2 * Unix SMB/CIFS implementation.
3 * client auto-generated by pidl. DO NOT MODIFY!
7 #include "librpc/gen_ndr/cli_lsa.h"
9 NTSTATUS rpccli_lsa_Close(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle)
18 NDR_PRINT_IN_DEBUG(lsa_Close, &r);
20 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_CLOSE, &r);
22 if (!NT_STATUS_IS_OK(status)) {
27 NDR_PRINT_OUT_DEBUG(lsa_Close, &r);
29 if (NT_STATUS_IS_ERR(status)) {
33 /* Return variables */
34 *handle = *r.out.handle;
40 NTSTATUS rpccli_lsa_Delete(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle)
49 NDR_PRINT_IN_DEBUG(lsa_Delete, &r);
51 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_DELETE, &r);
53 if (!NT_STATUS_IS_OK(status)) {
58 NDR_PRINT_OUT_DEBUG(lsa_Delete, &r);
60 if (NT_STATUS_IS_ERR(status)) {
64 /* Return variables */
70 NTSTATUS rpccli_lsa_EnumPrivs(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, uint32_t *resume_handle, uint32_t max_count, struct lsa_PrivArray *privs)
72 struct lsa_EnumPrivs r;
77 r.in.resume_handle = resume_handle;
78 r.in.max_count = max_count;
81 NDR_PRINT_IN_DEBUG(lsa_EnumPrivs, &r);
83 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_ENUMPRIVS, &r);
85 if (!NT_STATUS_IS_OK(status)) {
90 NDR_PRINT_OUT_DEBUG(lsa_EnumPrivs, &r);
92 if (NT_STATUS_IS_ERR(status)) {
96 /* Return variables */
97 *resume_handle = *r.out.resume_handle;
98 *privs = *r.out.privs;
104 NTSTATUS rpccli_lsa_QuerySecurity(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, uint32_t sec_info, struct sec_desc_buf *sdbuf)
106 struct lsa_QuerySecurity r;
110 r.in.handle = handle;
111 r.in.sec_info = sec_info;
113 if (DEBUGLEVEL >= 10)
114 NDR_PRINT_IN_DEBUG(lsa_QuerySecurity, &r);
116 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_QUERYSECURITY, &r);
118 if (!NT_STATUS_IS_OK(status)) {
122 if (DEBUGLEVEL >= 10)
123 NDR_PRINT_OUT_DEBUG(lsa_QuerySecurity, &r);
125 if (NT_STATUS_IS_ERR(status)) {
129 /* Return variables */
131 *sdbuf = *r.out.sdbuf;
138 NTSTATUS rpccli_lsa_SetSecObj(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
140 struct lsa_SetSecObj r;
145 if (DEBUGLEVEL >= 10)
146 NDR_PRINT_IN_DEBUG(lsa_SetSecObj, &r);
148 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_SETSECOBJ, &r);
150 if (!NT_STATUS_IS_OK(status)) {
154 if (DEBUGLEVEL >= 10)
155 NDR_PRINT_OUT_DEBUG(lsa_SetSecObj, &r);
157 if (NT_STATUS_IS_ERR(status)) {
161 /* Return variables */
167 NTSTATUS rpccli_lsa_ChangePassword(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
169 struct lsa_ChangePassword r;
174 if (DEBUGLEVEL >= 10)
175 NDR_PRINT_IN_DEBUG(lsa_ChangePassword, &r);
177 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_CHANGEPASSWORD, &r);
179 if (!NT_STATUS_IS_OK(status)) {
183 if (DEBUGLEVEL >= 10)
184 NDR_PRINT_OUT_DEBUG(lsa_ChangePassword, &r);
186 if (NT_STATUS_IS_ERR(status)) {
190 /* Return variables */
196 NTSTATUS rpccli_lsa_OpenPolicy(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, uint16_t *system_name, struct lsa_ObjectAttribute *attr, uint32_t access_mask, struct policy_handle *handle)
198 struct lsa_OpenPolicy r;
202 r.in.system_name = system_name;
204 r.in.access_mask = access_mask;
206 if (DEBUGLEVEL >= 10)
207 NDR_PRINT_IN_DEBUG(lsa_OpenPolicy, &r);
209 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_OPENPOLICY, &r);
211 if (!NT_STATUS_IS_OK(status)) {
215 if (DEBUGLEVEL >= 10)
216 NDR_PRINT_OUT_DEBUG(lsa_OpenPolicy, &r);
218 if (NT_STATUS_IS_ERR(status)) {
222 /* Return variables */
223 *handle = *r.out.handle;
229 NTSTATUS rpccli_lsa_QueryInfoPolicy(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, uint16_t level, union lsa_PolicyInformation *info)
231 struct lsa_QueryInfoPolicy r;
235 r.in.handle = handle;
238 if (DEBUGLEVEL >= 10)
239 NDR_PRINT_IN_DEBUG(lsa_QueryInfoPolicy, &r);
241 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_QUERYINFOPOLICY, &r);
243 if (!NT_STATUS_IS_OK(status)) {
247 if (DEBUGLEVEL >= 10)
248 NDR_PRINT_OUT_DEBUG(lsa_QueryInfoPolicy, &r);
250 if (NT_STATUS_IS_ERR(status)) {
254 /* Return variables */
263 NTSTATUS rpccli_lsa_SetInfoPolicy(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
265 struct lsa_SetInfoPolicy r;
270 if (DEBUGLEVEL >= 10)
271 NDR_PRINT_IN_DEBUG(lsa_SetInfoPolicy, &r);
273 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_SETINFOPOLICY, &r);
275 if (!NT_STATUS_IS_OK(status)) {
279 if (DEBUGLEVEL >= 10)
280 NDR_PRINT_OUT_DEBUG(lsa_SetInfoPolicy, &r);
282 if (NT_STATUS_IS_ERR(status)) {
286 /* Return variables */
292 NTSTATUS rpccli_lsa_ClearAuditLog(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
294 struct lsa_ClearAuditLog r;
299 if (DEBUGLEVEL >= 10)
300 NDR_PRINT_IN_DEBUG(lsa_ClearAuditLog, &r);
302 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_CLEARAUDITLOG, &r);
304 if (!NT_STATUS_IS_OK(status)) {
308 if (DEBUGLEVEL >= 10)
309 NDR_PRINT_OUT_DEBUG(lsa_ClearAuditLog, &r);
311 if (NT_STATUS_IS_ERR(status)) {
315 /* Return variables */
321 NTSTATUS rpccli_lsa_CreateAccount(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct dom_sid2 *sid, uint32_t access_mask, struct policy_handle *acct_handle)
323 struct lsa_CreateAccount r;
327 r.in.handle = handle;
329 r.in.access_mask = access_mask;
331 if (DEBUGLEVEL >= 10)
332 NDR_PRINT_IN_DEBUG(lsa_CreateAccount, &r);
334 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_CREATEACCOUNT, &r);
336 if (!NT_STATUS_IS_OK(status)) {
340 if (DEBUGLEVEL >= 10)
341 NDR_PRINT_OUT_DEBUG(lsa_CreateAccount, &r);
343 if (NT_STATUS_IS_ERR(status)) {
347 /* Return variables */
348 *acct_handle = *r.out.acct_handle;
354 NTSTATUS rpccli_lsa_EnumAccounts(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, uint32_t *resume_handle, uint32_t num_entries, struct lsa_SidArray *sids)
356 struct lsa_EnumAccounts r;
360 r.in.handle = handle;
361 r.in.resume_handle = resume_handle;
362 r.in.num_entries = num_entries;
364 if (DEBUGLEVEL >= 10)
365 NDR_PRINT_IN_DEBUG(lsa_EnumAccounts, &r);
367 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_ENUMACCOUNTS, &r);
369 if (!NT_STATUS_IS_OK(status)) {
373 if (DEBUGLEVEL >= 10)
374 NDR_PRINT_OUT_DEBUG(lsa_EnumAccounts, &r);
376 if (NT_STATUS_IS_ERR(status)) {
380 /* Return variables */
381 *resume_handle = *r.out.resume_handle;
388 NTSTATUS rpccli_lsa_CreateTrustedDomain(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct lsa_DomainInfo *info, uint32_t access_mask, struct policy_handle *trustdom_handle)
390 struct lsa_CreateTrustedDomain r;
394 r.in.handle = handle;
396 r.in.access_mask = access_mask;
398 if (DEBUGLEVEL >= 10)
399 NDR_PRINT_IN_DEBUG(lsa_CreateTrustedDomain, &r);
401 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_CREATETRUSTEDDOMAIN, &r);
403 if (!NT_STATUS_IS_OK(status)) {
407 if (DEBUGLEVEL >= 10)
408 NDR_PRINT_OUT_DEBUG(lsa_CreateTrustedDomain, &r);
410 if (NT_STATUS_IS_ERR(status)) {
414 /* Return variables */
415 *trustdom_handle = *r.out.trustdom_handle;
421 NTSTATUS rpccli_lsa_EnumTrustDom(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, uint32_t *resume_handle, uint32_t max_size, struct lsa_DomainList *domains)
423 struct lsa_EnumTrustDom r;
427 r.in.handle = handle;
428 r.in.resume_handle = resume_handle;
429 r.in.max_size = max_size;
431 if (DEBUGLEVEL >= 10)
432 NDR_PRINT_IN_DEBUG(lsa_EnumTrustDom, &r);
434 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_ENUMTRUSTDOM, &r);
436 if (!NT_STATUS_IS_OK(status)) {
440 if (DEBUGLEVEL >= 10)
441 NDR_PRINT_OUT_DEBUG(lsa_EnumTrustDom, &r);
443 if (NT_STATUS_IS_ERR(status)) {
447 /* Return variables */
448 *resume_handle = *r.out.resume_handle;
449 *domains = *r.out.domains;
455 NTSTATUS rpccli_lsa_LookupNames(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, uint32_t num_names, struct lsa_String *names, struct lsa_RefDomainList *domains, struct lsa_TransSidArray *sids, uint16_t level, uint32_t *count)
457 struct lsa_LookupNames r;
461 r.in.handle = handle;
462 r.in.num_names = num_names;
468 if (DEBUGLEVEL >= 10)
469 NDR_PRINT_IN_DEBUG(lsa_LookupNames, &r);
471 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_LOOKUPNAMES, &r);
473 if (!NT_STATUS_IS_OK(status)) {
477 if (DEBUGLEVEL >= 10)
478 NDR_PRINT_OUT_DEBUG(lsa_LookupNames, &r);
480 if (NT_STATUS_IS_ERR(status)) {
484 /* Return variables */
486 *domains = *r.out.domains;
489 *count = *r.out.count;
495 NTSTATUS rpccli_lsa_LookupSids(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct lsa_SidArray *sids, struct lsa_RefDomainList *domains, struct lsa_TransNameArray *names, uint16_t level, uint32_t *count)
497 struct lsa_LookupSids r;
501 r.in.handle = handle;
507 if (DEBUGLEVEL >= 10)
508 NDR_PRINT_IN_DEBUG(lsa_LookupSids, &r);
510 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_LOOKUPSIDS, &r);
512 if (!NT_STATUS_IS_OK(status)) {
516 if (DEBUGLEVEL >= 10)
517 NDR_PRINT_OUT_DEBUG(lsa_LookupSids, &r);
519 if (NT_STATUS_IS_ERR(status)) {
523 /* Return variables */
525 *domains = *r.out.domains;
527 *names = *r.out.names;
528 *count = *r.out.count;
534 NTSTATUS rpccli_lsa_CreateSecret(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct lsa_String name, uint32_t access_mask, struct policy_handle *sec_handle)
536 struct lsa_CreateSecret r;
540 r.in.handle = handle;
542 r.in.access_mask = access_mask;
544 if (DEBUGLEVEL >= 10)
545 NDR_PRINT_IN_DEBUG(lsa_CreateSecret, &r);
547 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_CREATESECRET, &r);
549 if (!NT_STATUS_IS_OK(status)) {
553 if (DEBUGLEVEL >= 10)
554 NDR_PRINT_OUT_DEBUG(lsa_CreateSecret, &r);
556 if (NT_STATUS_IS_ERR(status)) {
560 /* Return variables */
561 *sec_handle = *r.out.sec_handle;
567 NTSTATUS rpccli_lsa_OpenAccount(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct dom_sid2 *sid, uint32_t access_mask, struct policy_handle *acct_handle)
569 struct lsa_OpenAccount r;
573 r.in.handle = handle;
575 r.in.access_mask = access_mask;
577 if (DEBUGLEVEL >= 10)
578 NDR_PRINT_IN_DEBUG(lsa_OpenAccount, &r);
580 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_OPENACCOUNT, &r);
582 if (!NT_STATUS_IS_OK(status)) {
586 if (DEBUGLEVEL >= 10)
587 NDR_PRINT_OUT_DEBUG(lsa_OpenAccount, &r);
589 if (NT_STATUS_IS_ERR(status)) {
593 /* Return variables */
594 *acct_handle = *r.out.acct_handle;
600 NTSTATUS rpccli_lsa_EnumPrivsAccount(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct lsa_PrivilegeSet *privs)
602 struct lsa_EnumPrivsAccount r;
606 r.in.handle = handle;
608 if (DEBUGLEVEL >= 10)
609 NDR_PRINT_IN_DEBUG(lsa_EnumPrivsAccount, &r);
611 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_ENUMPRIVSACCOUNT, &r);
613 if (!NT_STATUS_IS_OK(status)) {
617 if (DEBUGLEVEL >= 10)
618 NDR_PRINT_OUT_DEBUG(lsa_EnumPrivsAccount, &r);
620 if (NT_STATUS_IS_ERR(status)) {
624 /* Return variables */
626 *privs = *r.out.privs;
633 NTSTATUS rpccli_lsa_AddPrivilegesToAccount(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct lsa_PrivilegeSet *privs)
635 struct lsa_AddPrivilegesToAccount r;
639 r.in.handle = handle;
642 if (DEBUGLEVEL >= 10)
643 NDR_PRINT_IN_DEBUG(lsa_AddPrivilegesToAccount, &r);
645 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_ADDPRIVILEGESTOACCOUNT, &r);
647 if (!NT_STATUS_IS_OK(status)) {
651 if (DEBUGLEVEL >= 10)
652 NDR_PRINT_OUT_DEBUG(lsa_AddPrivilegesToAccount, &r);
654 if (NT_STATUS_IS_ERR(status)) {
658 /* Return variables */
664 NTSTATUS rpccli_lsa_RemovePrivilegesFromAccount(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, uint8_t remove_all, struct lsa_PrivilegeSet *privs)
666 struct lsa_RemovePrivilegesFromAccount r;
670 r.in.handle = handle;
671 r.in.remove_all = remove_all;
674 if (DEBUGLEVEL >= 10)
675 NDR_PRINT_IN_DEBUG(lsa_RemovePrivilegesFromAccount, &r);
677 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_REMOVEPRIVILEGESFROMACCOUNT, &r);
679 if (!NT_STATUS_IS_OK(status)) {
683 if (DEBUGLEVEL >= 10)
684 NDR_PRINT_OUT_DEBUG(lsa_RemovePrivilegesFromAccount, &r);
686 if (NT_STATUS_IS_ERR(status)) {
690 /* Return variables */
696 NTSTATUS rpccli_lsa_GetQuotasForAccount(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
698 struct lsa_GetQuotasForAccount r;
703 if (DEBUGLEVEL >= 10)
704 NDR_PRINT_IN_DEBUG(lsa_GetQuotasForAccount, &r);
706 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_GETQUOTASFORACCOUNT, &r);
708 if (!NT_STATUS_IS_OK(status)) {
712 if (DEBUGLEVEL >= 10)
713 NDR_PRINT_OUT_DEBUG(lsa_GetQuotasForAccount, &r);
715 if (NT_STATUS_IS_ERR(status)) {
719 /* Return variables */
725 NTSTATUS rpccli_lsa_SetQuotasForAccount(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
727 struct lsa_SetQuotasForAccount r;
732 if (DEBUGLEVEL >= 10)
733 NDR_PRINT_IN_DEBUG(lsa_SetQuotasForAccount, &r);
735 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_SETQUOTASFORACCOUNT, &r);
737 if (!NT_STATUS_IS_OK(status)) {
741 if (DEBUGLEVEL >= 10)
742 NDR_PRINT_OUT_DEBUG(lsa_SetQuotasForAccount, &r);
744 if (NT_STATUS_IS_ERR(status)) {
748 /* Return variables */
754 NTSTATUS rpccli_lsa_GetSystemAccessAccount(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
756 struct lsa_GetSystemAccessAccount r;
761 if (DEBUGLEVEL >= 10)
762 NDR_PRINT_IN_DEBUG(lsa_GetSystemAccessAccount, &r);
764 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_GETSYSTEMACCESSACCOUNT, &r);
766 if (!NT_STATUS_IS_OK(status)) {
770 if (DEBUGLEVEL >= 10)
771 NDR_PRINT_OUT_DEBUG(lsa_GetSystemAccessAccount, &r);
773 if (NT_STATUS_IS_ERR(status)) {
777 /* Return variables */
783 NTSTATUS rpccli_lsa_SetSystemAccessAccount(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
785 struct lsa_SetSystemAccessAccount r;
790 if (DEBUGLEVEL >= 10)
791 NDR_PRINT_IN_DEBUG(lsa_SetSystemAccessAccount, &r);
793 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_SETSYSTEMACCESSACCOUNT, &r);
795 if (!NT_STATUS_IS_OK(status)) {
799 if (DEBUGLEVEL >= 10)
800 NDR_PRINT_OUT_DEBUG(lsa_SetSystemAccessAccount, &r);
802 if (NT_STATUS_IS_ERR(status)) {
806 /* Return variables */
812 NTSTATUS rpccli_lsa_OpenTrustedDomain(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct dom_sid2 *sid, uint32_t access_mask, struct policy_handle *trustdom_handle)
814 struct lsa_OpenTrustedDomain r;
818 r.in.handle = handle;
820 r.in.access_mask = access_mask;
822 if (DEBUGLEVEL >= 10)
823 NDR_PRINT_IN_DEBUG(lsa_OpenTrustedDomain, &r);
825 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_OPENTRUSTEDDOMAIN, &r);
827 if (!NT_STATUS_IS_OK(status)) {
831 if (DEBUGLEVEL >= 10)
832 NDR_PRINT_OUT_DEBUG(lsa_OpenTrustedDomain, &r);
834 if (NT_STATUS_IS_ERR(status)) {
838 /* Return variables */
839 *trustdom_handle = *r.out.trustdom_handle;
845 NTSTATUS rpccli_lsa_QueryTrustedDomainInfo(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *trustdom_handle, enum lsa_TrustDomInfoEnum level, union lsa_TrustedDomainInfo *info)
847 struct lsa_QueryTrustedDomainInfo r;
851 r.in.trustdom_handle = trustdom_handle;
854 if (DEBUGLEVEL >= 10)
855 NDR_PRINT_IN_DEBUG(lsa_QueryTrustedDomainInfo, &r);
857 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_QUERYTRUSTEDDOMAININFO, &r);
859 if (!NT_STATUS_IS_OK(status)) {
863 if (DEBUGLEVEL >= 10)
864 NDR_PRINT_OUT_DEBUG(lsa_QueryTrustedDomainInfo, &r);
866 if (NT_STATUS_IS_ERR(status)) {
870 /* Return variables */
879 NTSTATUS rpccli_lsa_SetInformationTrustedDomain(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
881 struct lsa_SetInformationTrustedDomain r;
886 if (DEBUGLEVEL >= 10)
887 NDR_PRINT_IN_DEBUG(lsa_SetInformationTrustedDomain, &r);
889 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_SETINFORMATIONTRUSTEDDOMAIN, &r);
891 if (!NT_STATUS_IS_OK(status)) {
895 if (DEBUGLEVEL >= 10)
896 NDR_PRINT_OUT_DEBUG(lsa_SetInformationTrustedDomain, &r);
898 if (NT_STATUS_IS_ERR(status)) {
902 /* Return variables */
908 NTSTATUS rpccli_lsa_OpenSecret(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct lsa_String name, uint32_t access_mask, struct policy_handle *sec_handle)
910 struct lsa_OpenSecret r;
914 r.in.handle = handle;
916 r.in.access_mask = access_mask;
918 if (DEBUGLEVEL >= 10)
919 NDR_PRINT_IN_DEBUG(lsa_OpenSecret, &r);
921 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_OPENSECRET, &r);
923 if (!NT_STATUS_IS_OK(status)) {
927 if (DEBUGLEVEL >= 10)
928 NDR_PRINT_OUT_DEBUG(lsa_OpenSecret, &r);
930 if (NT_STATUS_IS_ERR(status)) {
934 /* Return variables */
935 *sec_handle = *r.out.sec_handle;
941 NTSTATUS rpccli_lsa_SetSecret(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *sec_handle, struct lsa_DATA_BUF *new_val, struct lsa_DATA_BUF *old_val)
943 struct lsa_SetSecret r;
947 r.in.sec_handle = sec_handle;
948 r.in.new_val = new_val;
949 r.in.old_val = old_val;
951 if (DEBUGLEVEL >= 10)
952 NDR_PRINT_IN_DEBUG(lsa_SetSecret, &r);
954 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_SETSECRET, &r);
956 if (!NT_STATUS_IS_OK(status)) {
960 if (DEBUGLEVEL >= 10)
961 NDR_PRINT_OUT_DEBUG(lsa_SetSecret, &r);
963 if (NT_STATUS_IS_ERR(status)) {
967 /* Return variables */
973 NTSTATUS rpccli_lsa_QuerySecret(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *sec_handle, struct lsa_DATA_BUF_PTR *new_val, NTTIME *new_mtime, struct lsa_DATA_BUF_PTR *old_val, NTTIME *old_mtime)
975 struct lsa_QuerySecret r;
979 r.in.sec_handle = sec_handle;
980 r.in.new_val = new_val;
981 r.in.new_mtime = new_mtime;
982 r.in.old_val = old_val;
983 r.in.old_mtime = old_mtime;
985 if (DEBUGLEVEL >= 10)
986 NDR_PRINT_IN_DEBUG(lsa_QuerySecret, &r);
988 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_QUERYSECRET, &r);
990 if (!NT_STATUS_IS_OK(status)) {
994 if (DEBUGLEVEL >= 10)
995 NDR_PRINT_OUT_DEBUG(lsa_QuerySecret, &r);
997 if (NT_STATUS_IS_ERR(status)) {
1001 /* Return variables */
1003 *new_val = *r.out.new_val;
1006 *new_mtime = *r.out.new_mtime;
1009 *old_val = *r.out.old_val;
1012 *old_mtime = *r.out.old_mtime;
1016 return r.out.result;
1019 NTSTATUS rpccli_lsa_LookupPrivValue(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct lsa_String *name, struct lsa_LUID *luid)
1021 struct lsa_LookupPrivValue r;
1025 r.in.handle = handle;
1028 if (DEBUGLEVEL >= 10)
1029 NDR_PRINT_IN_DEBUG(lsa_LookupPrivValue, &r);
1031 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_LOOKUPPRIVVALUE, &r);
1033 if (!NT_STATUS_IS_OK(status)) {
1037 if (DEBUGLEVEL >= 10)
1038 NDR_PRINT_OUT_DEBUG(lsa_LookupPrivValue, &r);
1040 if (NT_STATUS_IS_ERR(status)) {
1044 /* Return variables */
1045 *luid = *r.out.luid;
1048 return r.out.result;
1051 NTSTATUS rpccli_lsa_LookupPrivName(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct lsa_LUID *luid, struct lsa_StringLarge *name)
1053 struct lsa_LookupPrivName r;
1057 r.in.handle = handle;
1060 if (DEBUGLEVEL >= 10)
1061 NDR_PRINT_IN_DEBUG(lsa_LookupPrivName, &r);
1063 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_LOOKUPPRIVNAME, &r);
1065 if (!NT_STATUS_IS_OK(status)) {
1069 if (DEBUGLEVEL >= 10)
1070 NDR_PRINT_OUT_DEBUG(lsa_LookupPrivName, &r);
1072 if (NT_STATUS_IS_ERR(status)) {
1076 /* Return variables */
1078 *name = *r.out.name;
1082 return r.out.result;
1085 NTSTATUS rpccli_lsa_LookupPrivDisplayName(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct lsa_String *name, struct lsa_StringLarge *disp_name, uint16_t *language_id, uint16_t unknown)
1087 struct lsa_LookupPrivDisplayName r;
1091 r.in.handle = handle;
1093 r.in.language_id = language_id;
1094 r.in.unknown = unknown;
1096 if (DEBUGLEVEL >= 10)
1097 NDR_PRINT_IN_DEBUG(lsa_LookupPrivDisplayName, &r);
1099 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_LOOKUPPRIVDISPLAYNAME, &r);
1101 if (!NT_STATUS_IS_OK(status)) {
1105 if (DEBUGLEVEL >= 10)
1106 NDR_PRINT_OUT_DEBUG(lsa_LookupPrivDisplayName, &r);
1108 if (NT_STATUS_IS_ERR(status)) {
1112 /* Return variables */
1114 *disp_name = *r.out.disp_name;
1116 *language_id = *r.out.language_id;
1119 return r.out.result;
1122 NTSTATUS rpccli_lsa_DeleteObject(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
1124 struct lsa_DeleteObject r;
1129 if (DEBUGLEVEL >= 10)
1130 NDR_PRINT_IN_DEBUG(lsa_DeleteObject, &r);
1132 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_DELETEOBJECT, &r);
1134 if (!NT_STATUS_IS_OK(status)) {
1138 if (DEBUGLEVEL >= 10)
1139 NDR_PRINT_OUT_DEBUG(lsa_DeleteObject, &r);
1141 if (NT_STATUS_IS_ERR(status)) {
1145 /* Return variables */
1148 return r.out.result;
1151 NTSTATUS rpccli_lsa_EnumAccountsWithUserRight(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct lsa_String *name, struct lsa_SidArray *sids)
1153 struct lsa_EnumAccountsWithUserRight r;
1157 r.in.handle = handle;
1160 if (DEBUGLEVEL >= 10)
1161 NDR_PRINT_IN_DEBUG(lsa_EnumAccountsWithUserRight, &r);
1163 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_ENUMACCOUNTSWITHUSERRIGHT, &r);
1165 if (!NT_STATUS_IS_OK(status)) {
1169 if (DEBUGLEVEL >= 10)
1170 NDR_PRINT_OUT_DEBUG(lsa_EnumAccountsWithUserRight, &r);
1172 if (NT_STATUS_IS_ERR(status)) {
1176 /* Return variables */
1177 *sids = *r.out.sids;
1180 return r.out.result;
1183 NTSTATUS rpccli_lsa_EnumAccountRights(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct dom_sid2 *sid, struct lsa_RightSet *rights)
1185 struct lsa_EnumAccountRights r;
1189 r.in.handle = handle;
1192 if (DEBUGLEVEL >= 10)
1193 NDR_PRINT_IN_DEBUG(lsa_EnumAccountRights, &r);
1195 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_ENUMACCOUNTRIGHTS, &r);
1197 if (!NT_STATUS_IS_OK(status)) {
1201 if (DEBUGLEVEL >= 10)
1202 NDR_PRINT_OUT_DEBUG(lsa_EnumAccountRights, &r);
1204 if (NT_STATUS_IS_ERR(status)) {
1208 /* Return variables */
1209 *rights = *r.out.rights;
1212 return r.out.result;
1215 NTSTATUS rpccli_lsa_AddAccountRights(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct dom_sid2 *sid, struct lsa_RightSet *rights)
1217 struct lsa_AddAccountRights r;
1221 r.in.handle = handle;
1223 r.in.rights = rights;
1225 if (DEBUGLEVEL >= 10)
1226 NDR_PRINT_IN_DEBUG(lsa_AddAccountRights, &r);
1228 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_ADDACCOUNTRIGHTS, &r);
1230 if (!NT_STATUS_IS_OK(status)) {
1234 if (DEBUGLEVEL >= 10)
1235 NDR_PRINT_OUT_DEBUG(lsa_AddAccountRights, &r);
1237 if (NT_STATUS_IS_ERR(status)) {
1241 /* Return variables */
1244 return r.out.result;
1247 NTSTATUS rpccli_lsa_RemoveAccountRights(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct dom_sid2 *sid, uint32_t unknown, struct lsa_RightSet *rights)
1249 struct lsa_RemoveAccountRights r;
1253 r.in.handle = handle;
1255 r.in.unknown = unknown;
1256 r.in.rights = rights;
1258 if (DEBUGLEVEL >= 10)
1259 NDR_PRINT_IN_DEBUG(lsa_RemoveAccountRights, &r);
1261 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_REMOVEACCOUNTRIGHTS, &r);
1263 if (!NT_STATUS_IS_OK(status)) {
1267 if (DEBUGLEVEL >= 10)
1268 NDR_PRINT_OUT_DEBUG(lsa_RemoveAccountRights, &r);
1270 if (NT_STATUS_IS_ERR(status)) {
1274 /* Return variables */
1277 return r.out.result;
1280 NTSTATUS rpccli_lsa_QueryTrustedDomainInfoBySid(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct dom_sid2 *dom_sid, enum lsa_TrustDomInfoEnum level, union lsa_TrustedDomainInfo *info)
1282 struct lsa_QueryTrustedDomainInfoBySid r;
1286 r.in.handle = handle;
1287 r.in.dom_sid = dom_sid;
1290 if (DEBUGLEVEL >= 10)
1291 NDR_PRINT_IN_DEBUG(lsa_QueryTrustedDomainInfoBySid, &r);
1293 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_QUERYTRUSTEDDOMAININFOBYSID, &r);
1295 if (!NT_STATUS_IS_OK(status)) {
1299 if (DEBUGLEVEL >= 10)
1300 NDR_PRINT_OUT_DEBUG(lsa_QueryTrustedDomainInfoBySid, &r);
1302 if (NT_STATUS_IS_ERR(status)) {
1306 /* Return variables */
1308 *info = *r.out.info;
1312 return r.out.result;
1315 NTSTATUS rpccli_lsa_SetTrustedDomainInfo(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
1317 struct lsa_SetTrustedDomainInfo r;
1322 if (DEBUGLEVEL >= 10)
1323 NDR_PRINT_IN_DEBUG(lsa_SetTrustedDomainInfo, &r);
1325 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_SETTRUSTEDDOMAININFO, &r);
1327 if (!NT_STATUS_IS_OK(status)) {
1331 if (DEBUGLEVEL >= 10)
1332 NDR_PRINT_OUT_DEBUG(lsa_SetTrustedDomainInfo, &r);
1334 if (NT_STATUS_IS_ERR(status)) {
1338 /* Return variables */
1341 return r.out.result;
1344 NTSTATUS rpccli_lsa_DeleteTrustedDomain(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct dom_sid2 *dom_sid)
1346 struct lsa_DeleteTrustedDomain r;
1350 r.in.handle = handle;
1351 r.in.dom_sid = dom_sid;
1353 if (DEBUGLEVEL >= 10)
1354 NDR_PRINT_IN_DEBUG(lsa_DeleteTrustedDomain, &r);
1356 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_DELETETRUSTEDDOMAIN, &r);
1358 if (!NT_STATUS_IS_OK(status)) {
1362 if (DEBUGLEVEL >= 10)
1363 NDR_PRINT_OUT_DEBUG(lsa_DeleteTrustedDomain, &r);
1365 if (NT_STATUS_IS_ERR(status)) {
1369 /* Return variables */
1372 return r.out.result;
1375 NTSTATUS rpccli_lsa_StorePrivateData(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
1377 struct lsa_StorePrivateData r;
1382 if (DEBUGLEVEL >= 10)
1383 NDR_PRINT_IN_DEBUG(lsa_StorePrivateData, &r);
1385 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_STOREPRIVATEDATA, &r);
1387 if (!NT_STATUS_IS_OK(status)) {
1391 if (DEBUGLEVEL >= 10)
1392 NDR_PRINT_OUT_DEBUG(lsa_StorePrivateData, &r);
1394 if (NT_STATUS_IS_ERR(status)) {
1398 /* Return variables */
1401 return r.out.result;
1404 NTSTATUS rpccli_lsa_RetrievePrivateData(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
1406 struct lsa_RetrievePrivateData r;
1411 if (DEBUGLEVEL >= 10)
1412 NDR_PRINT_IN_DEBUG(lsa_RetrievePrivateData, &r);
1414 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_RETRIEVEPRIVATEDATA, &r);
1416 if (!NT_STATUS_IS_OK(status)) {
1420 if (DEBUGLEVEL >= 10)
1421 NDR_PRINT_OUT_DEBUG(lsa_RetrievePrivateData, &r);
1423 if (NT_STATUS_IS_ERR(status)) {
1427 /* Return variables */
1430 return r.out.result;
1433 NTSTATUS rpccli_lsa_OpenPolicy2(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, const char *system_name, struct lsa_ObjectAttribute *attr, uint32_t access_mask, struct policy_handle *handle)
1435 struct lsa_OpenPolicy2 r;
1439 r.in.system_name = system_name;
1441 r.in.access_mask = access_mask;
1443 if (DEBUGLEVEL >= 10)
1444 NDR_PRINT_IN_DEBUG(lsa_OpenPolicy2, &r);
1446 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_OPENPOLICY2, &r);
1448 if (!NT_STATUS_IS_OK(status)) {
1452 if (DEBUGLEVEL >= 10)
1453 NDR_PRINT_OUT_DEBUG(lsa_OpenPolicy2, &r);
1455 if (NT_STATUS_IS_ERR(status)) {
1459 /* Return variables */
1460 *handle = *r.out.handle;
1463 return r.out.result;
1466 NTSTATUS rpccli_lsa_GetUserName(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, const char *system_name, struct lsa_String *account_name, struct lsa_StringPointer *authority_name)
1468 struct lsa_GetUserName r;
1472 r.in.system_name = system_name;
1473 r.in.account_name = account_name;
1474 r.in.authority_name = authority_name;
1476 if (DEBUGLEVEL >= 10)
1477 NDR_PRINT_IN_DEBUG(lsa_GetUserName, &r);
1479 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_GETUSERNAME, &r);
1481 if (!NT_STATUS_IS_OK(status)) {
1485 if (DEBUGLEVEL >= 10)
1486 NDR_PRINT_OUT_DEBUG(lsa_GetUserName, &r);
1488 if (NT_STATUS_IS_ERR(status)) {
1492 /* Return variables */
1493 if ( account_name ) {
1494 *account_name = *r.out.account_name;
1496 if ( authority_name ) {
1497 *authority_name = *r.out.authority_name;
1501 return r.out.result;
1504 NTSTATUS rpccli_lsa_QueryInfoPolicy2(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, uint16_t level, union lsa_PolicyInformation *info)
1506 struct lsa_QueryInfoPolicy2 r;
1510 r.in.handle = handle;
1513 if (DEBUGLEVEL >= 10)
1514 NDR_PRINT_IN_DEBUG(lsa_QueryInfoPolicy2, &r);
1516 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_QUERYINFOPOLICY2, &r);
1518 if (!NT_STATUS_IS_OK(status)) {
1522 if (DEBUGLEVEL >= 10)
1523 NDR_PRINT_OUT_DEBUG(lsa_QueryInfoPolicy2, &r);
1525 if (NT_STATUS_IS_ERR(status)) {
1529 /* Return variables */
1531 *info = *r.out.info;
1535 return r.out.result;
1538 NTSTATUS rpccli_lsa_SetInfoPolicy2(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
1540 struct lsa_SetInfoPolicy2 r;
1545 if (DEBUGLEVEL >= 10)
1546 NDR_PRINT_IN_DEBUG(lsa_SetInfoPolicy2, &r);
1548 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_SETINFOPOLICY2, &r);
1550 if (!NT_STATUS_IS_OK(status)) {
1554 if (DEBUGLEVEL >= 10)
1555 NDR_PRINT_OUT_DEBUG(lsa_SetInfoPolicy2, &r);
1557 if (NT_STATUS_IS_ERR(status)) {
1561 /* Return variables */
1564 return r.out.result;
1567 NTSTATUS rpccli_lsa_QueryTrustedDomainInfoByName(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct lsa_String trusted_domain, enum lsa_TrustDomInfoEnum level, union lsa_TrustedDomainInfo *info)
1569 struct lsa_QueryTrustedDomainInfoByName r;
1573 r.in.handle = handle;
1574 r.in.trusted_domain = trusted_domain;
1577 if (DEBUGLEVEL >= 10)
1578 NDR_PRINT_IN_DEBUG(lsa_QueryTrustedDomainInfoByName, &r);
1580 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_QUERYTRUSTEDDOMAININFOBYNAME, &r);
1582 if (!NT_STATUS_IS_OK(status)) {
1586 if (DEBUGLEVEL >= 10)
1587 NDR_PRINT_OUT_DEBUG(lsa_QueryTrustedDomainInfoByName, &r);
1589 if (NT_STATUS_IS_ERR(status)) {
1593 /* Return variables */
1595 *info = *r.out.info;
1599 return r.out.result;
1602 NTSTATUS rpccli_lsa_SetTrustedDomainInfoByName(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct lsa_String trusted_domain, enum lsa_TrustDomInfoEnum level, union lsa_TrustedDomainInfo *info)
1604 struct lsa_SetTrustedDomainInfoByName r;
1608 r.in.handle = handle;
1609 r.in.trusted_domain = trusted_domain;
1613 if (DEBUGLEVEL >= 10)
1614 NDR_PRINT_IN_DEBUG(lsa_SetTrustedDomainInfoByName, &r);
1616 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_SETTRUSTEDDOMAININFOBYNAME, &r);
1618 if (!NT_STATUS_IS_OK(status)) {
1622 if (DEBUGLEVEL >= 10)
1623 NDR_PRINT_OUT_DEBUG(lsa_SetTrustedDomainInfoByName, &r);
1625 if (NT_STATUS_IS_ERR(status)) {
1629 /* Return variables */
1632 return r.out.result;
1635 NTSTATUS rpccli_lsa_EnumTrustedDomainsEx(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, uint32_t *resume_handle, struct lsa_DomainListEx *domains, uint32_t max_size)
1637 struct lsa_EnumTrustedDomainsEx r;
1641 r.in.handle = handle;
1642 r.in.resume_handle = resume_handle;
1643 r.in.max_size = max_size;
1645 if (DEBUGLEVEL >= 10)
1646 NDR_PRINT_IN_DEBUG(lsa_EnumTrustedDomainsEx, &r);
1648 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_ENUMTRUSTEDDOMAINSEX, &r);
1650 if (!NT_STATUS_IS_OK(status)) {
1654 if (DEBUGLEVEL >= 10)
1655 NDR_PRINT_OUT_DEBUG(lsa_EnumTrustedDomainsEx, &r);
1657 if (NT_STATUS_IS_ERR(status)) {
1661 /* Return variables */
1662 *resume_handle = *r.out.resume_handle;
1663 *domains = *r.out.domains;
1666 return r.out.result;
1669 NTSTATUS rpccli_lsa_CreateTrustedDomainEx(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
1671 struct lsa_CreateTrustedDomainEx r;
1676 if (DEBUGLEVEL >= 10)
1677 NDR_PRINT_IN_DEBUG(lsa_CreateTrustedDomainEx, &r);
1679 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_CREATETRUSTEDDOMAINEX, &r);
1681 if (!NT_STATUS_IS_OK(status)) {
1685 if (DEBUGLEVEL >= 10)
1686 NDR_PRINT_OUT_DEBUG(lsa_CreateTrustedDomainEx, &r);
1688 if (NT_STATUS_IS_ERR(status)) {
1692 /* Return variables */
1695 return r.out.result;
1698 NTSTATUS rpccli_lsa_CloseTrustedDomainEx(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle)
1700 struct lsa_CloseTrustedDomainEx r;
1704 r.in.handle = handle;
1706 if (DEBUGLEVEL >= 10)
1707 NDR_PRINT_IN_DEBUG(lsa_CloseTrustedDomainEx, &r);
1709 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_CLOSETRUSTEDDOMAINEX, &r);
1711 if (!NT_STATUS_IS_OK(status)) {
1715 if (DEBUGLEVEL >= 10)
1716 NDR_PRINT_OUT_DEBUG(lsa_CloseTrustedDomainEx, &r);
1718 if (NT_STATUS_IS_ERR(status)) {
1722 /* Return variables */
1723 *handle = *r.out.handle;
1726 return r.out.result;
1729 NTSTATUS rpccli_lsa_QueryDomainInformationPolicy(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, uint16_t level, union lsa_DomainInformationPolicy *info)
1731 struct lsa_QueryDomainInformationPolicy r;
1735 r.in.handle = handle;
1738 if (DEBUGLEVEL >= 10)
1739 NDR_PRINT_IN_DEBUG(lsa_QueryDomainInformationPolicy, &r);
1741 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_QUERYDOMAININFORMATIONPOLICY, &r);
1743 if (!NT_STATUS_IS_OK(status)) {
1747 if (DEBUGLEVEL >= 10)
1748 NDR_PRINT_OUT_DEBUG(lsa_QueryDomainInformationPolicy, &r);
1750 if (NT_STATUS_IS_ERR(status)) {
1754 /* Return variables */
1756 *info = *r.out.info;
1760 return r.out.result;
1763 NTSTATUS rpccli_lsa_SetDomainInformationPolicy(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, uint16_t level, union lsa_DomainInformationPolicy *info)
1765 struct lsa_SetDomainInformationPolicy r;
1769 r.in.handle = handle;
1773 if (DEBUGLEVEL >= 10)
1774 NDR_PRINT_IN_DEBUG(lsa_SetDomainInformationPolicy, &r);
1776 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_SETDOMAININFORMATIONPOLICY, &r);
1778 if (!NT_STATUS_IS_OK(status)) {
1782 if (DEBUGLEVEL >= 10)
1783 NDR_PRINT_OUT_DEBUG(lsa_SetDomainInformationPolicy, &r);
1785 if (NT_STATUS_IS_ERR(status)) {
1789 /* Return variables */
1792 return r.out.result;
1795 NTSTATUS rpccli_lsa_OpenTrustedDomainByName(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct lsa_String name, uint32_t access_mask, struct policy_handle *trustdom_handle)
1797 struct lsa_OpenTrustedDomainByName r;
1801 r.in.handle = handle;
1803 r.in.access_mask = access_mask;
1805 if (DEBUGLEVEL >= 10)
1806 NDR_PRINT_IN_DEBUG(lsa_OpenTrustedDomainByName, &r);
1808 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_OPENTRUSTEDDOMAINBYNAME, &r);
1810 if (!NT_STATUS_IS_OK(status)) {
1814 if (DEBUGLEVEL >= 10)
1815 NDR_PRINT_OUT_DEBUG(lsa_OpenTrustedDomainByName, &r);
1817 if (NT_STATUS_IS_ERR(status)) {
1821 /* Return variables */
1822 *trustdom_handle = *r.out.trustdom_handle;
1825 return r.out.result;
1828 NTSTATUS rpccli_lsa_TestCall(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
1830 struct lsa_TestCall r;
1835 if (DEBUGLEVEL >= 10)
1836 NDR_PRINT_IN_DEBUG(lsa_TestCall, &r);
1838 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_TESTCALL, &r);
1840 if (!NT_STATUS_IS_OK(status)) {
1844 if (DEBUGLEVEL >= 10)
1845 NDR_PRINT_OUT_DEBUG(lsa_TestCall, &r);
1847 if (NT_STATUS_IS_ERR(status)) {
1851 /* Return variables */
1854 return r.out.result;
1857 NTSTATUS rpccli_lsa_LookupSids2(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct lsa_SidArray *sids, struct lsa_RefDomainList *domains, struct lsa_TransNameArray2 *names, uint16_t level, uint32_t *count, uint32_t unknown1, uint32_t unknown2)
1859 struct lsa_LookupSids2 r;
1863 r.in.handle = handle;
1868 r.in.unknown1 = unknown1;
1869 r.in.unknown2 = unknown2;
1871 if (DEBUGLEVEL >= 10)
1872 NDR_PRINT_IN_DEBUG(lsa_LookupSids2, &r);
1874 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_LOOKUPSIDS2, &r);
1876 if (!NT_STATUS_IS_OK(status)) {
1880 if (DEBUGLEVEL >= 10)
1881 NDR_PRINT_OUT_DEBUG(lsa_LookupSids2, &r);
1883 if (NT_STATUS_IS_ERR(status)) {
1887 /* Return variables */
1889 *domains = *r.out.domains;
1891 *names = *r.out.names;
1892 *count = *r.out.count;
1895 return r.out.result;
1898 NTSTATUS rpccli_lsa_LookupNames2(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, uint32_t num_names, struct lsa_String *names, struct lsa_RefDomainList *domains, struct lsa_TransSidArray2 *sids, uint16_t level, uint32_t *count, uint32_t unknown1, uint32_t unknown2)
1900 struct lsa_LookupNames2 r;
1904 r.in.handle = handle;
1905 r.in.num_names = num_names;
1910 r.in.unknown1 = unknown1;
1911 r.in.unknown2 = unknown2;
1913 if (DEBUGLEVEL >= 10)
1914 NDR_PRINT_IN_DEBUG(lsa_LookupNames2, &r);
1916 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_LOOKUPNAMES2, &r);
1918 if (!NT_STATUS_IS_OK(status)) {
1922 if (DEBUGLEVEL >= 10)
1923 NDR_PRINT_OUT_DEBUG(lsa_LookupNames2, &r);
1925 if (NT_STATUS_IS_ERR(status)) {
1929 /* Return variables */
1931 *domains = *r.out.domains;
1933 *sids = *r.out.sids;
1934 *count = *r.out.count;
1937 return r.out.result;
1940 NTSTATUS rpccli_lsa_CreateTrustedDomainEx2(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
1942 struct lsa_CreateTrustedDomainEx2 r;
1947 if (DEBUGLEVEL >= 10)
1948 NDR_PRINT_IN_DEBUG(lsa_CreateTrustedDomainEx2, &r);
1950 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_CREATETRUSTEDDOMAINEX2, &r);
1952 if (!NT_STATUS_IS_OK(status)) {
1956 if (DEBUGLEVEL >= 10)
1957 NDR_PRINT_OUT_DEBUG(lsa_CreateTrustedDomainEx2, &r);
1959 if (NT_STATUS_IS_ERR(status)) {
1963 /* Return variables */
1966 return r.out.result;
1969 NTSTATUS rpccli_lsa_CREDRWRITE(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
1971 struct lsa_CREDRWRITE r;
1976 if (DEBUGLEVEL >= 10)
1977 NDR_PRINT_IN_DEBUG(lsa_CREDRWRITE, &r);
1979 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_CREDRWRITE, &r);
1981 if (!NT_STATUS_IS_OK(status)) {
1985 if (DEBUGLEVEL >= 10)
1986 NDR_PRINT_OUT_DEBUG(lsa_CREDRWRITE, &r);
1988 if (NT_STATUS_IS_ERR(status)) {
1992 /* Return variables */
1995 return r.out.result;
1998 NTSTATUS rpccli_lsa_CREDRREAD(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
2000 struct lsa_CREDRREAD r;
2005 if (DEBUGLEVEL >= 10)
2006 NDR_PRINT_IN_DEBUG(lsa_CREDRREAD, &r);
2008 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_CREDRREAD, &r);
2010 if (!NT_STATUS_IS_OK(status)) {
2014 if (DEBUGLEVEL >= 10)
2015 NDR_PRINT_OUT_DEBUG(lsa_CREDRREAD, &r);
2017 if (NT_STATUS_IS_ERR(status)) {
2021 /* Return variables */
2024 return r.out.result;
2027 NTSTATUS rpccli_lsa_CREDRENUMERATE(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
2029 struct lsa_CREDRENUMERATE r;
2034 if (DEBUGLEVEL >= 10)
2035 NDR_PRINT_IN_DEBUG(lsa_CREDRENUMERATE, &r);
2037 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_CREDRENUMERATE, &r);
2039 if (!NT_STATUS_IS_OK(status)) {
2043 if (DEBUGLEVEL >= 10)
2044 NDR_PRINT_OUT_DEBUG(lsa_CREDRENUMERATE, &r);
2046 if (NT_STATUS_IS_ERR(status)) {
2050 /* Return variables */
2053 return r.out.result;
2056 NTSTATUS rpccli_lsa_CREDRWRITEDOMAINCREDENTIALS(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
2058 struct lsa_CREDRWRITEDOMAINCREDENTIALS r;
2063 if (DEBUGLEVEL >= 10)
2064 NDR_PRINT_IN_DEBUG(lsa_CREDRWRITEDOMAINCREDENTIALS, &r);
2066 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_CREDRWRITEDOMAINCREDENTIALS, &r);
2068 if (!NT_STATUS_IS_OK(status)) {
2072 if (DEBUGLEVEL >= 10)
2073 NDR_PRINT_OUT_DEBUG(lsa_CREDRWRITEDOMAINCREDENTIALS, &r);
2075 if (NT_STATUS_IS_ERR(status)) {
2079 /* Return variables */
2082 return r.out.result;
2085 NTSTATUS rpccli_lsa_CREDRREADDOMAINCREDENTIALS(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
2087 struct lsa_CREDRREADDOMAINCREDENTIALS r;
2092 if (DEBUGLEVEL >= 10)
2093 NDR_PRINT_IN_DEBUG(lsa_CREDRREADDOMAINCREDENTIALS, &r);
2095 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_CREDRREADDOMAINCREDENTIALS, &r);
2097 if (!NT_STATUS_IS_OK(status)) {
2101 if (DEBUGLEVEL >= 10)
2102 NDR_PRINT_OUT_DEBUG(lsa_CREDRREADDOMAINCREDENTIALS, &r);
2104 if (NT_STATUS_IS_ERR(status)) {
2108 /* Return variables */
2111 return r.out.result;
2114 NTSTATUS rpccli_lsa_CREDRDELETE(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
2116 struct lsa_CREDRDELETE r;
2121 if (DEBUGLEVEL >= 10)
2122 NDR_PRINT_IN_DEBUG(lsa_CREDRDELETE, &r);
2124 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_CREDRDELETE, &r);
2126 if (!NT_STATUS_IS_OK(status)) {
2130 if (DEBUGLEVEL >= 10)
2131 NDR_PRINT_OUT_DEBUG(lsa_CREDRDELETE, &r);
2133 if (NT_STATUS_IS_ERR(status)) {
2137 /* Return variables */
2140 return r.out.result;
2143 NTSTATUS rpccli_lsa_CREDRGETTARGETINFO(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
2145 struct lsa_CREDRGETTARGETINFO r;
2150 if (DEBUGLEVEL >= 10)
2151 NDR_PRINT_IN_DEBUG(lsa_CREDRGETTARGETINFO, &r);
2153 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_CREDRGETTARGETINFO, &r);
2155 if (!NT_STATUS_IS_OK(status)) {
2159 if (DEBUGLEVEL >= 10)
2160 NDR_PRINT_OUT_DEBUG(lsa_CREDRGETTARGETINFO, &r);
2162 if (NT_STATUS_IS_ERR(status)) {
2166 /* Return variables */
2169 return r.out.result;
2172 NTSTATUS rpccli_lsa_CREDRPROFILELOADED(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
2174 struct lsa_CREDRPROFILELOADED r;
2179 if (DEBUGLEVEL >= 10)
2180 NDR_PRINT_IN_DEBUG(lsa_CREDRPROFILELOADED, &r);
2182 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_CREDRPROFILELOADED, &r);
2184 if (!NT_STATUS_IS_OK(status)) {
2188 if (DEBUGLEVEL >= 10)
2189 NDR_PRINT_OUT_DEBUG(lsa_CREDRPROFILELOADED, &r);
2191 if (NT_STATUS_IS_ERR(status)) {
2195 /* Return variables */
2198 return r.out.result;
2201 NTSTATUS rpccli_lsa_LookupNames3(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, uint32_t num_names, struct lsa_String *names, struct lsa_RefDomainList *domains, struct lsa_TransSidArray3 *sids, uint16_t level, uint32_t *count, uint32_t unknown1, uint32_t unknown2)
2203 struct lsa_LookupNames3 r;
2207 r.in.handle = handle;
2208 r.in.num_names = num_names;
2213 r.in.unknown1 = unknown1;
2214 r.in.unknown2 = unknown2;
2216 if (DEBUGLEVEL >= 10)
2217 NDR_PRINT_IN_DEBUG(lsa_LookupNames3, &r);
2219 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_LOOKUPNAMES3, &r);
2221 if (!NT_STATUS_IS_OK(status)) {
2225 if (DEBUGLEVEL >= 10)
2226 NDR_PRINT_OUT_DEBUG(lsa_LookupNames3, &r);
2228 if (NT_STATUS_IS_ERR(status)) {
2232 /* Return variables */
2234 *domains = *r.out.domains;
2236 *sids = *r.out.sids;
2237 *count = *r.out.count;
2240 return r.out.result;
2243 NTSTATUS rpccli_lsa_CREDRGETSESSIONTYPES(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
2245 struct lsa_CREDRGETSESSIONTYPES r;
2250 if (DEBUGLEVEL >= 10)
2251 NDR_PRINT_IN_DEBUG(lsa_CREDRGETSESSIONTYPES, &r);
2253 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_CREDRGETSESSIONTYPES, &r);
2255 if (!NT_STATUS_IS_OK(status)) {
2259 if (DEBUGLEVEL >= 10)
2260 NDR_PRINT_OUT_DEBUG(lsa_CREDRGETSESSIONTYPES, &r);
2262 if (NT_STATUS_IS_ERR(status)) {
2266 /* Return variables */
2269 return r.out.result;
2272 NTSTATUS rpccli_lsa_LSARREGISTERAUDITEVENT(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
2274 struct lsa_LSARREGISTERAUDITEVENT r;
2279 if (DEBUGLEVEL >= 10)
2280 NDR_PRINT_IN_DEBUG(lsa_LSARREGISTERAUDITEVENT, &r);
2282 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_LSARREGISTERAUDITEVENT, &r);
2284 if (!NT_STATUS_IS_OK(status)) {
2288 if (DEBUGLEVEL >= 10)
2289 NDR_PRINT_OUT_DEBUG(lsa_LSARREGISTERAUDITEVENT, &r);
2291 if (NT_STATUS_IS_ERR(status)) {
2295 /* Return variables */
2298 return r.out.result;
2301 NTSTATUS rpccli_lsa_LSARGENAUDITEVENT(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
2303 struct lsa_LSARGENAUDITEVENT r;
2308 if (DEBUGLEVEL >= 10)
2309 NDR_PRINT_IN_DEBUG(lsa_LSARGENAUDITEVENT, &r);
2311 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_LSARGENAUDITEVENT, &r);
2313 if (!NT_STATUS_IS_OK(status)) {
2317 if (DEBUGLEVEL >= 10)
2318 NDR_PRINT_OUT_DEBUG(lsa_LSARGENAUDITEVENT, &r);
2320 if (NT_STATUS_IS_ERR(status)) {
2324 /* Return variables */
2327 return r.out.result;
2330 NTSTATUS rpccli_lsa_LSARUNREGISTERAUDITEVENT(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
2332 struct lsa_LSARUNREGISTERAUDITEVENT r;
2337 if (DEBUGLEVEL >= 10)
2338 NDR_PRINT_IN_DEBUG(lsa_LSARUNREGISTERAUDITEVENT, &r);
2340 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_LSARUNREGISTERAUDITEVENT, &r);
2342 if (!NT_STATUS_IS_OK(status)) {
2346 if (DEBUGLEVEL >= 10)
2347 NDR_PRINT_OUT_DEBUG(lsa_LSARUNREGISTERAUDITEVENT, &r);
2349 if (NT_STATUS_IS_ERR(status)) {
2353 /* Return variables */
2356 return r.out.result;
2359 NTSTATUS rpccli_lsa_LSARQUERYFORESTTRUSTINFORMATION(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
2361 struct lsa_LSARQUERYFORESTTRUSTINFORMATION r;
2366 if (DEBUGLEVEL >= 10)
2367 NDR_PRINT_IN_DEBUG(lsa_LSARQUERYFORESTTRUSTINFORMATION, &r);
2369 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_LSARQUERYFORESTTRUSTINFORMATION, &r);
2371 if (!NT_STATUS_IS_OK(status)) {
2375 if (DEBUGLEVEL >= 10)
2376 NDR_PRINT_OUT_DEBUG(lsa_LSARQUERYFORESTTRUSTINFORMATION, &r);
2378 if (NT_STATUS_IS_ERR(status)) {
2382 /* Return variables */
2385 return r.out.result;
2388 NTSTATUS rpccli_lsa_LSARSETFORESTTRUSTINFORMATION(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
2390 struct lsa_LSARSETFORESTTRUSTINFORMATION r;
2395 if (DEBUGLEVEL >= 10)
2396 NDR_PRINT_IN_DEBUG(lsa_LSARSETFORESTTRUSTINFORMATION, &r);
2398 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_LSARSETFORESTTRUSTINFORMATION, &r);
2400 if (!NT_STATUS_IS_OK(status)) {
2404 if (DEBUGLEVEL >= 10)
2405 NDR_PRINT_OUT_DEBUG(lsa_LSARSETFORESTTRUSTINFORMATION, &r);
2407 if (NT_STATUS_IS_ERR(status)) {
2411 /* Return variables */
2414 return r.out.result;
2417 NTSTATUS rpccli_lsa_CREDRRENAME(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
2419 struct lsa_CREDRRENAME r;
2424 if (DEBUGLEVEL >= 10)
2425 NDR_PRINT_IN_DEBUG(lsa_CREDRRENAME, &r);
2427 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_CREDRRENAME, &r);
2429 if (!NT_STATUS_IS_OK(status)) {
2433 if (DEBUGLEVEL >= 10)
2434 NDR_PRINT_OUT_DEBUG(lsa_CREDRRENAME, &r);
2436 if (NT_STATUS_IS_ERR(status)) {
2440 /* Return variables */
2443 return r.out.result;
2446 NTSTATUS rpccli_lsa_LookupSids3(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct lsa_SidArray *sids, struct lsa_RefDomainList *domains, struct lsa_TransNameArray2 *names, uint16_t level, uint32_t *count, uint32_t unknown1, uint32_t unknown2)
2448 struct lsa_LookupSids3 r;
2456 r.in.unknown1 = unknown1;
2457 r.in.unknown2 = unknown2;
2459 if (DEBUGLEVEL >= 10)
2460 NDR_PRINT_IN_DEBUG(lsa_LookupSids3, &r);
2462 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_LOOKUPSIDS3, &r);
2464 if (!NT_STATUS_IS_OK(status)) {
2468 if (DEBUGLEVEL >= 10)
2469 NDR_PRINT_OUT_DEBUG(lsa_LookupSids3, &r);
2471 if (NT_STATUS_IS_ERR(status)) {
2475 /* Return variables */
2477 *domains = *r.out.domains;
2479 *names = *r.out.names;
2480 *count = *r.out.count;
2483 return r.out.result;
2486 NTSTATUS rpccli_lsa_LookupNames4(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, uint32_t num_names, struct lsa_String *names, struct lsa_RefDomainList *domains, struct lsa_TransSidArray3 *sids, uint16_t level, uint32_t *count, uint32_t unknown1, uint32_t unknown2)
2488 struct lsa_LookupNames4 r;
2492 r.in.num_names = num_names;
2497 r.in.unknown1 = unknown1;
2498 r.in.unknown2 = unknown2;
2500 if (DEBUGLEVEL >= 10)
2501 NDR_PRINT_IN_DEBUG(lsa_LookupNames4, &r);
2503 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_LOOKUPNAMES4, &r);
2505 if (!NT_STATUS_IS_OK(status)) {
2509 if (DEBUGLEVEL >= 10)
2510 NDR_PRINT_OUT_DEBUG(lsa_LookupNames4, &r);
2512 if (NT_STATUS_IS_ERR(status)) {
2516 /* Return variables */
2518 *domains = *r.out.domains;
2520 *sids = *r.out.sids;
2521 *count = *r.out.count;
2524 return r.out.result;
2527 NTSTATUS rpccli_lsa_LSAROPENPOLICYSCE(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
2529 struct lsa_LSAROPENPOLICYSCE r;
2534 if (DEBUGLEVEL >= 10)
2535 NDR_PRINT_IN_DEBUG(lsa_LSAROPENPOLICYSCE, &r);
2537 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_LSAROPENPOLICYSCE, &r);
2539 if (!NT_STATUS_IS_OK(status)) {
2543 if (DEBUGLEVEL >= 10)
2544 NDR_PRINT_OUT_DEBUG(lsa_LSAROPENPOLICYSCE, &r);
2546 if (NT_STATUS_IS_ERR(status)) {
2550 /* Return variables */
2553 return r.out.result;
2556 NTSTATUS rpccli_lsa_LSARADTREGISTERSECURITYEVENTSOURCE(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
2558 struct lsa_LSARADTREGISTERSECURITYEVENTSOURCE r;
2563 if (DEBUGLEVEL >= 10)
2564 NDR_PRINT_IN_DEBUG(lsa_LSARADTREGISTERSECURITYEVENTSOURCE, &r);
2566 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_LSARADTREGISTERSECURITYEVENTSOURCE, &r);
2568 if (!NT_STATUS_IS_OK(status)) {
2572 if (DEBUGLEVEL >= 10)
2573 NDR_PRINT_OUT_DEBUG(lsa_LSARADTREGISTERSECURITYEVENTSOURCE, &r);
2575 if (NT_STATUS_IS_ERR(status)) {
2579 /* Return variables */
2582 return r.out.result;
2585 NTSTATUS rpccli_lsa_LSARADTUNREGISTERSECURITYEVENTSOURCE(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
2587 struct lsa_LSARADTUNREGISTERSECURITYEVENTSOURCE r;
2592 if (DEBUGLEVEL >= 10)
2593 NDR_PRINT_IN_DEBUG(lsa_LSARADTUNREGISTERSECURITYEVENTSOURCE, &r);
2595 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_LSARADTUNREGISTERSECURITYEVENTSOURCE, &r);
2597 if (!NT_STATUS_IS_OK(status)) {
2601 if (DEBUGLEVEL >= 10)
2602 NDR_PRINT_OUT_DEBUG(lsa_LSARADTUNREGISTERSECURITYEVENTSOURCE, &r);
2604 if (NT_STATUS_IS_ERR(status)) {
2608 /* Return variables */
2611 return r.out.result;
2614 NTSTATUS rpccli_lsa_LSARADTREPORTSECURITYEVENT(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx)
2616 struct lsa_LSARADTREPORTSECURITYEVENT r;
2621 if (DEBUGLEVEL >= 10)
2622 NDR_PRINT_IN_DEBUG(lsa_LSARADTREPORTSECURITYEVENT, &r);
2624 status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_LSARADTREPORTSECURITYEVENT, &r);
2626 if (!NT_STATUS_IS_OK(status)) {
2630 if (DEBUGLEVEL >= 10)
2631 NDR_PRINT_OUT_DEBUG(lsa_LSARADTREPORTSECURITYEVENT, &r);
2633 if (NT_STATUS_IS_ERR(status)) {
2637 /* Return variables */
2640 return r.out.result;