4 lsa interface definition
9 [ uuid("12345778-1234-abcd-ef00-0123456789ab"),
11 endpoint("ncacn_np:[\\pipe\\lsarpc]","ncacn_np:[\\pipe\\netlogon]","ncacn_np:[\\pipe\\lsass]", "ncacn_ip_tcp:", "ncalrpc:"),
12 pointer_default(unique),
13 helpstring("Local Security Authority")
16 typedef bitmap security_secinfo security_secinfo;
18 typedef [public,noejs] struct {
19 [value(2*strlen_m(string))] uint16 length;
20 [value(2*strlen_m(string))] uint16 size;
21 [charset(UTF16),size_is(size/2),length_is(length/2)] uint16 *string;
24 typedef [public] struct {
25 [value(2*strlen_m(string))] uint16 length;
26 [value(2*(strlen_m(string)+1))] uint16 size;
27 [charset(UTF16),size_is(size/2),length_is(length/2)] uint16 *string;
30 typedef [public] struct {
32 [size_is(count)] lsa_String *names;
35 typedef [public] struct {
36 [value(strlen_m(string))] uint16 length;
37 [value(strlen_m(string))] uint16 size;
38 ascstr_noterm *string;
44 [in,out] policy_handle *handle
50 [public] NTSTATUS lsa_Delete (
51 [in] policy_handle *handle
69 [size_is(count)] lsa_PrivEntry *privs;
72 [public] NTSTATUS lsa_EnumPrivs (
73 [in] policy_handle *handle,
74 [in,out] uint32 *resume_handle,
75 [in] uint32 max_count,
76 [out] lsa_PrivArray *privs
82 NTSTATUS lsa_QuerySecurity (
83 [in] policy_handle *handle,
84 [in] security_secinfo sec_info,
85 [out,unique] sec_desc_buf *sdbuf
91 NTSTATUS lsa_SetSecObj ();
96 NTSTATUS lsa_ChangePassword ();
102 uint32 len; /* ignored */
103 uint16 impersonation_level;
105 uint8 effective_only;
109 uint32 len; /* ignored */
111 [string,charset(UTF16)] uint16 *object_name;
113 security_descriptor *sec_desc;
114 lsa_QosInfo *sec_qos;
115 } lsa_ObjectAttribute;
117 /* notice the screwup with the system_name - thats why MS created
119 [public] NTSTATUS lsa_OpenPolicy (
120 [in,unique] uint16 *system_name,
121 [in] lsa_ObjectAttribute *attr,
122 [in] uint32 access_mask,
123 [out] policy_handle *handle
134 NTTIME retention_time;
135 uint8 shutdown_in_progress;
136 NTTIME time_to_shutdown;
137 uint32 next_audit_record;
141 typedef [v1_enum] enum {
142 LSA_AUDIT_POLICY_NONE=0,
143 LSA_AUDIT_POLICY_SUCCESS=1,
144 LSA_AUDIT_POLICY_FAILURE=2,
145 LSA_AUDIT_POLICY_ALL=(LSA_AUDIT_POLICY_SUCCESS|LSA_AUDIT_POLICY_FAILURE),
146 LSA_AUDIT_POLICY_CLEAR=4
147 } lsa_PolicyAuditPolicy;
150 LSA_AUDIT_CATEGORY_SYSTEM = 0,
151 LSA_AUDIT_CATEGORY_LOGON = 1,
152 LSA_AUDIT_CATEGORY_FILE_AND_OBJECT_ACCESS = 2,
153 LSA_AUDIT_CATEGORY_USE_OF_USER_RIGHTS = 3,
154 LSA_AUDIT_CATEGORY_PROCCESS_TRACKING = 4,
155 LSA_AUDIT_CATEGORY_SECURITY_POLICY_CHANGES = 5,
156 LSA_AUDIT_CATEGORY_ACCOUNT_MANAGEMENT = 6,
157 LSA_AUDIT_CATEGORY_DIRECTORY_SERVICE_ACCESS = 7, /* only in win2k/2k3 */
158 LSA_AUDIT_CATEGORY_ACCOUNT_LOGON = 8 /* only in win2k/2k3 */
159 } lsa_PolicyAuditEventType;
162 uint32 auditing_mode;
163 [size_is(count)] lsa_PolicyAuditPolicy *settings;
165 } lsa_AuditEventsInfo;
168 lsa_StringLarge name;
177 uint16 unknown; /* an midl padding bug? */
184 } lsa_ReplicaSourceInfo;
188 uint32 non_paged_pool;
193 } lsa_DefaultQuotaInfo;
197 NTTIME db_create_time;
198 } lsa_ModificationInfo;
201 uint8 shutdown_on_full;
202 } lsa_AuditFullSetInfo;
205 uint16 unknown; /* an midl padding bug? */
206 uint8 shutdown_on_full;
208 } lsa_AuditFullQueryInfo;
211 /* it's important that we use the lsa_StringLarge here,
212 * because otherwise windows clients result with such dns hostnames
213 * e.g. w2k3-client.samba4.samba.orgsamba4.samba.org
215 * w2k3-client.samba4.samba.org
217 lsa_StringLarge name;
218 lsa_StringLarge dns_domain;
219 lsa_StringLarge dns_forest;
225 LSA_POLICY_INFO_AUDIT_LOG=1,
226 LSA_POLICY_INFO_AUDIT_EVENTS=2,
227 LSA_POLICY_INFO_DOMAIN=3,
228 LSA_POLICY_INFO_PD=4,
229 LSA_POLICY_INFO_ACCOUNT_DOMAIN=5,
230 LSA_POLICY_INFO_ROLE=6,
231 LSA_POLICY_INFO_REPLICA=7,
232 LSA_POLICY_INFO_QUOTA=8,
233 LSA_POLICY_INFO_DB=9,
234 LSA_POLICY_INFO_AUDIT_FULL_SET=10,
235 LSA_POLICY_INFO_AUDIT_FULL_QUERY=11,
236 LSA_POLICY_INFO_DNS=12
239 typedef [switch_type(uint16)] union {
240 [case(LSA_POLICY_INFO_AUDIT_LOG)] lsa_AuditLogInfo audit_log;
241 [case(LSA_POLICY_INFO_AUDIT_EVENTS)] lsa_AuditEventsInfo audit_events;
242 [case(LSA_POLICY_INFO_DOMAIN)] lsa_DomainInfo domain;
243 [case(LSA_POLICY_INFO_PD)] lsa_PDAccountInfo pd;
244 [case(LSA_POLICY_INFO_ACCOUNT_DOMAIN)] lsa_DomainInfo account_domain;
245 [case(LSA_POLICY_INFO_ROLE)] lsa_ServerRole role;
246 [case(LSA_POLICY_INFO_REPLICA)] lsa_ReplicaSourceInfo replica;
247 [case(LSA_POLICY_INFO_QUOTA)] lsa_DefaultQuotaInfo quota;
248 [case(LSA_POLICY_INFO_DB)] lsa_ModificationInfo db;
249 [case(LSA_POLICY_INFO_AUDIT_FULL_SET)] lsa_AuditFullSetInfo auditfullset;
250 [case(LSA_POLICY_INFO_AUDIT_FULL_QUERY)] lsa_AuditFullQueryInfo auditfullquery;
251 [case(LSA_POLICY_INFO_DNS)] lsa_DnsDomainInfo dns;
252 } lsa_PolicyInformation;
254 NTSTATUS lsa_QueryInfoPolicy (
255 [in] policy_handle *handle,
256 [in] lsa_PolicyInfo level,
257 [out,unique,switch_is(level)] lsa_PolicyInformation *info
262 NTSTATUS lsa_SetInfoPolicy (
263 [in] policy_handle *handle,
264 [in] lsa_PolicyInfo level,
265 [in,switch_is(level)] lsa_PolicyInformation *info
270 NTSTATUS lsa_ClearAuditLog ();
274 [public] NTSTATUS lsa_CreateAccount (
275 [in] policy_handle *handle,
277 [in] uint32 access_mask,
278 [out] policy_handle *acct_handle
282 /* NOTE: This only returns accounts that have at least
290 typedef [public] struct {
291 [range(0,1000)] uint32 num_sids;
292 [size_is(num_sids)] lsa_SidPtr *sids;
295 [public] NTSTATUS lsa_EnumAccounts (
296 [in] policy_handle *handle,
297 [in,out] uint32 *resume_handle,
298 [in,range(0,8192)] uint32 num_entries,
299 [out] lsa_SidArray *sids
303 /*************************************************/
306 [public] NTSTATUS lsa_CreateTrustedDomain(
307 [in] policy_handle *handle,
308 [in] lsa_DomainInfo *info,
309 [in] uint32 access_mask,
310 [out] policy_handle *trustdom_handle
317 /* w2k3 treats max_size as max_domains*60 */
318 const int LSA_ENUM_TRUST_DOMAIN_MULTIPLIER = 60;
322 [size_is(count)] lsa_DomainInfo *domains;
325 NTSTATUS lsa_EnumTrustDom (
326 [in] policy_handle *handle,
327 [in,out] uint32 *resume_handle,
328 [in] uint32 max_size,
329 [out] lsa_DomainList *domains
336 SID_NAME_USE_NONE = 0,/* NOTUSED */
337 SID_NAME_USER = 1, /* user */
338 SID_NAME_DOM_GRP = 2, /* domain group */
339 SID_NAME_DOMAIN = 3, /* domain: don't know what this is */
340 SID_NAME_ALIAS = 4, /* local group */
341 SID_NAME_WKN_GRP = 5, /* well-known group */
342 SID_NAME_DELETED = 6, /* deleted account: needed for c2 rating */
343 SID_NAME_INVALID = 7, /* invalid account */
344 SID_NAME_UNKNOWN = 8, /* oops. */
345 SID_NAME_COMPUTER = 9 /* machine */
349 lsa_SidType sid_type;
355 [range(0,1000)] uint32 count;
356 [size_is(count)] lsa_TranslatedSid *sids;
359 const int LSA_REF_DOMAIN_LIST_MULTIPLIER = 32;
361 [range(0,1000)] uint32 count;
362 [size_is(count)] lsa_DomainInfo *domains;
366 /* Level 1: Ask everywhere
367 * Level 2: Ask domain and trusted domains, no builtin and wkn
368 * Level 3: Only ask domain
369 * Level 4: W2k3ad: Only ask AD trusts
370 * Level 5: Only ask transitive forest trusts
375 LSA_LOOKUP_NAMES_ALL = 1,
376 LSA_LOOKUP_NAMES_DOMAINS_ONLY = 2,
377 LSA_LOOKUP_NAMES_PRIMARY_DOMAIN_ONLY = 3,
378 LSA_LOOKUP_NAMES_UPLEVEL_TRUSTS_ONLY = 4,
379 LSA_LOOKUP_NAMES_FOREST_TRUSTS_ONLY = 5,
380 LSA_LOOKUP_NAMES_UPLEVEL_TRUSTS_ONLY2 = 6
381 } lsa_LookupNamesLevel;
383 [public] NTSTATUS lsa_LookupNames (
384 [in] policy_handle *handle,
385 [in,range(0,1000)] uint32 num_names,
386 [in,size_is(num_names)] lsa_String names[],
387 [out,unique] lsa_RefDomainList *domains,
388 [in,out] lsa_TransSidArray *sids,
389 [in] lsa_LookupNamesLevel level,
390 [in,out] uint32 *count
398 lsa_SidType sid_type;
401 } lsa_TranslatedName;
404 [range(0,1000)] uint32 count;
405 [size_is(count)] lsa_TranslatedName *names;
406 } lsa_TransNameArray;
408 [public] NTSTATUS lsa_LookupSids (
409 [in] policy_handle *handle,
410 [in] lsa_SidArray *sids,
411 [out,unique] lsa_RefDomainList *domains,
412 [in,out] lsa_TransNameArray *names,
414 [in,out] uint32 *count
419 [public] NTSTATUS lsa_CreateSecret(
420 [in] policy_handle *handle,
421 [in] lsa_String name,
422 [in] uint32 access_mask,
423 [out] policy_handle *sec_handle
427 /*****************************************/
429 NTSTATUS lsa_OpenAccount (
430 [in] policy_handle *handle,
432 [in] uint32 access_mask,
433 [out] policy_handle *acct_handle
437 /****************************************/
446 [range(0,1000)] uint32 count;
448 [size_is(count)] lsa_LUIDAttribute set[*];
451 NTSTATUS lsa_EnumPrivsAccount (
452 [in] policy_handle *handle,
453 [out,unique] lsa_PrivilegeSet *privs
457 /****************************************/
459 NTSTATUS lsa_AddPrivilegesToAccount(
460 [in] policy_handle *handle,
461 [in] lsa_PrivilegeSet *privs
465 /****************************************/
467 NTSTATUS lsa_RemovePrivilegesFromAccount(
468 [in] policy_handle *handle,
469 [in] uint8 remove_all,
470 [in,unique] lsa_PrivilegeSet *privs
474 NTSTATUS lsa_GetQuotasForAccount();
477 NTSTATUS lsa_SetQuotasForAccount();
480 NTSTATUS lsa_GetSystemAccessAccount();
482 NTSTATUS lsa_SetSystemAccessAccount();
485 NTSTATUS lsa_OpenTrustedDomain(
486 [in] policy_handle *handle,
488 [in] uint32 access_mask,
489 [out] policy_handle *trustdom_handle
492 typedef [flag(NDR_PAHEX)] struct {
495 [size_is(size),length_is(length)] uint8 *data;
498 typedef [flag(NDR_PAHEX)] struct {
499 [range(0,65536)] uint32 size;
500 [size_is(size)] uint8 *data;
504 LSA_TRUSTED_DOMAIN_INFO_NAME = 1,
505 LSA_TRUSTED_DOMAIN_INFO_CONTROLLERS_INFO = 2,
506 LSA_TRUSTED_DOMAIN_INFO_POSIX_OFFSET = 3,
507 LSA_TRUSTED_DOMAIN_INFO_PASSWORD = 4,
508 LSA_TRUSTED_DOMAIN_INFO_BASIC = 5,
509 LSA_TRUSTED_DOMAIN_INFO_INFO_EX = 6,
510 LSA_TRUSTED_DOMAIN_INFO_AUTH_INFO = 7,
511 LSA_TRUSTED_DOMAIN_INFO_FULL_INFO = 8,
512 LSA_TRUSTED_DOMAIN_INFO_11 = 11,
513 LSA_TRUSTED_DOMAIN_INFO_INFO_ALL = 12
514 } lsa_TrustDomInfoEnum;
517 lsa_StringLarge netbios_name;
518 } lsa_TrustDomainInfoName;
522 } lsa_TrustDomainInfoPosixOffset;
525 lsa_DATA_BUF *password;
526 lsa_DATA_BUF *old_password;
527 } lsa_TrustDomainInfoPassword;
530 lsa_String netbios_name;
532 } lsa_TrustDomainInfoBasic;
535 lsa_StringLarge domain_name;
536 lsa_StringLarge netbios_name;
538 uint32 trust_direction;
540 uint32 trust_attributes;
541 } lsa_TrustDomainInfoInfoEx;
544 NTTIME_hyper last_update_time;
547 } lsa_TrustDomainInfoBuffer;
550 uint32 incoming_count;
551 lsa_TrustDomainInfoBuffer *incoming_current_auth_info;
552 lsa_TrustDomainInfoBuffer *incoming_previous_auth_info;
553 uint32 outgoing_count;
554 lsa_TrustDomainInfoBuffer *outgoing_current_auth_info;
555 lsa_TrustDomainInfoBuffer *outgoing_previous_auth_info;
556 } lsa_TrustDomainInfoAuthInfo;
559 lsa_TrustDomainInfoInfoEx info_ex;
560 lsa_TrustDomainInfoPosixOffset posix_offset;
561 lsa_TrustDomainInfoAuthInfo auth_info;
562 } lsa_TrustDomainInfoFullInfo;
565 lsa_TrustDomainInfoInfoEx info_ex;
567 } lsa_TrustDomainInfo11;
570 lsa_TrustDomainInfoInfoEx info_ex;
572 lsa_TrustDomainInfoPosixOffset posix_offset;
573 lsa_TrustDomainInfoAuthInfo auth_info;
574 } lsa_TrustDomainInfoInfoAll;
576 typedef [switch_type(lsa_TrustDomInfoEnum)] union {
577 [case(LSA_TRUSTED_DOMAIN_INFO_NAME)] lsa_TrustDomainInfoName name;
578 [case(LSA_TRUSTED_DOMAIN_INFO_POSIX_OFFSET)] lsa_TrustDomainInfoPosixOffset posix_offset;
579 [case(LSA_TRUSTED_DOMAIN_INFO_PASSWORD)] lsa_TrustDomainInfoPassword password;
580 [case(LSA_TRUSTED_DOMAIN_INFO_BASIC)] lsa_TrustDomainInfoBasic info_basic;
581 [case(LSA_TRUSTED_DOMAIN_INFO_INFO_EX)] lsa_TrustDomainInfoInfoEx info_ex;
582 [case(LSA_TRUSTED_DOMAIN_INFO_AUTH_INFO)] lsa_TrustDomainInfoAuthInfo auth_info;
583 [case(LSA_TRUSTED_DOMAIN_INFO_FULL_INFO)] lsa_TrustDomainInfoFullInfo full_info;
584 [case(LSA_TRUSTED_DOMAIN_INFO_11)] lsa_TrustDomainInfo11 info11;
585 [case(LSA_TRUSTED_DOMAIN_INFO_INFO_ALL)] lsa_TrustDomainInfoInfoAll info_all;
586 } lsa_TrustedDomainInfo;
589 NTSTATUS lsa_QueryTrustedDomainInfo(
590 [in] policy_handle *trustdom_handle,
591 [in] lsa_TrustDomInfoEnum level,
592 [out,switch_is(level),unique] lsa_TrustedDomainInfo *info
596 NTSTATUS lsa_SetInformationTrustedDomain();
599 [public] NTSTATUS lsa_OpenSecret(
600 [in] policy_handle *handle,
601 [in] lsa_String name,
602 [in] uint32 access_mask,
603 [out] policy_handle *sec_handle
608 [public] NTSTATUS lsa_SetSecret(
609 [in] policy_handle *sec_handle,
610 [in,unique] lsa_DATA_BUF *new_val,
611 [in,unique] lsa_DATA_BUF *old_val
619 [public] NTSTATUS lsa_QuerySecret (
620 [in] policy_handle *sec_handle,
621 [in,out,unique] lsa_DATA_BUF_PTR *new_val,
622 [in,out,unique] NTTIME_hyper *new_mtime,
623 [in,out,unique] lsa_DATA_BUF_PTR *old_val,
624 [in,out,unique] NTTIME_hyper *old_mtime
628 NTSTATUS lsa_LookupPrivValue(
629 [in] policy_handle *handle,
630 [in] lsa_String *name,
636 NTSTATUS lsa_LookupPrivName (
637 [in] policy_handle *handle,
639 [out,unique] lsa_StringLarge *name
643 /*******************/
645 NTSTATUS lsa_LookupPrivDisplayName (
646 [in] policy_handle *handle,
647 [in] lsa_String *name,
648 [out,unique] lsa_StringLarge *disp_name,
649 /* see http://www.microsoft.com/globaldev/nlsweb/ for
650 language definitions */
651 [in,out] uint16 *language_id,
656 NTSTATUS lsa_DeleteObject();
659 /*******************/
661 NTSTATUS lsa_EnumAccountsWithUserRight (
662 [in] policy_handle *handle,
663 [in,unique] lsa_String *name,
664 [out] lsa_SidArray *sids
669 [string,charset(UTF16)] uint16 *name;
670 } lsa_RightAttribute;
674 [size_is(count)] lsa_StringLarge *names;
677 NTSTATUS lsa_EnumAccountRights (
678 [in] policy_handle *handle,
680 [out] lsa_RightSet *rights
684 /**********************/
686 NTSTATUS lsa_AddAccountRights (
687 [in] policy_handle *handle,
689 [in] lsa_RightSet *rights
692 /**********************/
694 NTSTATUS lsa_RemoveAccountRights (
695 [in] policy_handle *handle,
698 [in] lsa_RightSet *rights
702 NTSTATUS lsa_QueryTrustedDomainInfoBySid(
703 [in] policy_handle *handle,
704 [in] dom_sid2 *dom_sid,
705 [in] lsa_TrustDomInfoEnum level,
706 [out,switch_is(level),unique] lsa_TrustedDomainInfo *info
710 NTSTATUS lsa_SetTrustedDomainInfo();
712 NTSTATUS lsa_DeleteTrustedDomain(
713 [in] policy_handle *handle,
714 [in] dom_sid2 *dom_sid
718 NTSTATUS lsa_StorePrivateData();
720 NTSTATUS lsa_RetrievePrivateData();
723 /**********************/
725 [public] NTSTATUS lsa_OpenPolicy2 (
726 [in,unique] [string,charset(UTF16)] uint16 *system_name,
727 [in] lsa_ObjectAttribute *attr,
728 [in] uint32 access_mask,
729 [out] policy_handle *handle
732 /**********************/
738 NTSTATUS lsa_GetUserName(
739 [in,unique] [string,charset(UTF16)] uint16 *system_name,
740 [in,out,unique] lsa_String *account_name,
741 [in,out,unique] lsa_StringPointer *authority_name
744 /**********************/
747 NTSTATUS lsa_QueryInfoPolicy2(
748 [in] policy_handle *handle,
749 [in] lsa_PolicyInfo level,
750 [out,unique,switch_is(level)] lsa_PolicyInformation *info
754 NTSTATUS lsa_SetInfoPolicy2(
755 [in] policy_handle *handle,
756 [in] lsa_PolicyInfo level,
757 [in,switch_is(level)] lsa_PolicyInformation *info
760 /**********************/
762 NTSTATUS lsa_QueryTrustedDomainInfoByName(
763 [in] policy_handle *handle,
764 [in] lsa_String trusted_domain,
765 [in] lsa_TrustDomInfoEnum level,
766 [out,unique,switch_is(level)] lsa_TrustedDomainInfo *info
769 /**********************/
771 NTSTATUS lsa_SetTrustedDomainInfoByName(
772 [in] policy_handle *handle,
773 [in] lsa_String trusted_domain,
774 [in] lsa_TrustDomInfoEnum level,
775 [in,unique,switch_is(level)] lsa_TrustedDomainInfo *info
780 /* w2k3 treats max_size as max_domains*82 */
781 const int LSA_ENUM_TRUST_DOMAIN_EX_MULTIPLIER = 82;
785 [size_is(count)] lsa_TrustDomainInfoInfoEx *domains;
788 NTSTATUS lsa_EnumTrustedDomainsEx (
789 [in] policy_handle *handle,
790 [in,out] uint32 *resume_handle,
791 [out] lsa_DomainListEx *domains,
797 NTSTATUS lsa_CreateTrustedDomainEx();
800 NTSTATUS lsa_CloseTrustedDomainEx(
801 [in,out] policy_handle *handle
806 /* w2k3 returns either 0x000bbbd000000000 or 0x000a48e800000000
809 uint32 enforce_restrictions;
810 hyper service_tkt_lifetime;
811 hyper user_tkt_lifetime;
812 hyper user_tkt_renewaltime;
815 } lsa_DomainInfoKerberos;
819 [size_is(blob_size)] uint8 *efs_blob;
823 LSA_DOMAIN_INFO_POLICY_EFS=2,
824 LSA_DOMAIN_INFO_POLICY_KERBEROS=3
825 } lsa_DomainInfoEnum;
827 typedef [switch_type(uint16)] union {
828 [case(LSA_DOMAIN_INFO_POLICY_EFS)] lsa_DomainInfoEfs efs_info;
829 [case(LSA_DOMAIN_INFO_POLICY_KERBEROS)] lsa_DomainInfoKerberos kerberos_info;
830 } lsa_DomainInformationPolicy;
832 NTSTATUS lsa_QueryDomainInformationPolicy(
833 [in] policy_handle *handle,
835 [out,unique,switch_is(level)] lsa_DomainInformationPolicy *info
839 NTSTATUS lsa_SetDomainInformationPolicy(
840 [in] policy_handle *handle,
842 [in,unique,switch_is(level)] lsa_DomainInformationPolicy *info
845 /**********************/
847 NTSTATUS lsa_OpenTrustedDomainByName(
848 [in] policy_handle *handle,
849 [in] lsa_String name,
850 [in] uint32 access_mask,
851 [out] policy_handle *trustdom_handle
855 NTSTATUS lsa_TestCall();
857 /**********************/
861 lsa_SidType sid_type;
865 } lsa_TranslatedName2;
868 [range(0,1000)] uint32 count;
869 [size_is(count)] lsa_TranslatedName2 *names;
870 } lsa_TransNameArray2;
872 [public] NTSTATUS lsa_LookupSids2(
873 [in] policy_handle *handle,
874 [in] lsa_SidArray *sids,
875 [out,unique] lsa_RefDomainList *domains,
876 [in,out] lsa_TransNameArray2 *names,
878 [in,out] uint32 *count,
879 [in] uint32 unknown1,
883 /**********************/
887 lsa_SidType sid_type;
891 } lsa_TranslatedSid2;
894 [range(0,1000)] uint32 count;
895 [size_is(count)] lsa_TranslatedSid2 *sids;
896 } lsa_TransSidArray2;
898 [public] NTSTATUS lsa_LookupNames2 (
899 [in] policy_handle *handle,
900 [in,range(0,1000)] uint32 num_names,
901 [in,size_is(num_names)] lsa_String names[],
902 [out,unique] lsa_RefDomainList *domains,
903 [in,out] lsa_TransSidArray2 *sids,
904 [in] lsa_LookupNamesLevel level,
905 [in,out] uint32 *count,
906 [in] uint32 unknown1,
911 NTSTATUS lsa_CreateTrustedDomainEx2();
914 NTSTATUS lsa_CREDRWRITE();
917 NTSTATUS lsa_CREDRREAD();
920 NTSTATUS lsa_CREDRENUMERATE();
923 NTSTATUS lsa_CREDRWRITEDOMAINCREDENTIALS();
926 NTSTATUS lsa_CREDRREADDOMAINCREDENTIALS();
929 NTSTATUS lsa_CREDRDELETE();
932 NTSTATUS lsa_CREDRGETTARGETINFO();
935 NTSTATUS lsa_CREDRPROFILELOADED();
937 /**********************/
940 lsa_SidType sid_type;
944 } lsa_TranslatedSid3;
947 [range(0,1000)] uint32 count;
948 [size_is(count)] lsa_TranslatedSid3 *sids;
949 } lsa_TransSidArray3;
951 [public] NTSTATUS lsa_LookupNames3 (
952 [in] policy_handle *handle,
953 [in,range(0,1000)] uint32 num_names,
954 [in,size_is(num_names)] lsa_String names[],
955 [out,unique] lsa_RefDomainList *domains,
956 [in,out] lsa_TransSidArray3 *sids,
957 [in] lsa_LookupNamesLevel level,
958 [in,out] uint32 *count,
959 [in] uint32 unknown1,
964 NTSTATUS lsa_CREDRGETSESSIONTYPES();
967 NTSTATUS lsa_LSARREGISTERAUDITEVENT();
970 NTSTATUS lsa_LSARGENAUDITEVENT();
973 NTSTATUS lsa_LSARUNREGISTERAUDITEVENT();
977 [range(0,131072)] uint32 length;
978 [size_is(length)] uint8 *data;
979 } lsa_ForestTrustBinaryData;
982 dom_sid2 *domain_sid;
983 lsa_StringLarge dns_domain_name;
984 lsa_StringLarge netbios_domain_name;
985 } lsa_ForestTrustDomainInfo;
987 typedef [switch_type(uint32)] union {
988 [case(LSA_FOREST_TRUST_TOP_LEVEL_NAME)] lsa_String top_level_name;
989 [case(LSA_FOREST_TRUST_TOP_LEVEL_NAME_EX)] lsa_StringLarge top_level_name_ex;
990 [case(LSA_FOREST_TRUST_DOMAIN_INFO)] lsa_ForestTrustDomainInfo domain_info;
991 [default] lsa_ForestTrustBinaryData data;
992 } lsa_ForestTrustData;
994 typedef [v1_enum] enum {
995 LSA_FOREST_TRUST_TOP_LEVEL_NAME = 0,
996 LSA_FOREST_TRUST_TOP_LEVEL_NAME_EX = 1,
997 LSA_FOREST_TRUST_DOMAIN_INFO = 2,
998 LSA_FOREST_TRUST_RECORD_TYPE_LAST = 3
999 } lsa_ForestTrustRecordType;
1003 lsa_ForestTrustRecordType level;
1005 [switch_is(level)] lsa_ForestTrustData forest_trust_data;
1006 } lsa_ForestTrustRecord;
1008 typedef [public] struct {
1009 [range(0,4000)] uint32 count;
1010 [size_is(count)] lsa_ForestTrustRecord **entries;
1011 } lsa_ForestTrustInformation;
1013 NTSTATUS lsa_lsaRQueryForestTrustInformation(
1014 [in] policy_handle *handle,
1015 [in,ref] lsa_String *trusted_domain_name,
1016 [in] uint16 unknown, /* level ? */
1017 [out,ref] lsa_ForestTrustInformation **forest_trust_info
1021 NTSTATUS lsa_LSARSETFORESTTRUSTINFORMATION();
1024 NTSTATUS lsa_CREDRRENAME();
1029 [public] NTSTATUS lsa_LookupSids3(
1030 [in] lsa_SidArray *sids,
1031 [out,unique] lsa_RefDomainList *domains,
1032 [in,out] lsa_TransNameArray2 *names,
1034 [in,out] uint32 *count,
1035 [in] uint32 unknown1,
1036 [in] uint32 unknown2
1040 NTSTATUS lsa_LookupNames4(
1041 [in,range(0,1000)] uint32 num_names,
1042 [in,size_is(num_names)] lsa_String names[],
1043 [out,unique] lsa_RefDomainList *domains,
1044 [in,out] lsa_TransSidArray3 *sids,
1045 [in] lsa_LookupNamesLevel level,
1046 [in,out] uint32 *count,
1047 [in] uint32 unknown1,
1048 [in] uint32 unknown2
1052 NTSTATUS lsa_LSAROPENPOLICYSCE();
1055 NTSTATUS lsa_LSARADTREGISTERSECURITYEVENTSOURCE();
1058 NTSTATUS lsa_LSARADTUNREGISTERSECURITYEVENTSOURCE();
1061 NTSTATUS lsa_LSARADTREPORTSECURITYEVENT();