3 much of this was derived from the ethereal sources - thanks to everyone
10 uuid("12345678-1234-abcd-ef00-01234567cffb"),
12 endpoint("ncacn_np:[\\pipe\\netlogon]","ncacn_ip_tcp:","ncalrpc:"),
13 pointer_default(unique),
14 pointer_default_top(unique),
15 depends(lsa,samr,security)
20 declare bitmap samr_AcctFlags;
26 [string,charset(UTF16)] uint16 *account_name;
37 time_t pw_must_change;
38 [string,charset(UTF16)] uint16 *computer;
39 [string,charset(UTF16)] uint16 *domain;
40 [string,charset(UTF16)] uint16 *script_path;
44 WERROR netr_LogonUasLogon(
45 [in] [string,charset(UTF16)] uint16 *server_name,
46 [in] [string,charset(UTF16)] uint16 account_name[],
47 [in] [string,charset(UTF16)] uint16 workstation[],
48 [out] netr_UasInfo *info
60 WERROR netr_LogonUasLogoff(
61 [in] [string,charset(UTF16)] uint16 *server_name,
62 [in] [string,charset(UTF16)] uint16 account_name[],
63 [in] [string,charset(UTF16)] uint16 workstation[],
64 [out] netr_UasLogoffInfo info
71 /* in netr_AcctLockStr size seems to be be 24, and rrenard thinks
72 that the structure of the bindata looks like this:
74 dlong lockout_duration;
76 uint32 bad_attempt_lockout;
79 but it doesn't look as though this structure is reflected at the
80 NDR level. Maybe it is left to the application to decode the bindata array.
85 [size_is(size/2),length_is(length/2)] uint16 *bindata;
88 const int MSV1_0_CLEARTEXT_PASSWORD_ALLOWED = 0x002;
89 const int MSV1_0_ALLOW_SERVER_TRUST_ACCOUNT = 0x020;
90 const int MSV1_0_ALLOW_WORKSTATION_TRUST_ACCOUNT = 0x800;
93 lsa_String domain_name;
94 uint32 parameter_control; /* see MSV1_0_* */
97 lsa_String account_name;
98 lsa_String workstation;
102 netr_IdentityInfo identity_info;
103 samr_Password lmpassword;
104 samr_Password ntpassword;
107 typedef [flag(NDR_PAHEX)] struct {
109 [value(length)] uint16 size;
110 [size_is(length),length_is(length)] uint8 *data;
111 } netr_ChallengeResponse;
113 typedef [flag(NDR_PAHEX)] struct {
114 netr_IdentityInfo identity_info;
116 netr_ChallengeResponse nt;
117 netr_ChallengeResponse lm;
120 typedef [switch_type(uint16)] union {
121 [case(1)] netr_PasswordInfo *password;
122 [case(2)] netr_NetworkInfo *network;
123 [case(3)] netr_PasswordInfo *password;
124 [case(5)] netr_PasswordInfo *password;
125 [case(6)] netr_NetworkInfo *network;
128 typedef [public] struct {
131 } netr_GroupMembership;
133 typedef [public,flag(NDR_PAHEX)] struct {
135 } netr_UserSessionKey;
137 typedef [public,flag(NDR_PAHEX)] struct {
141 /* Flags for user_flags below */
142 const int NETLOGON_EXTRA_SIDS = 0x0020;
143 const int NETLOGON_RESOURCE_GROUPS = 0x0200;
149 NTTIME last_password_change;
150 NTTIME allow_password_change;
151 NTTIME force_password_change;
152 lsa_String account_name;
153 lsa_String full_name;
154 lsa_String logon_script;
155 lsa_String profile_path;
156 lsa_String home_directory;
157 lsa_String home_drive;
159 uint16 bad_password_count;
162 samr_RidWithAttributeArray groups;
164 netr_UserSessionKey key;
165 lsa_StringLarge logon_server;
166 lsa_StringLarge domain;
167 dom_sid2 *domain_sid;
168 netr_LMSessionKey LMSessKey;
169 samr_AcctFlags acct_flags;
174 netr_SamBaseInfo base;
182 typedef [public] struct {
183 netr_SamBaseInfo base;
185 [size_is(sidcount)] netr_SidAttr *sids;
189 netr_SamBaseInfo base;
191 [size_is(sidcount)] netr_SidAttr *sids;
193 lsa_String principle;
199 [size_is(pac_size)] uint8 *pac;
200 lsa_String logon_domain;
201 lsa_String logon_server;
202 lsa_String principal_name;
204 [size_is(auth_size)] uint8 *auth;
205 netr_UserSessionKey user_session_key;
206 uint32 expansionroom[10];
213 typedef [switch_type(uint16)] union {
214 [case(2)] netr_SamInfo2 *sam2;
215 [case(3)] netr_SamInfo3 *sam3;
216 [case(4)] netr_PacInfo *pac;
217 [case(5)] netr_PacInfo *pac;
218 [case(6)] netr_SamInfo6 *sam6;
221 typedef [public, flag(NDR_PAHEX)] struct {
225 typedef [public] struct {
226 netr_Credential cred;
228 } netr_Authenticator;
230 NTSTATUS netr_LogonSamLogon(
231 [in] [string,charset(UTF16)] uint16 *server_name,
232 [in] [string,charset(UTF16)] uint16 *workstation,
233 [in] netr_Authenticator *credential,
234 [in][out] netr_Authenticator *return_authenticator,
235 [in] uint16 logon_level,
236 [in] [switch_is(logon_level)] netr_LogonLevel logon,
237 [in] uint16 validation_level,
238 [out] [switch_is(validation_level)] netr_Validation validation,
239 [out] uint8 authoritative
246 NTSTATUS netr_LogonSamLogoff(
247 [in] [string,charset(UTF16)] uint16 *server_name,
248 [in] [string,charset(UTF16)] uint16 *computer_name,
249 [in] netr_Authenticator *credential,
250 [in][out] netr_Authenticator *return_authenticator,
251 [in] uint16 logon_level,
252 [in] [switch_is(logon_level)] netr_LogonLevel logon
260 NTSTATUS netr_ServerReqChallenge(
261 [in,string,charset(UTF16)] uint16 *server_name,
262 [in,string,charset(UTF16)] uint16 computer_name[],
263 [in,out,ref] netr_Credential *credentials
270 declare enum netr_SchannelType;
272 NTSTATUS netr_ServerAuthenticate(
273 [in,string,charset(UTF16)] uint16 *server_name,
274 [in,string,charset(UTF16)] uint16 account_name[],
275 [in] netr_SchannelType secure_channel_type,
276 [in,string,charset(UTF16)] uint16 computer_name[],
277 [in,out,ref] netr_Credential *credentials
284 NTSTATUS netr_ServerPasswordSet(
285 [in] [string,charset(UTF16)] uint16 *server_name,
286 [in] [string,charset(UTF16)] uint16 account_name[],
287 [in] netr_SchannelType secure_channel_type,
288 [in] [string,charset(UTF16)] uint16 computer_name[],
289 [in] netr_Authenticator credential,
290 [in] samr_Password new_password,
291 [out] netr_Authenticator return_authenticator
298 declare enum netr_SamDatabaseID;
301 [string,charset(UTF16)] uint16 *account_name;
310 } netr_DELTA_DELETE_USER;
314 [value(length)] uint16 size;
326 uint8 nt_history[nt_length];
327 uint8 lm_history[lm_length];
328 } netr_PasswordHistory;
331 netr_USER_KEY16 lmpassword;
332 netr_USER_KEY16 ntpassword;
333 netr_PasswordHistory lmhistory;
337 netr_USER_KEYS2 keys2;
338 } netr_USER_KEY_UNION;
340 typedef [public] struct {
342 netr_USER_KEY_UNION keys;
346 bool8 SensitiveDataFlag;
349 /* netr_USER_KEYS encrypted with the session key */
350 [size_is(DataLength)][flag(NDR_PAHEX)] uint8 *SensitiveData;
351 } netr_USER_PRIVATE_INFO;
354 lsa_String account_name;
355 lsa_String full_name;
358 lsa_String home_directory;
359 lsa_String home_drive;
360 lsa_String logon_script;
361 lsa_String description;
362 lsa_String workstations;
365 samr_LogonHours logon_hours;
366 uint16 bad_password_count;
368 NTTIME last_password_change;
370 samr_AcctFlags acct_flags;
371 samr_Password lmpassword;
372 samr_Password ntpassword;
373 bool8 nt_password_present;
374 bool8 lm_password_present;
375 bool8 password_expired;
377 lsa_String parameters;
380 netr_USER_PRIVATE_INFO user_private_info;
381 uint32 SecurityInformation;
383 lsa_String profile_path;
394 lsa_String domain_name;
396 dlong force_logoff_time;
397 uint16 min_password_length;
398 uint16 password_history_length;
399 /* yes, these are signed. They are in negative 100ns */
400 dlong max_password_age;
401 dlong min_password_age;
403 NTTIME domain_create_time;
404 uint32 SecurityInformation;
406 netr_AcctLockStr account_lockout;
410 uint32 logon_to_chgpass;
417 lsa_String group_name;
420 lsa_String description;
421 uint32 SecurityInformation;
447 [size_is(num_rids)] uint32 *rids;
448 [size_is(num_rids)] uint32 *attribs;
454 } netr_DELTA_GROUP_MEMBER;
457 lsa_String alias_name;
459 uint32 SecurityInformation;
461 lsa_String description;
477 } netr_DELTA_ALIAS_MEMBER;
480 uint32 pagedpoollimit;
481 uint32 nonpagedpoollimit;
482 uint32 minimumworkingsetsize;
483 uint32 maximumworkingsetsize;
484 uint32 pagefilelimit;
490 NTTIME auditretentionperiod;
492 uint32 maxauditeventcount;
493 [size_is(maxauditeventcount+1)] uint32 *eventauditoptions;
494 lsa_String primary_domain_name;
496 netr_QUOTA_LIMITS quota_limits;
498 NTTIME db_create_time;
499 uint32 SecurityInformation;
512 lsa_String domain_name;
513 uint32 num_controllers;
514 [size_is(num_controllers)] lsa_String *controller_names;
515 uint32 SecurityInformation;
525 } netr_DELTA_TRUSTED_DOMAIN;
529 } netr_DELTA_DELETE_TRUST;
532 uint32 privilege_entries;
533 uint32 privilege_control;
534 [size_is(privilege_entries)] uint32 *privilege_attrib;
535 [size_is(privilege_entries)] lsa_String *privilege_name;
536 netr_QUOTA_LIMITS quotalimits;
538 uint32 SecurityInformation;
548 } netr_DELTA_ACCOUNT;
552 } netr_DELTA_DELETE_ACCOUNT;
556 } netr_DELTA_DELETE_SECRET;
561 [size_is(maxlen)][length_is(len)] uint8 *cipher_data;
565 netr_CIPHER_VALUE current_cipher;
566 NTTIME current_cipher_set_time;
567 netr_CIPHER_VALUE old_cipher;
568 NTTIME old_cipher_set_time;
569 uint32 SecurityInformation;
582 NETR_DELTA_DOMAIN = 1,
583 NETR_DELTA_GROUP = 2,
584 NETR_DELTA_DELETE_GROUP = 3,
585 NETR_DELTA_RENAME_GROUP = 4,
587 NETR_DELTA_DELETE_USER = 6,
588 NETR_DELTA_RENAME_USER = 7,
589 NETR_DELTA_GROUP_MEMBER = 8,
590 NETR_DELTA_ALIAS = 9,
591 NETR_DELTA_DELETE_ALIAS = 10,
592 NETR_DELTA_RENAME_ALIAS = 11,
593 NETR_DELTA_ALIAS_MEMBER = 12,
594 NETR_DELTA_POLICY = 13,
595 NETR_DELTA_TRUSTED_DOMAIN = 14,
596 NETR_DELTA_DELETE_TRUST = 15,
597 NETR_DELTA_ACCOUNT = 16,
598 NETR_DELTA_DELETE_ACCOUNT = 17,
599 NETR_DELTA_SECRET = 18,
600 NETR_DELTA_DELETE_SECRET = 19,
601 NETR_DELTA_DELETE_GROUP2 = 20,
602 NETR_DELTA_DELETE_USER2 = 21,
603 NETR_DELTA_MODIFY_COUNT = 22
606 typedef [switch_type(netr_DeltaEnum)] union {
607 [case(NETR_DELTA_DOMAIN)] netr_DELTA_DOMAIN *domain;
608 [case(NETR_DELTA_GROUP)] netr_DELTA_GROUP *group;
609 [case(NETR_DELTA_DELETE_GROUP)] ; /* rid only */
610 [case(NETR_DELTA_RENAME_GROUP)] netr_DELTA_RENAME *rename_group;
611 [case(NETR_DELTA_USER)] netr_DELTA_USER *user;
612 [case(NETR_DELTA_DELETE_USER)] ; /* rid only */
613 [case(NETR_DELTA_RENAME_USER)] netr_DELTA_RENAME *rename_user;
614 [case(NETR_DELTA_GROUP_MEMBER)] netr_DELTA_GROUP_MEMBER *group_member;
615 [case(NETR_DELTA_ALIAS)] netr_DELTA_ALIAS *alias;
616 [case(NETR_DELTA_DELETE_ALIAS)] ; /* rid only */
617 [case(NETR_DELTA_RENAME_ALIAS)] netr_DELTA_RENAME *rename_alias;
618 [case(NETR_DELTA_ALIAS_MEMBER)] netr_DELTA_ALIAS_MEMBER *alias_member;
619 [case(NETR_DELTA_POLICY)] netr_DELTA_POLICY *policy;
620 [case(NETR_DELTA_TRUSTED_DOMAIN)] netr_DELTA_TRUSTED_DOMAIN *trusted_domain;
621 [case(NETR_DELTA_DELETE_TRUST)] netr_DELTA_DELETE_TRUST delete_trust;
622 [case(NETR_DELTA_ACCOUNT)] netr_DELTA_ACCOUNT *account;
623 [case(NETR_DELTA_DELETE_ACCOUNT)] netr_DELTA_DELETE_ACCOUNT delete_account;
624 [case(NETR_DELTA_SECRET)] netr_DELTA_SECRET *secret;
625 [case(NETR_DELTA_DELETE_SECRET)] netr_DELTA_DELETE_SECRET delete_secret;
626 [case(NETR_DELTA_DELETE_GROUP2)] netr_DELTA_DELETE_USER *delete_group;
627 [case(NETR_DELTA_DELETE_USER2)] netr_DELTA_DELETE_USER *delete_user;
628 [case(NETR_DELTA_MODIFY_COUNT)] udlong *modified_count;
631 typedef [switch_type(netr_DeltaEnum)] union {
632 [case(NETR_DELTA_DOMAIN)] uint32 rid;
633 [case(NETR_DELTA_GROUP)] uint32 rid;
634 [case(NETR_DELTA_DELETE_GROUP)] uint32 rid;
635 [case(NETR_DELTA_RENAME_GROUP)] uint32 rid;
636 [case(NETR_DELTA_USER)] uint32 rid;
637 [case(NETR_DELTA_DELETE_USER)] uint32 rid;
638 [case(NETR_DELTA_RENAME_USER)] uint32 rid;
639 [case(NETR_DELTA_GROUP_MEMBER)] uint32 rid;
640 [case(NETR_DELTA_ALIAS)] uint32 rid;
641 [case(NETR_DELTA_DELETE_ALIAS)] uint32 rid;
642 [case(NETR_DELTA_RENAME_ALIAS)] uint32 rid;
643 [case(NETR_DELTA_ALIAS_MEMBER)] uint32 rid;
644 [case(NETR_DELTA_POLICY)] dom_sid2 *sid;
645 [case(NETR_DELTA_TRUSTED_DOMAIN)] dom_sid2 *sid;
646 [case(NETR_DELTA_DELETE_TRUST)] dom_sid2 *sid;
647 [case(NETR_DELTA_ACCOUNT)] dom_sid2 *sid;
648 [case(NETR_DELTA_DELETE_ACCOUNT)] dom_sid2 *sid;
649 [case(NETR_DELTA_SECRET)] [string,charset(UTF16)] uint16 *name;
650 [case(NETR_DELTA_DELETE_SECRET)] [string,charset(UTF16)] uint16 *name;
651 [case(NETR_DELTA_DELETE_GROUP2)] uint32 rid;
652 [case(NETR_DELTA_DELETE_USER2)] uint32 rid;
653 [case(NETR_DELTA_MODIFY_COUNT)] ;
654 } netr_DELTA_ID_UNION;
657 netr_DeltaEnum delta_type;
658 [switch_is(delta_type)] netr_DELTA_ID_UNION delta_id_union;
659 [switch_is(delta_type)] netr_DELTA_UNION delta_union;
664 [size_is(num_deltas)] netr_DELTA_ENUM *delta_enum;
665 } netr_DELTA_ENUM_ARRAY;
668 NTSTATUS netr_DatabaseDeltas(
669 [in] [string,charset(UTF16)] uint16 logon_server[],
670 [in] [string,charset(UTF16)] uint16 computername[],
671 [in] netr_Authenticator credential,
672 [in,out] netr_Authenticator return_authenticator,
673 [in] netr_SamDatabaseID database_id,
674 [in,out] udlong sequence_num,
675 [in] uint32 preferredmaximumlength,
676 [out] netr_DELTA_ENUM_ARRAY *delta_enum_array
683 NTSTATUS netr_DatabaseSync(
684 [in] [string,charset(UTF16)] uint16 logon_server[],
685 [in] [string,charset(UTF16)] uint16 computername[],
686 [in] netr_Authenticator credential,
687 [in,out] netr_Authenticator return_authenticator,
688 [in] netr_SamDatabaseID database_id,
689 [in,out] uint32 sync_context,
690 [in] uint32 preferredmaximumlength,
691 [out] netr_DELTA_ENUM_ARRAY *delta_enum_array
698 /* w2k3 returns NT_STATUS_NOT_IMPLEMENTED for this call */
700 typedef [flag(NDR_PAHEX)] struct {
701 uint8 computer_name[16];
703 uint32 serial_number;
707 [flag(NDR_REMAINING)] DATA_BLOB blob;
708 } netr_AccountBuffer;
710 NTSTATUS netr_AccountDeltas(
711 [in] [string,charset(UTF16)] uint16 *logon_server,
712 [in] [string,charset(UTF16)] uint16 computername[],
713 [in] netr_Authenticator credential,
714 [in,out] netr_Authenticator return_authenticator,
715 [in] netr_UAS_INFO_0 uas,
718 [in] uint32 buffersize,
719 [out,subcontext(4)] netr_AccountBuffer buffer,
720 [out] uint32 count_returned,
721 [out] uint32 total_entries,
722 [out] netr_UAS_INFO_0 recordid
729 NTSTATUS netr_AccountSync(
730 [in] [string,charset(UTF16)] uint16 *logon_server,
731 [in] [string,charset(UTF16)] uint16 computername[],
732 [in] netr_Authenticator credential,
733 [in,out] netr_Authenticator return_authenticator,
734 [in] uint32 reference,
736 [in] uint32 buffersize,
737 [out,subcontext(4)] netr_AccountBuffer buffer,
738 [out] uint32 count_returned,
739 [out] uint32 total_entries,
740 [out] uint32 next_reference,
741 [in,out] netr_UAS_INFO_0 recordid
748 NTSTATUS netr_GetDcName(
749 [in] [string,charset(UTF16)] uint16 logon_server[],
750 [in] [string,charset(UTF16)] uint16 *domainname,
751 [out] [string,charset(UTF16)] uint16 *dcname
759 uint32 pdc_connection_status;
760 } netr_NETLOGON_INFO_1;
764 uint32 pdc_connection_status;
765 [string,charset(UTF16)] uint16 trusted_dc_name[];
766 uint32 tc_connection_status;
767 } netr_NETLOGON_INFO_2;
771 uint32 logon_attempts;
777 } netr_NETLOGON_INFO_3;
780 [case(1)] netr_NETLOGON_INFO_1 *info1;
781 [case(2)] netr_NETLOGON_INFO_2 *info2;
782 [case(3)] netr_NETLOGON_INFO_3 *info3;
783 } netr_CONTROL_QUERY_INFORMATION;
785 /* function_code values */
786 typedef [v1_enum] enum {
787 NETLOGON_CONTROL_REDISCOVER = 5,
788 NETLOGON_CONTROL_TC_QUERY = 6,
789 NETLOGON_CONTROL_TRANSPORT_NOTIFY = 7,
790 NETLOGON_CONTROL_SET_DBFLAG = 65534
791 } netr_LogonControlCode;
793 WERROR netr_LogonControl(
794 [in] [string,charset(UTF16)] uint16 *logon_server,
795 [in] netr_LogonControlCode function_code,
797 [out,switch_is(level)] netr_CONTROL_QUERY_INFORMATION info
804 WERROR netr_GetAnyDCName(
805 [in] [string,charset(UTF16)] uint16 *logon_server,
806 [in] [string,charset(UTF16)] uint16 *domainname,
807 [out] [string,charset(UTF16)] uint16 *dcname
815 [case(NETLOGON_CONTROL_REDISCOVER)] [string,charset(UTF16)] uint16 *domain;
816 [case(NETLOGON_CONTROL_TC_QUERY)] [string,charset(UTF16)] uint16 *domain;
817 [case(NETLOGON_CONTROL_TRANSPORT_NOTIFY)] [string,charset(UTF16)] uint16 *domain;
818 [case(NETLOGON_CONTROL_SET_DBFLAG)] uint32 debug_level;
819 } netr_CONTROL_DATA_INFORMATION;
821 WERROR netr_LogonControl2(
822 [in] [string,charset(UTF16)] uint16 *logon_server,
823 [in] uint32 function_code,
825 [in][switch_is(function_code)] netr_CONTROL_DATA_INFORMATION data,
826 [out][switch_is(level)] netr_CONTROL_QUERY_INFORMATION query
830 /* If this flag is not set, then the passwords and LM session keys are
831 * encrypted with DES calls. (And the user session key is
833 const int NETLOGON_NEG_ARCFOUR = 0x00000004;
834 const int NETLOGON_NEG_128BIT = 0x00004000;
835 const int NETLOGON_NEG_SCHANNEL = 0x40000000;
840 NTSTATUS netr_ServerAuthenticate2(
841 [in] [string,charset(UTF16)] uint16 *server_name,
842 [in] [string,charset(UTF16)] uint16 account_name[],
843 [in] netr_SchannelType secure_channel_type,
844 [in] [string,charset(UTF16)] uint16 computer_name[],
845 [in,out,ref] netr_Credential *credentials,
846 [in,out,ref] uint32 *negotiate_flags
853 NTSTATUS netr_DatabaseSync2(
854 [in] [string,charset(UTF16)] uint16 logon_server[],
855 [in] [string,charset(UTF16)] uint16 computername[],
856 [in] netr_Authenticator credential,
857 [in,out] netr_Authenticator return_authenticator,
858 [in] netr_SamDatabaseID database_id,
859 [in] uint16 restart_state,
860 [in,out] uint32 sync_context,
861 [in] uint32 preferredmaximumlength,
862 [out] netr_DELTA_ENUM_ARRAY *delta_enum_array
869 /* i'm not at all sure how this call works */
871 NTSTATUS netr_DatabaseRedo(
872 [in] [string,charset(UTF16)] uint16 logon_server[],
873 [in] [string,charset(UTF16)] uint16 computername[],
874 [in] netr_Authenticator credential,
875 [in,out] netr_Authenticator return_authenticator,
876 [in][size_is(change_log_entry_size)] uint8 *change_log_entry,
877 [in] uint32 change_log_entry_size,
878 [out] netr_DELTA_ENUM_ARRAY *delta_enum_array
885 WERROR netr_LogonControl2Ex(
886 [in] [string,charset(UTF16)] uint16 *logon_server,
887 [in] uint32 function_code,
889 [in][switch_is(function_code)] netr_CONTROL_DATA_INFORMATION data,
890 [out][switch_is(level)] netr_CONTROL_QUERY_INFORMATION query
895 WERROR netr_NETRENUMERATETRUSTEDDOMAINS() ;
900 [string,charset(UTF16)] uint16 *dc_unc;
901 [string,charset(UTF16)] uint16 *dc_address;
902 int32 dc_address_type;
904 [string,charset(UTF16)] uint16 *domain_name;
905 [string,charset(UTF16)] uint16 *forest_name;
907 [string,charset(UTF16)] uint16 *dc_site_name;
908 [string,charset(UTF16)] uint16 *client_site_name;
909 } netr_DsRGetDCNameInfo;
911 WERROR netr_DsRGetDCName(
912 [in] [string,charset(UTF16)] uint16 *server_unc,
913 [in] [string,charset(UTF16)] uint16 *domain_name,
914 [in] GUID *domain_guid,
915 [in] GUID *site_guid,
917 [out] netr_DsRGetDCNameInfo *info
922 WERROR netr_NETRLOGONDUMMYROUTINE1();
926 WERROR netr_NETRLOGONSETSERVICEBITS();
930 WERROR netr_NETRLOGONGETTRUSTRID();
934 WERROR netr_NETRLOGONCOMPUTESERVERDIGEST();
938 WERROR netr_NETRLOGONCOMPUTECLIENTDIGEST();
942 NTSTATUS netr_ServerAuthenticate3(
943 [in] [string,charset(UTF16)] uint16 *server_name,
944 [in] [string,charset(UTF16)] uint16 account_name[],
945 [in] netr_SchannelType secure_channel_type,
946 [in] [string,charset(UTF16)] uint16 computer_name[],
947 [in,out,ref] netr_Credential *credentials,
948 [in,out,ref] uint32 *negotiate_flags,
949 [out,ref] uint32 *rid
955 WERROR netr_DsRGetDCNameEx(
956 [in] [string,charset(UTF16)] uint16 *server_unc,
957 [in] [string,charset(UTF16)] uint16 *domain_name,
958 [in] GUID *domain_guid,
959 [in] [string,charset(UTF16)] uint16 *site_name,
961 [out] netr_DsRGetDCNameInfo *info
966 WERROR netr_DsRGetSiteName(
967 [in] [string,charset(UTF16)] uint16 *computer_name,
968 [out] [string,charset(UTF16)] uint16 *site
976 [size_is(length)] uint8 *data;
979 typedef [flag(NDR_PAHEX)] struct {
982 [size_is(size/2),length_is(length/2)] uint16 *data;
987 [string,charset(UTF16)] uint16 *workstation_domain;
988 [string,charset(UTF16)] uint16 *workstation_site;
989 [string,charset(UTF16)] uint16 *unknown1;
990 [string,charset(UTF16)] uint16 *unknown2;
991 [string,charset(UTF16)] uint16 *unknown3;
992 [string,charset(UTF16)] uint16 *unknown4;
993 netr_BinaryString blob2;
1001 [case(1)] netr_DomainQuery1 *query1;
1002 [case(2)] netr_DomainQuery1 *query1;
1006 lsa_String domainname;
1007 lsa_String fulldomainname;
1011 netr_BinaryString unknown1[4];
1013 } netr_DomainTrustInfo;
1016 netr_DomainTrustInfo domaininfo;
1018 [size_is(num_trusts)] netr_DomainTrustInfo *trusts;
1019 uint32 unknown[14]; /* room for expansion? */
1023 [case(1)] netr_DomainInfo1 *info1;
1024 [case(2)] netr_DomainInfo1 *info1;
1027 NTSTATUS netr_LogonGetDomainInfo(
1028 [in] [string,charset(UTF16)] uint16 server_name[],
1029 [in] [string,charset(UTF16)] uint16 *computer_name,
1030 [in,ref] netr_Authenticator *credential,
1031 [in,out,ref] netr_Authenticator *return_authenticator,
1033 [in,switch_is(level)] netr_DomainQuery query,
1034 [out,switch_is(level)] netr_DomainInfo info
1037 typedef [flag(NDR_PAHEX)] struct {
1040 } netr_CryptPassword;
1044 NTSTATUS netr_ServerPasswordSet2(
1045 [in] [string,charset(UTF16)] uint16 *server_name,
1046 [in] [string,charset(UTF16)] uint16 account_name[],
1047 [in] netr_SchannelType secure_channel_type,
1048 [in] [string,charset(UTF16)] uint16 computer_name[],
1049 [in] netr_Authenticator credential,
1050 [in] netr_CryptPassword new_password,
1051 [out] netr_Authenticator return_authenticator
1056 WERROR netr_NETRSERVERPASSWORDGET();
1060 WERROR netr_NETRLOGONSENDTOSAM();
1064 WERROR netr_DSRADDRESSTOSITENAMESW();
1068 WERROR netr_DsRGetDCNameEx2(
1069 [in] [string,charset(UTF16)] uint16 *server_unc,
1070 [in] [string,charset(UTF16)] uint16 *client_account,
1072 [in] [string,charset(UTF16)] uint16 *domain_name,
1073 [in] GUID *domain_guid,
1074 [in] [string,charset(UTF16)] uint16 *site_name,
1076 [out] netr_DsRGetDCNameInfo *info
1081 WERROR netr_NETRLOGONGETTIMESERVICEPARENTDOMAIN();
1085 WERROR netr_NETRENUMERATETRUSTEDDOMAINSEX();
1089 WERROR netr_DSRADDRESSTOSITENAMESEXW();
1093 WERROR netr_DSRGETDCSITECOVERAGEW();
1097 NTSTATUS netr_LogonSamLogonEx(
1098 [in] [string,charset(UTF16)] uint16 *server_name,
1099 [in] [string,charset(UTF16)] uint16 *workstation,
1100 [in] uint16 logon_level,
1101 [in] [switch_is(logon_level)] netr_LogonLevel logon,
1102 [in] uint16 validation_level,
1103 [out] [switch_is(validation_level)] netr_Validation validation,
1104 [out] uint8 authoritative,
1105 [in,out] uint32 flags
1111 typedef [bitmap32bit] bitmap {
1112 NETR_TRUST_FLAG_IN_FOREST = 0x00000001,
1113 NETR_TRUST_FLAG_OUTBOUND = 0x00000002,
1114 NETR_TRUST_FLAG_TREEROOT = 0x00000004,
1115 NETR_TRUST_FLAG_PRIMARY = 0x00000008,
1116 NETR_TRUST_FLAG_NATIVE = 0x00000010,
1117 NETR_TRUST_FLAG_INBOUND = 0x00000020
1120 typedef [v1_enum] enum {
1121 NETR_TRUST_TYPE_DOWNLEVEL = 1,
1122 NETR_TRUST_TYPE_UPLEVEL = 2,
1123 NETR_TRUST_TYPE_MIT = 3,
1124 NETR_TRUST_TYPE_DCE = 4
1127 typedef [bitmap32bit] bitmap {
1128 NETR_TRUST_ATTRIBUTE_NON_TRANSITIVE = 0x00000001,
1129 NETR_TRUST_ATTRIBUTE_UPLEVEL_ONLY = 0x00000002,
1130 NETR_TRUST_ATTRIBUTE_QUARANTINED_DOMAIN = 0x00000004,
1131 NETR_TRUST_ATTRIBUTE_FOREST_TRANSITIVE = 0x00000008,
1132 NETR_TRUST_ATTRIBUTE_CROSS_ORGANIZATION = 0x00000010,
1133 NETR_TRUST_ATTRIBUTE_WITHIN_FOREST = 0x00000020,
1134 NETR_TRUST_ATTRIBUTE_TREAT_AS_EXTERNAL = 0x00000040
1135 } netr_TrustAttributes;
1138 [string,charset(UTF16)] uint16 *netbios_name;
1139 [string,charset(UTF16)] uint16 *dns_name;
1140 netr_TrustFlags trust_flags;
1141 uint32 parent_index;
1142 netr_TrustType trust_type;
1143 netr_TrustAttributes trust_attributes;
1148 WERROR netr_DsrEnumerateDomainTrusts(
1149 [in] [string,charset(UTF16)] uint16 *server_name,
1150 [in] netr_TrustFlags trust_flags,
1152 [out,size_is(count)] netr_DomainTrust *trusts
1158 WERROR netr_DSRDEREGISTERDNSHOSTRECORDS();
1162 WERROR netr_NETRSERVERTRUSTPASSWORDSGET();
1166 WERROR netr_DSRGETFORESTTRUSTINFORMATION();
1170 WERROR netr_NETRGETFORESTTRUSTINFORMATION();
1175 /* this is the ADS varient. I don't yet know what the "flags" are for */
1176 NTSTATUS netr_LogonSamLogonWithFlags(
1177 [in] [string,charset(UTF16)] uint16 *server_name,
1178 [in] [string,charset(UTF16)] uint16 *workstation,
1179 [in] netr_Authenticator *credential,
1180 [in][out] netr_Authenticator *return_authenticator,
1181 [in] uint16 logon_level,
1182 [in] [switch_is(logon_level)] netr_LogonLevel logon,
1183 [in] uint16 validation_level,
1184 [out] [switch_is(validation_level)] netr_Validation validation,
1185 [out] uint8 authoritative,
1186 [in,out] uint32 flags
1191 WERROR netr_NETRSERVERGETTRUSTINFO();