [in] */,
1675 union lsa_TrustedDomainInfo **info /* [out] [ref,switch_is(level)] */)
1677 struct lsa_QueryTrustedDomainInfoBySid r;
1681 r.in.handle = handle;
1682 r.in.dom_sid = dom_sid;
1685 if (DEBUGLEVEL >= 10) {
1686 NDR_PRINT_IN_DEBUG(lsa_QueryTrustedDomainInfoBySid, &r);
1689 status = cli->dispatch(cli,
1692 NDR_LSA_QUERYTRUSTEDDOMAININFOBYSID,
1695 if (!NT_STATUS_IS_OK(status)) {
1699 if (DEBUGLEVEL >= 10) {
1700 NDR_PRINT_OUT_DEBUG(lsa_QueryTrustedDomainInfoBySid, &r);
1703 if (NT_STATUS_IS_ERR(status)) {
1707 /* Return variables */
1708 *info = *r.out.info;
1711 return r.out.result;
1714 NTSTATUS rpccli_lsa_SetTrustedDomainInfo(struct rpc_pipe_client *cli,
1715 TALLOC_CTX *mem_ctx,
1716 struct policy_handle *handle /* [in] [ref] */,
1717 struct dom_sid2 *dom_sid /* [in] [ref] */,
1718 enum lsa_TrustDomInfoEnum level /* [in] */,
1719 union lsa_TrustedDomainInfo *info /* [in] [ref,switch_is(level)] */)
1721 struct lsa_SetTrustedDomainInfo r;
1725 r.in.handle = handle;
1726 r.in.dom_sid = dom_sid;
1730 if (DEBUGLEVEL >= 10) {
1731 NDR_PRINT_IN_DEBUG(lsa_SetTrustedDomainInfo, &r);
1734 status = cli->dispatch(cli,
1737 NDR_LSA_SETTRUSTEDDOMAININFO,
1740 if (!NT_STATUS_IS_OK(status)) {
1744 if (DEBUGLEVEL >= 10) {
1745 NDR_PRINT_OUT_DEBUG(lsa_SetTrustedDomainInfo, &r);
1748 if (NT_STATUS_IS_ERR(status)) {
1752 /* Return variables */
1755 return r.out.result;
1758 NTSTATUS rpccli_lsa_DeleteTrustedDomain(struct rpc_pipe_client *cli,
1759 TALLOC_CTX *mem_ctx,
1760 struct policy_handle *handle /* [in] [ref] */,
1761 struct dom_sid2 *dom_sid /* [in] [ref] */)
1763 struct lsa_DeleteTrustedDomain r;
1767 r.in.handle = handle;
1768 r.in.dom_sid = dom_sid;
1770 if (DEBUGLEVEL >= 10) {
1771 NDR_PRINT_IN_DEBUG(lsa_DeleteTrustedDomain, &r);
1774 status = cli->dispatch(cli,
1777 NDR_LSA_DELETETRUSTEDDOMAIN,
1780 if (!NT_STATUS_IS_OK(status)) {
1784 if (DEBUGLEVEL >= 10) {
1785 NDR_PRINT_OUT_DEBUG(lsa_DeleteTrustedDomain, &r);
1788 if (NT_STATUS_IS_ERR(status)) {
1792 /* Return variables */
1795 return r.out.result;
1798 NTSTATUS rpccli_lsa_StorePrivateData(struct rpc_pipe_client *cli,
1799 TALLOC_CTX *mem_ctx)
1801 struct lsa_StorePrivateData r;
1806 if (DEBUGLEVEL >= 10) {
1807 NDR_PRINT_IN_DEBUG(lsa_StorePrivateData, &r);
1810 status = cli->dispatch(cli,
1813 NDR_LSA_STOREPRIVATEDATA,
1816 if (!NT_STATUS_IS_OK(status)) {
1820 if (DEBUGLEVEL >= 10) {
1821 NDR_PRINT_OUT_DEBUG(lsa_StorePrivateData, &r);
1824 if (NT_STATUS_IS_ERR(status)) {
1828 /* Return variables */
1831 return r.out.result;
1834 NTSTATUS rpccli_lsa_RetrievePrivateData(struct rpc_pipe_client *cli,
1835 TALLOC_CTX *mem_ctx)
1837 struct lsa_RetrievePrivateData r;
1842 if (DEBUGLEVEL >= 10) {
1843 NDR_PRINT_IN_DEBUG(lsa_RetrievePrivateData, &r);
1846 status = cli->dispatch(cli,
1849 NDR_LSA_RETRIEVEPRIVATEDATA,
1852 if (!NT_STATUS_IS_OK(status)) {
1856 if (DEBUGLEVEL >= 10) {
1857 NDR_PRINT_OUT_DEBUG(lsa_RetrievePrivateData, &r);
1860 if (NT_STATUS_IS_ERR(status)) {
1864 /* Return variables */
1867 return r.out.result;
1870 NTSTATUS rpccli_lsa_OpenPolicy2(struct rpc_pipe_client *cli,
1871 TALLOC_CTX *mem_ctx,
1872 const char *system_name /* [in] [unique,charset(UTF16)] */,
1873 struct lsa_ObjectAttribute *attr /* [in] [ref] */,
1874 uint32_t access_mask /* [in] */,
1875 struct policy_handle *handle /* [out] [ref] */)
1877 struct lsa_OpenPolicy2 r;
1881 r.in.system_name = system_name;
1883 r.in.access_mask = access_mask;
1885 if (DEBUGLEVEL >= 10) {
1886 NDR_PRINT_IN_DEBUG(lsa_OpenPolicy2, &r);
1889 status = cli->dispatch(cli,
1892 NDR_LSA_OPENPOLICY2,
1895 if (!NT_STATUS_IS_OK(status)) {
1899 if (DEBUGLEVEL >= 10) {
1900 NDR_PRINT_OUT_DEBUG(lsa_OpenPolicy2, &r);
1903 if (NT_STATUS_IS_ERR(status)) {
1907 /* Return variables */
1908 *handle = *r.out.handle;
1911 return r.out.result;
1914 NTSTATUS rpccli_lsa_GetUserName(struct rpc_pipe_client *cli,
1915 TALLOC_CTX *mem_ctx,
1916 const char *system_name /* [in] [unique,charset(UTF16)] */,
1917 struct lsa_String **account_name /* [in,out] [ref] */,
1918 struct lsa_String **authority_name /* [in,out] [unique] */)
1920 struct lsa_GetUserName r;
1924 r.in.system_name = system_name;
1925 r.in.account_name = account_name;
1926 r.in.authority_name = authority_name;
1928 if (DEBUGLEVEL >= 10) {
1929 NDR_PRINT_IN_DEBUG(lsa_GetUserName, &r);
1932 status = cli->dispatch(cli,
1935 NDR_LSA_GETUSERNAME,
1938 if (!NT_STATUS_IS_OK(status)) {
1942 if (DEBUGLEVEL >= 10) {
1943 NDR_PRINT_OUT_DEBUG(lsa_GetUserName, &r);
1946 if (NT_STATUS_IS_ERR(status)) {
1950 /* Return variables */
1951 *account_name = *r.out.account_name;
1952 if (authority_name && r.out.authority_name) {
1953 *authority_name = *r.out.authority_name;
1957 return r.out.result;
1960 NTSTATUS rpccli_lsa_QueryInfoPolicy2(struct rpc_pipe_client *cli,
1961 TALLOC_CTX *mem_ctx,
1962 struct policy_handle *handle /* [in] [ref] */,
1963 enum lsa_PolicyInfo level /* [in] */,
1964 union lsa_PolicyInformation **info /* [out] [ref,switch_is(level)] */)
1966 struct lsa_QueryInfoPolicy2 r;
1970 r.in.handle = handle;
1973 if (DEBUGLEVEL >= 10) {
1974 NDR_PRINT_IN_DEBUG(lsa_QueryInfoPolicy2, &r);
1977 status = cli->dispatch(cli,
1980 NDR_LSA_QUERYINFOPOLICY2,
1983 if (!NT_STATUS_IS_OK(status)) {
1987 if (DEBUGLEVEL >= 10) {
1988 NDR_PRINT_OUT_DEBUG(lsa_QueryInfoPolicy2, &r);
1991 if (NT_STATUS_IS_ERR(status)) {
1995 /* Return variables */
1996 *info = *r.out.info;
1999 return r.out.result;
2002 NTSTATUS rpccli_lsa_SetInfoPolicy2(struct rpc_pipe_client *cli,
2003 TALLOC_CTX *mem_ctx,
2004 struct policy_handle *handle /* [in] [ref] */,
2005 enum lsa_PolicyInfo level /* [in] */,
2006 union lsa_PolicyInformation *info /* [in] [ref,switch_is(level)] */)
2008 struct lsa_SetInfoPolicy2 r;
2012 r.in.handle = handle;
2016 if (DEBUGLEVEL >= 10) {
2017 NDR_PRINT_IN_DEBUG(lsa_SetInfoPolicy2, &r);
2020 status = cli->dispatch(cli,
2023 NDR_LSA_SETINFOPOLICY2,
2026 if (!NT_STATUS_IS_OK(status)) {
2030 if (DEBUGLEVEL >= 10) {
2031 NDR_PRINT_OUT_DEBUG(lsa_SetInfoPolicy2, &r);
2034 if (NT_STATUS_IS_ERR(status)) {
2038 /* Return variables */
2041 return r.out.result;
2044 NTSTATUS rpccli_lsa_QueryTrustedDomainInfoByName(struct rpc_pipe_client *cli,
2045 TALLOC_CTX *mem_ctx,
2046 struct policy_handle *handle /* [in] [ref] */,
2047 struct lsa_String *trusted_domain /* [in] [ref] */,
2048 enum lsa_TrustDomInfoEnum level /* [in] */,
2049 union lsa_TrustedDomainInfo **info /* [out] [ref,switch_is(level)] */)
2051 struct lsa_QueryTrustedDomainInfoByName r;
2055 r.in.handle = handle;
2056 r.in.trusted_domain = trusted_domain;
2059 if (DEBUGLEVEL >= 10) {
2060 NDR_PRINT_IN_DEBUG(lsa_QueryTrustedDomainInfoByName, &r);
2063 status = cli->dispatch(cli,
2066 NDR_LSA_QUERYTRUSTEDDOMAININFOBYNAME,
2069 if (!NT_STATUS_IS_OK(status)) {
2073 if (DEBUGLEVEL >= 10) {
2074 NDR_PRINT_OUT_DEBUG(lsa_QueryTrustedDomainInfoByName, &r);
2077 if (NT_STATUS_IS_ERR(status)) {
2081 /* Return variables */
2082 *info = *r.out.info;
2085 return r.out.result;
2088 NTSTATUS rpccli_lsa_SetTrustedDomainInfoByName(struct rpc_pipe_client *cli,
2089 TALLOC_CTX *mem_ctx,
2090 struct policy_handle *handle /* [in] [ref] */,
2091 struct lsa_String trusted_domain /* [in] */,
2092 enum lsa_TrustDomInfoEnum level /* [in] */,
2093 union lsa_TrustedDomainInfo *info /* [in] [unique,switch_is(level)] */)
2095 struct lsa_SetTrustedDomainInfoByName r;
2099 r.in.handle = handle;
2100 r.in.trusted_domain = trusted_domain;
2104 if (DEBUGLEVEL >= 10) {
2105 NDR_PRINT_IN_DEBUG(lsa_SetTrustedDomainInfoByName, &r);
2108 status = cli->dispatch(cli,
2111 NDR_LSA_SETTRUSTEDDOMAININFOBYNAME,
2114 if (!NT_STATUS_IS_OK(status)) {
2118 if (DEBUGLEVEL >= 10) {
2119 NDR_PRINT_OUT_DEBUG(lsa_SetTrustedDomainInfoByName, &r);
2122 if (NT_STATUS_IS_ERR(status)) {
2126 /* Return variables */
2129 return r.out.result;
2132 NTSTATUS rpccli_lsa_EnumTrustedDomainsEx(struct rpc_pipe_client *cli,
2133 TALLOC_CTX *mem_ctx,
2134 struct policy_handle *handle /* [in] [ref] */,
2135 uint32_t *resume_handle /* [in,out] [ref] */,
2136 struct lsa_DomainListEx *domains /* [out] [ref] */,
2137 uint32_t max_size /* [in] */)
2139 struct lsa_EnumTrustedDomainsEx r;
2143 r.in.handle = handle;
2144 r.in.resume_handle = resume_handle;
2145 r.in.max_size = max_size;
2147 if (DEBUGLEVEL >= 10) {
2148 NDR_PRINT_IN_DEBUG(lsa_EnumTrustedDomainsEx, &r);
2151 status = cli->dispatch(cli,
2154 NDR_LSA_ENUMTRUSTEDDOMAINSEX,
2157 if (!NT_STATUS_IS_OK(status)) {
2161 if (DEBUGLEVEL >= 10) {
2162 NDR_PRINT_OUT_DEBUG(lsa_EnumTrustedDomainsEx, &r);
2165 if (NT_STATUS_IS_ERR(status)) {
2169 /* Return variables */
2170 *resume_handle = *r.out.resume_handle;
2171 *domains = *r.out.domains;
2174 return r.out.result;
2177 NTSTATUS rpccli_lsa_CreateTrustedDomainEx(struct rpc_pipe_client *cli,
2178 TALLOC_CTX *mem_ctx,
2179 struct policy_handle *policy_handle /* [in] [ref] */,
2180 struct lsa_TrustDomainInfoInfoEx *info /* [in] [ref] */,
2181 struct lsa_TrustDomainInfoAuthInfoInternal *auth_info /* [in] [ref] */,
2182 uint32_t access_mask /* [in] */,
2183 struct policy_handle *trustdom_handle /* [out] [ref] */)
2185 struct lsa_CreateTrustedDomainEx r;
2189 r.in.policy_handle = policy_handle;
2191 r.in.auth_info = auth_info;
2192 r.in.access_mask = access_mask;
2194 if (DEBUGLEVEL >= 10) {
2195 NDR_PRINT_IN_DEBUG(lsa_CreateTrustedDomainEx, &r);
2198 status = cli->dispatch(cli,
2201 NDR_LSA_CREATETRUSTEDDOMAINEX,
2204 if (!NT_STATUS_IS_OK(status)) {
2208 if (DEBUGLEVEL >= 10) {
2209 NDR_PRINT_OUT_DEBUG(lsa_CreateTrustedDomainEx, &r);
2212 if (NT_STATUS_IS_ERR(status)) {
2216 /* Return variables */
2217 *trustdom_handle = *r.out.trustdom_handle;
2220 return r.out.result;
2223 NTSTATUS rpccli_lsa_CloseTrustedDomainEx(struct rpc_pipe_client *cli,
2224 TALLOC_CTX *mem_ctx,
2225 struct policy_handle *handle /* [in,out] [ref] */)
2227 struct lsa_CloseTrustedDomainEx r;
2231 r.in.handle = handle;
2233 if (DEBUGLEVEL >= 10) {
2234 NDR_PRINT_IN_DEBUG(lsa_CloseTrustedDomainEx, &r);
2237 status = cli->dispatch(cli,
2240 NDR_LSA_CLOSETRUSTEDDOMAINEX,
2243 if (!NT_STATUS_IS_OK(status)) {
2247 if (DEBUGLEVEL >= 10) {
2248 NDR_PRINT_OUT_DEBUG(lsa_CloseTrustedDomainEx, &r);
2251 if (NT_STATUS_IS_ERR(status)) {
2255 /* Return variables */
2256 *handle = *r.out.handle;
2259 return r.out.result;
2262 NTSTATUS rpccli_lsa_QueryDomainInformationPolicy(struct rpc_pipe_client *cli,
2263 TALLOC_CTX *mem_ctx,
2264 struct policy_handle *handle /* [in] [ref] */,
2265 uint16_t level /* [in] */,
2266 union lsa_DomainInformationPolicy **info /* [out] [ref,switch_is(level)] */)
2268 struct lsa_QueryDomainInformationPolicy r;
2272 r.in.handle = handle;
2275 if (DEBUGLEVEL >= 10) {
2276 NDR_PRINT_IN_DEBUG(lsa_QueryDomainInformationPolicy, &r);
2279 status = cli->dispatch(cli,
2282 NDR_LSA_QUERYDOMAININFORMATIONPOLICY,
2285 if (!NT_STATUS_IS_OK(status)) {
2289 if (DEBUGLEVEL >= 10) {
2290 NDR_PRINT_OUT_DEBUG(lsa_QueryDomainInformationPolicy, &r);
2293 if (NT_STATUS_IS_ERR(status)) {
2297 /* Return variables */
2298 *info = *r.out.info;
2301 return r.out.result;
2304 NTSTATUS rpccli_lsa_SetDomainInformationPolicy(struct rpc_pipe_client *cli,
2305 TALLOC_CTX *mem_ctx,
2306 struct policy_handle *handle /* [in] [ref] */,
2307 uint16_t level /* [in] */,
2308 union lsa_DomainInformationPolicy *info /* [in] [unique,switch_is(level)] */)
2310 struct lsa_SetDomainInformationPolicy r;
2314 r.in.handle = handle;
2318 if (DEBUGLEVEL >= 10) {
2319 NDR_PRINT_IN_DEBUG(lsa_SetDomainInformationPolicy, &r);
2322 status = cli->dispatch(cli,
2325 NDR_LSA_SETDOMAININFORMATIONPOLICY,
2328 if (!NT_STATUS_IS_OK(status)) {
2332 if (DEBUGLEVEL >= 10) {
2333 NDR_PRINT_OUT_DEBUG(lsa_SetDomainInformationPolicy, &r);
2336 if (NT_STATUS_IS_ERR(status)) {
2340 /* Return variables */
2343 return r.out.result;
2346 NTSTATUS rpccli_lsa_OpenTrustedDomainByName(struct rpc_pipe_client *cli,
2347 TALLOC_CTX *mem_ctx,
2348 struct policy_handle *handle /* [in] [ref] */,
2349 struct lsa_String name /* [in] */,
2350 uint32_t access_mask /* [in] */,
2351 struct policy_handle *trustdom_handle /* [out] [ref] */)
2353 struct lsa_OpenTrustedDomainByName r;
2357 r.in.handle = handle;
2359 r.in.access_mask = access_mask;
2361 if (DEBUGLEVEL >= 10) {
2362 NDR_PRINT_IN_DEBUG(lsa_OpenTrustedDomainByName, &r);
2365 status = cli->dispatch(cli,
2368 NDR_LSA_OPENTRUSTEDDOMAINBYNAME,
2371 if (!NT_STATUS_IS_OK(status)) {
2375 if (DEBUGLEVEL >= 10) {
2376 NDR_PRINT_OUT_DEBUG(lsa_OpenTrustedDomainByName, &r);
2379 if (NT_STATUS_IS_ERR(status)) {
2383 /* Return variables */
2384 *trustdom_handle = *r.out.trustdom_handle;
2387 return r.out.result;
2390 NTSTATUS rpccli_lsa_TestCall(struct rpc_pipe_client *cli,
2391 TALLOC_CTX *mem_ctx)
2393 struct lsa_TestCall r;
2398 if (DEBUGLEVEL >= 10) {
2399 NDR_PRINT_IN_DEBUG(lsa_TestCall, &r);
2402 status = cli->dispatch(cli,
2408 if (!NT_STATUS_IS_OK(status)) {
2412 if (DEBUGLEVEL >= 10) {
2413 NDR_PRINT_OUT_DEBUG(lsa_TestCall, &r);
2416 if (NT_STATUS_IS_ERR(status)) {
2420 /* Return variables */
2423 return r.out.result;
2426 NTSTATUS rpccli_lsa_LookupSids2(struct rpc_pipe_client *cli,
2427 TALLOC_CTX *mem_ctx,
2428 struct policy_handle *handle /* [in] [ref] */,
2429 struct lsa_SidArray *sids /* [in] [ref] */,
2430 struct lsa_RefDomainList **domains /* [out] [ref] */,
2431 struct lsa_TransNameArray2 *names /* [in,out] [ref] */,
2432 uint16_t level /* [in] */,
2433 uint32_t *count /* [in,out] [ref] */,
2434 uint32_t unknown1 /* [in] */,
2435 uint32_t unknown2 /* [in] */)
2437 struct lsa_LookupSids2 r;
2441 r.in.handle = handle;
2446 r.in.unknown1 = unknown1;
2447 r.in.unknown2 = unknown2;
2449 if (DEBUGLEVEL >= 10) {
2450 NDR_PRINT_IN_DEBUG(lsa_LookupSids2, &r);
2453 status = cli->dispatch(cli,
2456 NDR_LSA_LOOKUPSIDS2,
2459 if (!NT_STATUS_IS_OK(status)) {
2463 if (DEBUGLEVEL >= 10) {
2464 NDR_PRINT_OUT_DEBUG(lsa_LookupSids2, &r);
2467 if (NT_STATUS_IS_ERR(status)) {
2471 /* Return variables */
2472 *domains = *r.out.domains;
2473 *names = *r.out.names;
2474 *count = *r.out.count;
2477 return r.out.result;
2480 NTSTATUS rpccli_lsa_LookupNames2(struct rpc_pipe_client *cli,
2481 TALLOC_CTX *mem_ctx,
2482 struct policy_handle *handle /* [in] [ref] */,
2483 uint32_t num_names /* [in] [range(0,1000)] */,
2484 struct lsa_String *names /* [in] [size_is(num_names)] */,
2485 struct lsa_RefDomainList **domains /* [out] [ref] */,
2486 struct lsa_TransSidArray2 *sids /* [in,out] [ref] */,
2487 enum lsa_LookupNamesLevel level /* [in] */,
2488 uint32_t *count /* [in,out] [ref] */,
2489 uint32_t lookup_options /* [in] */,
2490 uint32_t client_revision /* [in] */)
2492 struct lsa_LookupNames2 r;
2496 r.in.handle = handle;
2497 r.in.num_names = num_names;
2502 r.in.lookup_options = lookup_options;
2503 r.in.client_revision = client_revision;
2505 if (DEBUGLEVEL >= 10) {
2506 NDR_PRINT_IN_DEBUG(lsa_LookupNames2, &r);
2509 status = cli->dispatch(cli,
2512 NDR_LSA_LOOKUPNAMES2,
2515 if (!NT_STATUS_IS_OK(status)) {
2519 if (DEBUGLEVEL >= 10) {
2520 NDR_PRINT_OUT_DEBUG(lsa_LookupNames2, &r);
2523 if (NT_STATUS_IS_ERR(status)) {
2527 /* Return variables */
2528 *domains = *r.out.domains;
2529 *sids = *r.out.sids;
2530 *count = *r.out.count;
2533 return r.out.result;
2536 NTSTATUS rpccli_lsa_CreateTrustedDomainEx2(struct rpc_pipe_client *cli,
2537 TALLOC_CTX *mem_ctx,
2538 struct policy_handle *policy_handle /* [in] [ref] */,
2539 struct lsa_TrustDomainInfoInfoEx *info /* [in] [ref] */,
2540 struct lsa_TrustDomainInfoAuthInfoInternal *auth_info /* [in] [ref] */,
2541 uint32_t access_mask /* [in] */,
2542 struct policy_handle *trustdom_handle /* [out] [ref] */)
2544 struct lsa_CreateTrustedDomainEx2 r;
2548 r.in.policy_handle = policy_handle;
2550 r.in.auth_info = auth_info;
2551 r.in.access_mask = access_mask;
2553 if (DEBUGLEVEL >= 10) {
2554 NDR_PRINT_IN_DEBUG(lsa_CreateTrustedDomainEx2, &r);
2557 status = cli->dispatch(cli,
2560 NDR_LSA_CREATETRUSTEDDOMAINEX2,
2563 if (!NT_STATUS_IS_OK(status)) {
2567 if (DEBUGLEVEL >= 10) {
2568 NDR_PRINT_OUT_DEBUG(lsa_CreateTrustedDomainEx2, &r);
2571 if (NT_STATUS_IS_ERR(status)) {
2575 /* Return variables */
2576 *trustdom_handle = *r.out.trustdom_handle;
2579 return r.out.result;
2582 NTSTATUS rpccli_lsa_CREDRWRITE(struct rpc_pipe_client *cli,
2583 TALLOC_CTX *mem_ctx)
2585 struct lsa_CREDRWRITE r;
2590 if (DEBUGLEVEL >= 10) {
2591 NDR_PRINT_IN_DEBUG(lsa_CREDRWRITE, &r);
2594 status = cli->dispatch(cli,
2600 if (!NT_STATUS_IS_OK(status)) {
2604 if (DEBUGLEVEL >= 10) {
2605 NDR_PRINT_OUT_DEBUG(lsa_CREDRWRITE, &r);
2608 if (NT_STATUS_IS_ERR(status)) {
2612 /* Return variables */
2615 return r.out.result;
2618 NTSTATUS rpccli_lsa_CREDRREAD(struct rpc_pipe_client *cli,
2619 TALLOC_CTX *mem_ctx)
2621 struct lsa_CREDRREAD r;
2626 if (DEBUGLEVEL >= 10) {
2627 NDR_PRINT_IN_DEBUG(lsa_CREDRREAD, &r);
2630 status = cli->dispatch(cli,
2636 if (!NT_STATUS_IS_OK(status)) {
2640 if (DEBUGLEVEL >= 10) {
2641 NDR_PRINT_OUT_DEBUG(lsa_CREDRREAD, &r);
2644 if (NT_STATUS_IS_ERR(status)) {
2648 /* Return variables */
2651 return r.out.result;
2654 NTSTATUS rpccli_lsa_CREDRENUMERATE(struct rpc_pipe_client *cli,
2655 TALLOC_CTX *mem_ctx)
2657 struct lsa_CREDRENUMERATE r;
2662 if (DEBUGLEVEL >= 10) {
2663 NDR_PRINT_IN_DEBUG(lsa_CREDRENUMERATE, &r);
2666 status = cli->dispatch(cli,
2669 NDR_LSA_CREDRENUMERATE,
2672 if (!NT_STATUS_IS_OK(status)) {
2676 if (DEBUGLEVEL >= 10) {
2677 NDR_PRINT_OUT_DEBUG(lsa_CREDRENUMERATE, &r);
2680 if (NT_STATUS_IS_ERR(status)) {
2684 /* Return variables */
2687 return r.out.result;
2690 NTSTATUS rpccli_lsa_CREDRWRITEDOMAINCREDENTIALS(struct rpc_pipe_client *cli,
2691 TALLOC_CTX *mem_ctx)
2693 struct lsa_CREDRWRITEDOMAINCREDENTIALS r;
2698 if (DEBUGLEVEL >= 10) {
2699 NDR_PRINT_IN_DEBUG(lsa_CREDRWRITEDOMAINCREDENTIALS, &r);
2702 status = cli->dispatch(cli,
2705 NDR_LSA_CREDRWRITEDOMAINCREDENTIALS,
2708 if (!NT_STATUS_IS_OK(status)) {
2712 if (DEBUGLEVEL >= 10) {
2713 NDR_PRINT_OUT_DEBUG(lsa_CREDRWRITEDOMAINCREDENTIALS, &r);
2716 if (NT_STATUS_IS_ERR(status)) {
2720 /* Return variables */
2723 return r.out.result;
2726 NTSTATUS rpccli_lsa_CREDRREADDOMAINCREDENTIALS(struct rpc_pipe_client *cli,
2727 TALLOC_CTX *mem_ctx)
2729 struct lsa_CREDRREADDOMAINCREDENTIALS r;
2734 if (DEBUGLEVEL >= 10) {
2735 NDR_PRINT_IN_DEBUG(lsa_CREDRREADDOMAINCREDENTIALS, &r);
2738 status = cli->dispatch(cli,
2741 NDR_LSA_CREDRREADDOMAINCREDENTIALS,
2744 if (!NT_STATUS_IS_OK(status)) {
2748 if (DEBUGLEVEL >= 10) {
2749 NDR_PRINT_OUT_DEBUG(lsa_CREDRREADDOMAINCREDENTIALS, &r);
2752 if (NT_STATUS_IS_ERR(status)) {
2756 /* Return variables */
2759 return r.out.result;
2762 NTSTATUS rpccli_lsa_CREDRDELETE(struct rpc_pipe_client *cli,
2763 TALLOC_CTX *mem_ctx)
2765 struct lsa_CREDRDELETE r;
2770 if (DEBUGLEVEL >= 10) {
2771 NDR_PRINT_IN_DEBUG(lsa_CREDRDELETE, &r);
2774 status = cli->dispatch(cli,
2777 NDR_LSA_CREDRDELETE,
2780 if (!NT_STATUS_IS_OK(status)) {
2784 if (DEBUGLEVEL >= 10) {
2785 NDR_PRINT_OUT_DEBUG(lsa_CREDRDELETE, &r);
2788 if (NT_STATUS_IS_ERR(status)) {
2792 /* Return variables */
2795 return r.out.result;
2798 NTSTATUS rpccli_lsa_CREDRGETTARGETINFO(struct rpc_pipe_client *cli,
2799 TALLOC_CTX *mem_ctx)
2801 struct lsa_CREDRGETTARGETINFO r;
2806 if (DEBUGLEVEL >= 10) {
2807 NDR_PRINT_IN_DEBUG(lsa_CREDRGETTARGETINFO, &r);
2810 status = cli->dispatch(cli,
2813 NDR_LSA_CREDRGETTARGETINFO,
2816 if (!NT_STATUS_IS_OK(status)) {
2820 if (DEBUGLEVEL >= 10) {
2821 NDR_PRINT_OUT_DEBUG(lsa_CREDRGETTARGETINFO, &r);
2824 if (NT_STATUS_IS_ERR(status)) {
2828 /* Return variables */
2831 return r.out.result;
2834 NTSTATUS rpccli_lsa_CREDRPROFILELOADED(struct rpc_pipe_client *cli,
2835 TALLOC_CTX *mem_ctx)
2837 struct lsa_CREDRPROFILELOADED r;
2842 if (DEBUGLEVEL >= 10) {
2843 NDR_PRINT_IN_DEBUG(lsa_CREDRPROFILELOADED, &r);
2846 status = cli->dispatch(cli,
2849 NDR_LSA_CREDRPROFILELOADED,
2852 if (!NT_STATUS_IS_OK(status)) {
2856 if (DEBUGLEVEL >= 10) {
2857 NDR_PRINT_OUT_DEBUG(lsa_CREDRPROFILELOADED, &r);
2860 if (NT_STATUS_IS_ERR(status)) {
2864 /* Return variables */
2867 return r.out.result;
2870 NTSTATUS rpccli_lsa_LookupNames3(struct rpc_pipe_client *cli,
2871 TALLOC_CTX *mem_ctx,
2872 struct policy_handle *handle /* [in] [ref] */,
2873 uint32_t num_names /* [in] [range(0,1000)] */,
2874 struct lsa_String *names /* [in] [size_is(num_names)] */,
2875 struct lsa_RefDomainList **domains /* [out] [ref] */,
2876 struct lsa_TransSidArray3 *sids /* [in,out] [ref] */,
2877 enum lsa_LookupNamesLevel level /* [in] */,
2878 uint32_t *count /* [in,out] [ref] */,
2879 uint32_t lookup_options /* [in] */,
2880 uint32_t client_revision /* [in] */)
2882 struct lsa_LookupNames3 r;
2886 r.in.handle = handle;
2887 r.in.num_names = num_names;
2892 r.in.lookup_options = lookup_options;
2893 r.in.client_revision = client_revision;
2895 if (DEBUGLEVEL >= 10) {
2896 NDR_PRINT_IN_DEBUG(lsa_LookupNames3, &r);
2899 status = cli->dispatch(cli,
2902 NDR_LSA_LOOKUPNAMES3,
2905 if (!NT_STATUS_IS_OK(status)) {
2909 if (DEBUGLEVEL >= 10) {
2910 NDR_PRINT_OUT_DEBUG(lsa_LookupNames3, &r);
2913 if (NT_STATUS_IS_ERR(status)) {
2917 /* Return variables */
2918 *domains = *r.out.domains;
2919 *sids = *r.out.sids;
2920 *count = *r.out.count;
2923 return r.out.result;
2926 NTSTATUS rpccli_lsa_CREDRGETSESSIONTYPES(struct rpc_pipe_client *cli,
2927 TALLOC_CTX *mem_ctx)
2929 struct lsa_CREDRGETSESSIONTYPES r;
2934 if (DEBUGLEVEL >= 10) {
2935 NDR_PRINT_IN_DEBUG(lsa_CREDRGETSESSIONTYPES, &r);
2938 status = cli->dispatch(cli,
2941 NDR_LSA_CREDRGETSESSIONTYPES,
2944 if (!NT_STATUS_IS_OK(status)) {
2948 if (DEBUGLEVEL >= 10) {
2949 NDR_PRINT_OUT_DEBUG(lsa_CREDRGETSESSIONTYPES, &r);
2952 if (NT_STATUS_IS_ERR(status)) {
2956 /* Return variables */
2959 return r.out.result;
2962 NTSTATUS rpccli_lsa_LSARREGISTERAUDITEVENT(struct rpc_pipe_client *cli,
2963 TALLOC_CTX *mem_ctx)
2965 struct lsa_LSARREGISTERAUDITEVENT r;
2970 if (DEBUGLEVEL >= 10) {
2971 NDR_PRINT_IN_DEBUG(lsa_LSARREGISTERAUDITEVENT, &r);
2974 status = cli->dispatch(cli,
2977 NDR_LSA_LSARREGISTERAUDITEVENT,
2980 if (!NT_STATUS_IS_OK(status)) {
2984 if (DEBUGLEVEL >= 10) {
2985 NDR_PRINT_OUT_DEBUG(lsa_LSARREGISTERAUDITEVENT, &r);
2988 if (NT_STATUS_IS_ERR(status)) {
2992 /* Return variables */
2995 return r.out.result;
2998 NTSTATUS rpccli_lsa_LSARGENAUDITEVENT(struct rpc_pipe_client *cli,
2999 TALLOC_CTX *mem_ctx)
3001 struct lsa_LSARGENAUDITEVENT r;
3006 if (DEBUGLEVEL >= 10) {
3007 NDR_PRINT_IN_DEBUG(lsa_LSARGENAUDITEVENT, &r);
3010 status = cli->dispatch(cli,
3013 NDR_LSA_LSARGENAUDITEVENT,
3016 if (!NT_STATUS_IS_OK(status)) {
3020 if (DEBUGLEVEL >= 10) {
3021 NDR_PRINT_OUT_DEBUG(lsa_LSARGENAUDITEVENT, &r);
3024 if (NT_STATUS_IS_ERR(status)) {
3028 /* Return variables */
3031 return r.out.result;
3034 NTSTATUS rpccli_lsa_LSARUNREGISTERAUDITEVENT(struct rpc_pipe_client *cli,
3035 TALLOC_CTX *mem_ctx)
3037 struct lsa_LSARUNREGISTERAUDITEVENT r;
3042 if (DEBUGLEVEL >= 10) {
3043 NDR_PRINT_IN_DEBUG(lsa_LSARUNREGISTERAUDITEVENT, &r);
3046 status = cli->dispatch(cli,
3049 NDR_LSA_LSARUNREGISTERAUDITEVENT,
3052 if (!NT_STATUS_IS_OK(status)) {
3056 if (DEBUGLEVEL >= 10) {
3057 NDR_PRINT_OUT_DEBUG(lsa_LSARUNREGISTERAUDITEVENT, &r);
3060 if (NT_STATUS_IS_ERR(status)) {
3064 /* Return variables */
3067 return r.out.result;
3070 NTSTATUS rpccli_lsa_lsaRQueryForestTrustInformation(struct rpc_pipe_client *cli,
3071 TALLOC_CTX *mem_ctx,
3072 struct policy_handle *handle /* [in] [ref] */,
3073 struct lsa_String *trusted_domain_name /* [in] [ref] */,
3074 uint16_t unknown /* [in] */,
3075 struct lsa_ForestTrustInformation **forest_trust_info /* [out] [ref] */)
3077 struct lsa_lsaRQueryForestTrustInformation r;
3081 r.in.handle = handle;
3082 r.in.trusted_domain_name = trusted_domain_name;
3083 r.in.unknown = unknown;
3085 if (DEBUGLEVEL >= 10) {
3086 NDR_PRINT_IN_DEBUG(lsa_lsaRQueryForestTrustInformation, &r);
3089 status = cli->dispatch(cli,
3092 NDR_LSA_LSARQUERYFORESTTRUSTINFORMATION,
3095 if (!NT_STATUS_IS_OK(status)) {
3099 if (DEBUGLEVEL >= 10) {
3100 NDR_PRINT_OUT_DEBUG(lsa_lsaRQueryForestTrustInformation, &r);
3103 if (NT_STATUS_IS_ERR(status)) {
3107 /* Return variables */
3108 *forest_trust_info = *r.out.forest_trust_info;
3111 return r.out.result;
3114 NTSTATUS rpccli_lsa_LSARSETFORESTTRUSTINFORMATION(struct rpc_pipe_client *cli,
3115 TALLOC_CTX *mem_ctx)
3117 struct lsa_LSARSETFORESTTRUSTINFORMATION r;
3122 if (DEBUGLEVEL >= 10) {
3123 NDR_PRINT_IN_DEBUG(lsa_LSARSETFORESTTRUSTINFORMATION, &r);
3126 status = cli->dispatch(cli,
3129 NDR_LSA_LSARSETFORESTTRUSTINFORMATION,
3132 if (!NT_STATUS_IS_OK(status)) {
3136 if (DEBUGLEVEL >= 10) {
3137 NDR_PRINT_OUT_DEBUG(lsa_LSARSETFORESTTRUSTINFORMATION, &r);
3140 if (NT_STATUS_IS_ERR(status)) {
3144 /* Return variables */
3147 return r.out.result;
3150 NTSTATUS rpccli_lsa_CREDRRENAME(struct rpc_pipe_client *cli,
3151 TALLOC_CTX *mem_ctx)
3153 struct lsa_CREDRRENAME r;
3158 if (DEBUGLEVEL >= 10) {
3159 NDR_PRINT_IN_DEBUG(lsa_CREDRRENAME, &r);
3162 status = cli->dispatch(cli,
3165 NDR_LSA_CREDRRENAME,
3168 if (!NT_STATUS_IS_OK(status)) {
3172 if (DEBUGLEVEL >= 10) {
3173 NDR_PRINT_OUT_DEBUG(lsa_CREDRRENAME, &r);
3176 if (NT_STATUS_IS_ERR(status)) {
3180 /* Return variables */
3183 return r.out.result;
3186 NTSTATUS rpccli_lsa_LookupSids3(struct rpc_pipe_client *cli,
3187 TALLOC_CTX *mem_ctx,
3188 struct lsa_SidArray *sids /* [in] [ref] */,
3189 struct lsa_RefDomainList **domains /* [out] [ref] */,
3190 struct lsa_TransNameArray2 *names /* [in,out] [ref] */,
3191 uint16_t level /* [in] */,
3192 uint32_t *count /* [in,out] [ref] */,
3193 uint32_t unknown1 /* [in] */,
3194 uint32_t unknown2 /* [in] */)
3196 struct lsa_LookupSids3 r;
3204 r.in.unknown1 = unknown1;
3205 r.in.unknown2 = unknown2;
3207 if (DEBUGLEVEL >= 10) {
3208 NDR_PRINT_IN_DEBUG(lsa_LookupSids3, &r);
3211 status = cli->dispatch(cli,
3214 NDR_LSA_LOOKUPSIDS3,
3217 if (!NT_STATUS_IS_OK(status)) {
3221 if (DEBUGLEVEL >= 10) {
3222 NDR_PRINT_OUT_DEBUG(lsa_LookupSids3, &r);
3225 if (NT_STATUS_IS_ERR(status)) {
3229 /* Return variables */
3230 *domains = *r.out.domains;
3231 *names = *r.out.names;
3232 *count = *r.out.count;
3235 return r.out.result;
3238 NTSTATUS rpccli_lsa_LookupNames4(struct rpc_pipe_client *cli,
3239 TALLOC_CTX *mem_ctx,
3240 uint32_t num_names /* [in] [range(0,1000)] */,
3241 struct lsa_String *names /* [in] [size_is(num_names)] */,
3242 struct lsa_RefDomainList **domains /* [out] [ref] */,
3243 struct lsa_TransSidArray3 *sids /* [in,out] [ref] */,
3244 enum lsa_LookupNamesLevel level /* [in] */,
3245 uint32_t *count /* [in,out] [ref] */,
3246 uint32_t lookup_options /* [in] */,
3247 uint32_t client_revision /* [in] */)
3249 struct lsa_LookupNames4 r;
3253 r.in.num_names = num_names;
3258 r.in.lookup_options = lookup_options;
3259 r.in.client_revision = client_revision;
3261 if (DEBUGLEVEL >= 10) {
3262 NDR_PRINT_IN_DEBUG(lsa_LookupNames4, &r);
3265 status = cli->dispatch(cli,
3268 NDR_LSA_LOOKUPNAMES4,
3271 if (!NT_STATUS_IS_OK(status)) {
3275 if (DEBUGLEVEL >= 10) {
3276 NDR_PRINT_OUT_DEBUG(lsa_LookupNames4, &r);
3279 if (NT_STATUS_IS_ERR(status)) {
3283 /* Return variables */
3284 *domains = *r.out.domains;
3285 *sids = *r.out.sids;
3286 *count = *r.out.count;
3289 return r.out.result;
3292 NTSTATUS rpccli_lsa_LSAROPENPOLICYSCE(struct rpc_pipe_client *cli,
3293 TALLOC_CTX *mem_ctx)
3295 struct lsa_LSAROPENPOLICYSCE r;
3300 if (DEBUGLEVEL >= 10) {
3301 NDR_PRINT_IN_DEBUG(lsa_LSAROPENPOLICYSCE, &r);
3304 status = cli->dispatch(cli,
3307 NDR_LSA_LSAROPENPOLICYSCE,
3310 if (!NT_STATUS_IS_OK(status)) {
3314 if (DEBUGLEVEL >= 10) {
3315 NDR_PRINT_OUT_DEBUG(lsa_LSAROPENPOLICYSCE, &r);
3318 if (NT_STATUS_IS_ERR(status)) {
3322 /* Return variables */
3325 return r.out.result;
3328 NTSTATUS rpccli_lsa_LSARADTREGISTERSECURITYEVENTSOURCE(struct rpc_pipe_client *cli,
3329 TALLOC_CTX *mem_ctx)
3331 struct lsa_LSARADTREGISTERSECURITYEVENTSOURCE r;
3336 if (DEBUGLEVEL >= 10) {
3337 NDR_PRINT_IN_DEBUG(lsa_LSARADTREGISTERSECURITYEVENTSOURCE, &r);
3340 status = cli->dispatch(cli,
3343 NDR_LSA_LSARADTREGISTERSECURITYEVENTSOURCE,
3346 if (!NT_STATUS_IS_OK(status)) {
3350 if (DEBUGLEVEL >= 10) {
3351 NDR_PRINT_OUT_DEBUG(lsa_LSARADTREGISTERSECURITYEVENTSOURCE, &r);
3354 if (NT_STATUS_IS_ERR(status)) {
3358 /* Return variables */
3361 return r.out.result;
3364 NTSTATUS rpccli_lsa_LSARADTUNREGISTERSECURITYEVENTSOURCE(struct rpc_pipe_client *cli,
3365 TALLOC_CTX *mem_ctx)
3367 struct lsa_LSARADTUNREGISTERSECURITYEVENTSOURCE r;
3372 if (DEBUGLEVEL >= 10) {
3373 NDR_PRINT_IN_DEBUG(lsa_LSARADTUNREGISTERSECURITYEVENTSOURCE, &r);
3376 status = cli->dispatch(cli,
3379 NDR_LSA_LSARADTUNREGISTERSECURITYEVENTSOURCE,
3382 if (!NT_STATUS_IS_OK(status)) {
3386 if (DEBUGLEVEL >= 10) {
3387 NDR_PRINT_OUT_DEBUG(lsa_LSARADTUNREGISTERSECURITYEVENTSOURCE, &r);
3390 if (NT_STATUS_IS_ERR(status)) {
3394 /* Return variables */
3397 return r.out.result;
3400 NTSTATUS rpccli_lsa_LSARADTREPORTSECURITYEVENT(struct rpc_pipe_client *cli,
3401 TALLOC_CTX *mem_ctx)
3403 struct lsa_LSARADTREPORTSECURITYEVENT r;
3408 if (DEBUGLEVEL >= 10) {
3409 NDR_PRINT_IN_DEBUG(lsa_LSARADTREPORTSECURITYEVENT, &r);
3412 status = cli->dispatch(cli,
3415 NDR_LSA_LSARADTREPORTSECURITYEVENT,
3418 if (!NT_STATUS_IS_OK(status)) {
3422 if (DEBUGLEVEL >= 10) {
3423 NDR_PRINT_OUT_DEBUG(lsa_LSARADTREPORTSECURITYEVENT, &r);
3426 if (NT_STATUS_IS_ERR(status)) {
3430 /* Return variables */
3433 return r.out.result;