enum SID_NAME_USE
{
+ SID_NAME_USE_NONE = 0,/* NOTUSED */
SID_NAME_USER = 1, /* user */
SID_NAME_DOM_GRP = 2, /* domain group */
SID_NAME_DOMAIN = 3, /* domain: don't know what this is */
#define LSA_LOOKUPSIDS 0x0f
#define LSA_OPENPOLICY 0x06
#define LSA_OPENPOLICY2 0x2c
-#define LSA_OPENSECRET 0x1c
-#define LSA_QUERYSECRET 0x1e
+#define LSA_OPENSECRET 0x1C
-#define LSA_MAX_GROUPS 32
-#define LSA_MAX_SIDS 32
+/* XXXX these are here to get a compile! */
+#define LSA_LOOKUPRIDS 0xFD
+
+#define LSA_MAX_GROUPS 96
+#define LSA_MAX_SIDS 128
/* DOM_QUERY - info class 3 and 5 LSA Query response */
typedef struct dom_query_info
typedef DOM_QUERY DOM_QUERY_3;
typedef DOM_QUERY DOM_QUERY_5;
+/* level 2 is auditing settings */
+typedef struct dom_query_2
+{
+ uint32 auditing_enabled;
+ uint32 count1; /* usualy 7, at least on nt4sp4 */
+ uint32 count2; /* the same */
+ uint32 *auditsettings;
+} DOM_QUERY_2;
+
+/* level 6 is server role information */
+typedef struct dom_query_6
+{
+ uint16 server_role; /* 2=backup, 3=primary */
+} DOM_QUERY_6;
+
typedef struct seq_qos_info
{
uint32 len; /* 12 */
typedef struct lsa_q_open_pol_info
{
uint32 ptr; /* undocumented buffer pointer */
- uint16 system_name; /* system name BUG!!! (should be \\server!) */
+ uint16 system_name; /* 0x5c - system name */
LSA_OBJ_ATTR attr ; /* object attributes */
uint32 des_access; /* desired access attributes */
} LSA_R_OPEN_POL2;
-/* LSA_Q_QUERY_INFO - LSA query info policy */
-typedef struct lsa_query_info
+/* LSA_Q_QUERY_SEC_OBJ - LSA query security */
+typedef struct lsa_query_sec_obj_info
{
POLICY_HND pol; /* policy handle */
- uint16 info_class; /* info class */
-
-} LSA_Q_QUERY_INFO;
-
-/* LSA_R_QUERY_INFO - response to LSA query info policy */
-typedef struct lsa_r_query_info
-{
- uint32 undoc_buffer; /* undocumented buffer pointer */
- uint16 info_class; /* info class (same as info class in request) */
-
- union
- {
- DOM_QUERY_3 id3;
- DOM_QUERY_5 id5;
-
- } dom;
+ uint32 sec_info;
- uint32 status; /* return code */
-
-} LSA_R_QUERY_INFO;
+} LSA_Q_QUERY_SEC_OBJ;
-/* LSA_Q_OPEN_SECRET - LSA Open Secret */
-typedef struct lsa_q_open_secret_info
+/* LSA_R_QUERY_SEC_OBJ - probably an open */
+typedef struct r_lsa_query_sec_obj_info
{
- POLICY_HND pol;
- UNIHDR hdr_secret;
- UNISTR2 uni_secret;
-
- uint32 des_access; /* desired access attributes */
+ uint32 ptr;
+ SEC_DESC_BUF *buf;
-} LSA_Q_OPEN_SECRET;
+ uint32 status; /* return status */
-/* LSA_R_OPEN_SECRET - response to LSA Open Secret */
-typedef struct lsa_r_open_secret_info
-{
- POLICY_HND pol;
- uint32 status;
+} LSA_R_QUERY_SEC_OBJ;
-} LSA_R_OPEN_SECRET;
-
-typedef struct lsa_secret_value_info
-{
- uint32 ptr_secret;
- STRHDR2 hdr_secret;
- STRING2 enc_secret; /* encrypted, see nt_encrypt_string2 */
-
-} LSA_SECRET_VALUE;
-
-typedef struct lsa_secret_info_info
+/* LSA_Q_QUERY_INFO - LSA query info policy */
+typedef struct lsa_query_info
{
- uint32 ptr_value;
- LSA_SECRET_VALUE value;
-
- uint32 ptr_update;
- NTTIME last_update; /* N.B. 64-bit alignment? */
+ POLICY_HND pol; /* policy handle */
+ uint16 info_class; /* info class */
-} LSA_SECRET_INFO;
+} LSA_Q_QUERY_INFO;
-/* LSA_Q_QUERY_SECRET - LSA Query Secret */
-typedef struct lsa_q_query_secret_info
+/* LSA_INFO_UNION */
+typedef union lsa_info_union
{
- POLICY_HND pol;
-
- LSA_SECRET_INFO info; /* [in, out] */
- LSA_SECRET_INFO oldinfo;
+ DOM_QUERY_2 id2;
+ DOM_QUERY_3 id3;
+ DOM_QUERY_5 id5;
+ DOM_QUERY_6 id6;
+} LSA_INFO_UNION;
-} LSA_Q_QUERY_SECRET;
-
-/* LSA_R_QUERY_SECRET - response to LSA Query Secret */
-typedef struct lsa_r_query_secret_info
+/* LSA_R_QUERY_INFO - response to LSA query info policy */
+typedef struct lsa_r_query_info
{
- LSA_SECRET_INFO info;
- LSA_SECRET_INFO oldinfo;
+ uint32 undoc_buffer; /* undocumented buffer pointer */
+ uint16 info_class; /* info class (same as info class in request) */
+
+ LSA_INFO_UNION dom;
- uint32 status;
+ uint32 status; /* return code */
-} LSA_R_QUERY_SECRET;
+} LSA_R_QUERY_INFO;
/* LSA_Q_ENUM_TRUST_DOM - LSA enumerate trusted domains */
typedef struct lsa_enum_trust_dom_info
{
POLICY_HND pol; /* policy handle */
- uint32 enum_context; /* enumeration context handle */
- uint32 preferred_len; /* preferred maximum length */
+ uint32 enum_context; /* enumeration context handle */
+ uint32 preferred_len; /* preferred maximum length */
} LSA_Q_ENUM_TRUST_DOM;
-#define MAX_TRUSTED_DOMS 10
-
/* LSA_R_ENUM_TRUST_DOM - response to LSA enumerate trusted domains */
typedef struct lsa_r_enum_trust_dom_info
{
/* this lot is only added if ptr_enum_domains is non-NULL */
uint32 num_domains2; /* number of domains */
- UNIHDR2 hdr_domain_name[MAX_TRUSTED_DOMS];
- UNISTR2 uni_domain_name[MAX_TRUSTED_DOMS];
- DOM_SID2 domain_sid[MAX_TRUSTED_DOMS];
+ UNIHDR2 *hdr_domain_name;
+ UNISTR2 *uni_domain_name;
+ DOM_SID2 *domain_sid;
uint32 status; /* return code */
} LSA_R_CLOSE;
-#define MAX_REF_DOMAINS 10
+#define MAX_REF_DOMAINS 32
/* DOM_TRUST_HDR */
typedef struct dom_trust_hdr
/* DOM_R_REF */
typedef struct dom_ref_info
{
- uint32 num_ref_doms_1; /* num referenced domains */
- uint32 ptr_ref_dom; /* pointer to referenced domains */
- uint32 max_entries; /* 32 - max number of entries */
- uint32 num_ref_doms_2; /* num referenced domains */
+ uint32 num_ref_doms_1; /* num referenced domains */
+ uint32 ptr_ref_dom; /* pointer to referenced domains */
+ uint32 max_entries; /* 32 - max number of entries */
+ uint32 num_ref_doms_2; /* num referenced domains */
- DOM_TRUST_HDR hdr_ref_dom[MAX_REF_DOMAINS]; /* referenced domains */
- DOM_TRUST_INFO ref_dom [MAX_REF_DOMAINS]; /* referenced domains */
+ DOM_TRUST_HDR hdr_ref_dom[MAX_REF_DOMAINS]; /* referenced domains */
+ DOM_TRUST_INFO ref_dom [MAX_REF_DOMAINS]; /* referenced domains */
} DOM_R_REF;
/* LSA_TRANS_NAME - translated name */
typedef struct lsa_trans_name_info
{
- uint32 sid_name_use; /* value is 5 for a well-known group; 2 for a domain group; 1 for a user... */
+ uint16 sid_name_use; /* value is 5 for a well-known group; 2 for a domain group; 1 for a user... */
UNIHDR hdr_name;
uint32 domain_idx; /* index into DOM_R_REF array of SIDs */
uint32 ptr_trans_names;
uint32 num_entries2;
- LSA_TRANS_NAME name [MAX_LOOKUP_SIDS]; /* translated names */
- UNISTR2 uni_name[MAX_LOOKUP_SIDS];
+ LSA_TRANS_NAME *name; /* translated names */
+ UNISTR2 *uni_name;
} LSA_TRANS_NAME_ENUM;
uint32 ptr_sid_enum;
uint32 num_entries2;
- uint32 ptr_sid[MAX_LOOKUP_SIDS]; /* domain SID pointers to be looked up. */
- DOM_SID2 sid [MAX_LOOKUP_SIDS]; /* domain SIDs to be looked up. */
+ uint32 *ptr_sid; /* domain SID pointers to be looked up. */
+ DOM_SID2 *sid; /* domain SIDs to be looked up. */
} LSA_SID_ENUM;
} LSA_R_LOOKUP_SIDS;
-
/* LSA_Q_LOOKUP_NAMES - LSA Lookup NAMEs */
typedef struct lsa_q_lookup_names
{
- POLICY_HND pol; /* policy handle */
- uint32 num_entries;
- uint32 num_entries2;
- UNIHDR hdr_name[MAX_LOOKUP_SIDS]; /* name buffer pointers */
- UNISTR2 uni_name[MAX_LOOKUP_SIDS]; /* names to be looked up */
+ POLICY_HND pol; /* policy handle */
+ uint32 num_entries;
+ uint32 num_entries2;
+ UNIHDR *hdr_name; /* name buffer pointers */
+ UNISTR2 *uni_name; /* names to be looked up */
- uint32 num_trans_entries;
- uint32 ptr_trans_sids; /* undocumented domain SID buffer pointer */
- uint32 lookup_level;
- uint32 mapped_count;
+ uint32 num_trans_entries;
+ uint32 ptr_trans_sids; /* undocumented domain SID buffer pointer */
+ uint32 lookup_level;
+ uint32 mapped_count;
} LSA_Q_LOOKUP_NAMES;
uint32 num_entries;
uint32 ptr_entries;
- uint32 num_entries2;
+ uint32 num_entries2;
DOM_RID2 *dom_rid; /* domain RIDs being looked up */
- uint32 mapped_count;
+ uint32 mapped_count;
uint32 status; /* return code */
} LSA_R_LOOKUP_NAMES;
+/* This is probably a policy handle but at the moment we
+ never read it - so use a dummy struct. */
-#endif /* _RPC_LSA_H */
+typedef struct lsa_q_open_secret
+{
+ uint32 dummy;
+} LSA_Q_OPEN_SECRET;
+
+/* We always return "not found" at present - so just marshal the minimum. */
+typedef struct lsa_r_open_secret
+{
+ uint32 dummy1;
+ uint32 dummy2;
+ uint32 dummy3;
+ uint32 dummy4;
+ uint32 status;
+} LSA_R_OPEN_SECRET;
+
+#endif /* _RPC_LSA_H */