s4:netlogon GetTrustedDomainInformation
[kai/samba-autobuild/.git] / librpc / idl / lsa.idl
1 #include "idl_types.h"
2
3 /*
4   lsa interface definition
5 */
6
7 import "misc.idl", "security.idl";
8
9 [ uuid("12345778-1234-abcd-ef00-0123456789ab"),
10   version(0.0),
11   endpoint("ncacn_np:[\\pipe\\lsarpc]","ncacn_np:[\\pipe\\netlogon]","ncacn_np:[\\pipe\\lsass]", "ncacn_ip_tcp:", "ncalrpc:"),
12   pointer_default(unique),
13   helpstring("Local Security Authority")
14 ] interface lsarpc
15 {
16         typedef bitmap security_secinfo security_secinfo;
17         typedef bitmap kerb_EncTypes kerb_EncTypes;
18
19         typedef [public] struct {
20                 [value(2*strlen_m(string))] uint16 length;
21                 [value(2*strlen_m(string))] uint16 size;
22                 [charset(UTF16),size_is(size/2),length_is(length/2)] uint16 *string;
23         } lsa_String;
24
25         typedef [public] struct {
26                 [value(2*strlen_m(string))] uint16 length;
27                 [value(2*strlen_m_term(string))] uint16 size;
28                 [charset(UTF16),size_is(size/2),length_is(length/2)] uint16 *string;
29         } lsa_StringLarge;
30
31         typedef [public] struct {
32                 uint32 count;
33                 [size_is(count)] lsa_String *names;
34         } lsa_Strings;
35
36         typedef [public] struct {
37                 [value(strlen_m(string))] uint16 length;
38                 [value(strlen_m(string))] uint16 size;
39                 [charset(DOS),size_is(size),length_is(length)] uint8 *string;
40         } lsa_AsciiString;
41
42         typedef [public] struct {
43                 [value(strlen_m(string))] uint16 length;
44                 [value(strlen_m_term(string))] uint16 size;
45                 [charset(DOS),size_is(size),length_is(length)] uint8 *string;
46         } lsa_AsciiStringLarge;
47
48         typedef [public] struct {
49                 uint16 length;
50                 uint16 size;
51                 [size_is(size/2),length_is(length/2)] uint16 *array;
52         } lsa_BinaryString;
53
54         /******************/
55         /* Function: 0x00 */
56         NTSTATUS lsa_Close (
57                 [in,out]     policy_handle *handle
58                 );
59
60
61         /******************/
62         /* Function: 0x01 */
63         [public] NTSTATUS lsa_Delete (
64                 [in]     policy_handle *handle
65                 );
66
67
68         /******************/
69         /* Function: 0x02 */
70         typedef struct {
71                 uint32 low;
72                 uint32 high;
73         } lsa_LUID;
74
75         typedef struct {
76                 lsa_StringLarge name;
77                 lsa_LUID luid;
78         } lsa_PrivEntry;
79
80         typedef struct {
81                 uint32 count;
82                 [size_is(count)] lsa_PrivEntry *privs;
83         } lsa_PrivArray;
84
85         [public] NTSTATUS lsa_EnumPrivs (
86                 [in]            policy_handle *handle,
87                 [in,out,ref]    uint32 *resume_handle,
88                 [out,ref]       lsa_PrivArray *privs,
89                 [in]            uint32 max_count
90                 );
91
92         /******************/
93         /* Function: 0x03 */
94         NTSTATUS lsa_QuerySecurity (
95                 [in]            policy_handle *handle,
96                 [in]            security_secinfo sec_info,
97                 [out,ref]       sec_desc_buf **sdbuf
98                 );
99
100         /******************/
101         /* Function: 0x04 */
102         NTSTATUS lsa_SetSecObj(
103                 [in]            policy_handle *handle,
104                 [in]            security_secinfo sec_info,
105                 [in,ref]        sec_desc_buf *sdbuf
106                 );
107
108         /******************/
109         /* Function: 0x05 */
110         [todo] NTSTATUS lsa_ChangePassword ();
111
112
113         /******************/
114         /* Function: 0x06 */
115         typedef struct {
116                 uint3264  len; /* ignored */
117                 uint16  impersonation_level;
118                 uint8   context_mode;
119                 uint8   effective_only;
120         } lsa_QosInfo;
121
122         typedef struct {
123                 uint3264 len; /* ignored */
124                 uint8 *root_dir;
125                 [string,charset(UTF16)] uint16 *object_name;
126                 uint32 attributes;
127                 security_descriptor *sec_desc;
128                 lsa_QosInfo *sec_qos;
129         } lsa_ObjectAttribute;
130
131         typedef [public,bitmap32bit] bitmap {
132                 LSA_POLICY_VIEW_LOCAL_INFORMATION       = 0x00000001,
133                 LSA_POLICY_VIEW_AUDIT_INFORMATION       = 0x00000002,
134                 LSA_POLICY_GET_PRIVATE_INFORMATION      = 0x00000004,
135                 LSA_POLICY_TRUST_ADMIN                  = 0x00000008,
136                 LSA_POLICY_CREATE_ACCOUNT               = 0x00000010,
137                 LSA_POLICY_CREATE_SECRET                = 0x00000020,
138                 LSA_POLICY_CREATE_PRIVILEGE             = 0x00000040,
139                 LSA_POLICY_SET_DEFAULT_QUOTA_LIMITS     = 0x00000080,
140                 LSA_POLICY_SET_AUDIT_REQUIREMENTS       = 0x00000100,
141                 LSA_POLICY_AUDIT_LOG_ADMIN              = 0x00000200,
142                 LSA_POLICY_SERVER_ADMIN                 = 0x00000400,
143                 LSA_POLICY_LOOKUP_NAMES                 = 0x00000800,
144                 LSA_POLICY_NOTIFICATION                 = 0x00001000
145         } lsa_PolicyAccessMask;
146
147         const int LSA_POLICY_ALL_ACCESS =
148                 (STANDARD_RIGHTS_REQUIRED_ACCESS        |
149                 LSA_POLICY_VIEW_LOCAL_INFORMATION       |
150                 LSA_POLICY_VIEW_AUDIT_INFORMATION       |
151                 LSA_POLICY_GET_PRIVATE_INFORMATION      |
152                 LSA_POLICY_TRUST_ADMIN                  |
153                 LSA_POLICY_CREATE_ACCOUNT               |
154                 LSA_POLICY_CREATE_SECRET                |
155                 LSA_POLICY_CREATE_PRIVILEGE             |
156                 LSA_POLICY_SET_DEFAULT_QUOTA_LIMITS     |
157                 LSA_POLICY_SET_AUDIT_REQUIREMENTS       |
158                 LSA_POLICY_AUDIT_LOG_ADMIN              |
159                 LSA_POLICY_SERVER_ADMIN                 |
160                 LSA_POLICY_LOOKUP_NAMES);
161
162         const int LSA_POLICY_READ =
163                 (STANDARD_RIGHTS_READ_ACCESS            |
164                 LSA_POLICY_VIEW_LOCAL_INFORMATION       |
165                 LSA_POLICY_VIEW_AUDIT_INFORMATION       |
166                 LSA_POLICY_GET_PRIVATE_INFORMATION);
167
168         const int LSA_POLICY_WRITE =
169                 (STANDARD_RIGHTS_READ_ACCESS            |
170                 LSA_POLICY_TRUST_ADMIN                  |
171                 LSA_POLICY_CREATE_ACCOUNT               |
172                 LSA_POLICY_CREATE_SECRET                |
173                 LSA_POLICY_CREATE_PRIVILEGE             |
174                 LSA_POLICY_SET_DEFAULT_QUOTA_LIMITS     |
175                 LSA_POLICY_SET_AUDIT_REQUIREMENTS       |
176                 LSA_POLICY_AUDIT_LOG_ADMIN              |
177                 LSA_POLICY_SERVER_ADMIN);
178
179         const int LSA_POLICY_EXECUTE =
180                 (STANDARD_RIGHTS_EXECUTE_ACCESS         |
181                 LSA_POLICY_VIEW_LOCAL_INFORMATION       |
182                 LSA_POLICY_LOOKUP_NAMES);
183
184         typedef [public,bitmap32bit] bitmap {
185                 LSA_ACCOUNT_VIEW                        = 0x00000001,
186                 LSA_ACCOUNT_ADJUST_PRIVILEGES           = 0x00000002,
187                 LSA_ACCOUNT_ADJUST_QUOTAS               = 0x00000004,
188                 LSA_ACCOUNT_ADJUST_SYSTEM_ACCESS        = 0x00000008
189         } lsa_AccountAccessMask;
190
191         const int LSA_ACCOUNT_ALL_ACCESS =
192                 (STANDARD_RIGHTS_REQUIRED_ACCESS        |
193                 LSA_ACCOUNT_VIEW                        |
194                 LSA_ACCOUNT_ADJUST_PRIVILEGES           |
195                 LSA_ACCOUNT_ADJUST_QUOTAS               |
196                 LSA_ACCOUNT_ADJUST_SYSTEM_ACCESS);
197
198         const int LSA_ACCOUNT_READ =
199                 (STANDARD_RIGHTS_READ_ACCESS            |
200                 LSA_ACCOUNT_VIEW);
201
202         const int LSA_ACCOUNT_WRITE =
203                 (STANDARD_RIGHTS_READ_ACCESS            |
204                 LSA_ACCOUNT_ADJUST_PRIVILEGES           |
205                 LSA_ACCOUNT_ADJUST_QUOTAS               |
206                 LSA_ACCOUNT_ADJUST_SYSTEM_ACCESS);
207
208         const int LSA_ACCOUNT_EXECUTE =
209                 (STANDARD_RIGHTS_EXECUTE_ACCESS);
210
211         typedef [public,bitmap32bit] bitmap {
212                 LSA_SECRET_SET_VALUE                    = 0x00000001,
213                 LSA_SECRET_QUERY_VALUE                  = 0x00000002
214         } lsa_SecretAccessMask;
215
216         const int LSA_SECRET_ALL_ACCESS =
217                 (LSA_SECRET_QUERY_VALUE |
218                  LSA_SECRET_SET_VALUE |
219                  SEC_STD_DELETE |
220                  STANDARD_RIGHTS_READ_ACCESS |
221                  SEC_STD_WRITE_DAC |
222                  SEC_STD_WRITE_OWNER); /* 0x000F0003 */
223
224         const int LSA_SECRET_READ =
225                 (LSA_SECRET_QUERY_VALUE |
226                 STANDARD_RIGHTS_READ_ACCESS); /* 0x00020002 */
227
228         const int LSA_SECRET_WRITE =
229                 (LSA_SECRET_SET_VALUE |
230                 STANDARD_RIGHTS_READ_ACCESS); /* 0x00020001 */
231
232         const int LSA_SECRET_EXECUTE =
233                 (STANDARD_RIGHTS_READ_ACCESS); /* 0x00020000 */
234
235         typedef [public,bitmap32bit] bitmap {
236                 LSA_TRUSTED_QUERY_DOMAIN_NAME           = 0x00000001,
237                 LSA_TRUSTED_QUERY_CONTROLLERS           = 0x00000002,
238                 LSA_TRUSTED_SET_CONTROLLERS             = 0x00000004,
239                 LSA_TRUSTED_QUERY_POSIX                 = 0x00000008,
240                 LSA_TRUSTED_SET_POSIX                   = 0x00000010,
241                 LSA_TRUSTED_SET_AUTH                    = 0x00000020,
242                 LSA_TRUSTED_QUERY_AUTH                  = 0x00000040
243         } lsa_TrustedAccessMask;
244
245         const int LSA_TRUSTED_DOMAIN_ALL_ACCESS =
246                 (LSA_TRUSTED_QUERY_DOMAIN_NAME |
247                  LSA_TRUSTED_QUERY_CONTROLLERS |
248                  LSA_TRUSTED_SET_CONTROLLERS |
249                  LSA_TRUSTED_QUERY_POSIX |
250                  LSA_TRUSTED_SET_POSIX |
251                  LSA_TRUSTED_SET_AUTH |
252                  LSA_TRUSTED_QUERY_AUTH |
253                  SEC_STD_DELETE |
254                  STANDARD_RIGHTS_READ_ACCESS |
255                  SEC_STD_WRITE_DAC |
256                  SEC_STD_WRITE_OWNER); /* 0x000F007F */
257
258         const int LSA_TRUSTED_DOMAIN_READ =
259                 (LSA_TRUSTED_QUERY_DOMAIN_NAME |
260                  STANDARD_RIGHTS_READ_ACCESS); /* 0x00020001 */
261
262         const int LSA_TRUSTED_DOMAIN_WRITE =
263                 (LSA_TRUSTED_SET_CONTROLLERS |
264                  LSA_TRUSTED_SET_POSIX |
265                  LSA_TRUSTED_SET_AUTH |
266                  STANDARD_RIGHTS_READ_ACCESS); /* 0x00020034 */
267
268         const int LSA_TRUSTED_DOMAIN_EXECUTE =
269                 (LSA_TRUSTED_QUERY_DOMAIN_NAME |
270                  LSA_TRUSTED_QUERY_POSIX |
271                  STANDARD_RIGHTS_READ_ACCESS); /* 0x0002000C */
272
273
274         /* notice the screwup with the system_name - thats why MS created
275            OpenPolicy2 */
276         [public] NTSTATUS lsa_OpenPolicy (
277                 [in,unique]       uint16 *system_name,
278                 [in]   lsa_ObjectAttribute *attr,
279                 [in]   lsa_PolicyAccessMask access_mask,
280                 [out]  policy_handle *handle
281                 );
282
283
284
285         /******************/
286         /* Function: 0x07 */
287
288         typedef struct {
289                 uint32 percent_full;
290                 uint32 maximum_log_size;
291                 hyper  retention_time;
292                 uint8  shutdown_in_progress;
293                 hyper  time_to_shutdown;
294                 uint32 next_audit_record;
295         } lsa_AuditLogInfo;
296
297         typedef [v1_enum] enum {
298                 LSA_AUDIT_POLICY_NONE=0,
299                 LSA_AUDIT_POLICY_SUCCESS=1,
300                 LSA_AUDIT_POLICY_FAILURE=2,
301                 LSA_AUDIT_POLICY_ALL=(LSA_AUDIT_POLICY_SUCCESS|LSA_AUDIT_POLICY_FAILURE),
302                 LSA_AUDIT_POLICY_CLEAR=4
303         } lsa_PolicyAuditPolicy;
304
305         typedef enum {
306                 LSA_AUDIT_CATEGORY_SYSTEM = 0,
307                 LSA_AUDIT_CATEGORY_LOGON = 1,
308                 LSA_AUDIT_CATEGORY_FILE_AND_OBJECT_ACCESS = 2,
309                 LSA_AUDIT_CATEGORY_USE_OF_USER_RIGHTS = 3,
310                 LSA_AUDIT_CATEGORY_PROCCESS_TRACKING = 4,
311                 LSA_AUDIT_CATEGORY_SECURITY_POLICY_CHANGES = 5,
312                 LSA_AUDIT_CATEGORY_ACCOUNT_MANAGEMENT = 6,
313                 LSA_AUDIT_CATEGORY_DIRECTORY_SERVICE_ACCESS = 7,        /* only in win2k/2k3 */
314                 LSA_AUDIT_CATEGORY_ACCOUNT_LOGON = 8                    /* only in win2k/2k3 */
315         } lsa_PolicyAuditEventType;
316
317         typedef struct {
318                 uint32 auditing_mode;
319                 [size_is(count)] lsa_PolicyAuditPolicy *settings;
320                 uint32 count;
321         } lsa_AuditEventsInfo;
322
323         typedef struct {
324                 lsa_StringLarge name;
325                 dom_sid2 *sid;
326         } lsa_DomainInfo;
327
328         typedef struct {
329                 lsa_String name;
330         } lsa_PDAccountInfo;
331
332         typedef [v1_enum] enum {
333                 LSA_ROLE_BACKUP=2,
334                 LSA_ROLE_PRIMARY=3
335         } lsa_Role;
336
337         typedef struct {
338                 lsa_Role role;
339         } lsa_ServerRole;
340
341         typedef struct {
342                 lsa_String source;
343                 lsa_String account;
344         } lsa_ReplicaSourceInfo;
345
346         typedef struct {
347                 uint32 paged_pool;
348                 uint32 non_paged_pool;
349                 uint32 min_wss;
350                 uint32 max_wss;
351                 uint32 pagefile;
352                 hyper unknown;
353         } lsa_DefaultQuotaInfo;
354
355         typedef struct {
356                 hyper modified_id;
357                 NTTIME_hyper db_create_time;
358         } lsa_ModificationInfo;
359
360         typedef struct {
361                 uint8 shutdown_on_full;
362         } lsa_AuditFullSetInfo;
363
364         typedef struct {
365                 uint8 shutdown_on_full;
366                 uint8 log_is_full;
367         } lsa_AuditFullQueryInfo;
368
369         typedef struct {
370                 /* it's important that we use the lsa_StringLarge here,
371                  * because otherwise windows clients result with such dns hostnames
372                  * e.g. w2k3-client.samba4.samba.orgsamba4.samba.org
373                  * where it should be
374                  *      w2k3-client.samba4.samba.org
375                  */
376                 lsa_StringLarge name;
377                 lsa_StringLarge dns_domain;
378                 lsa_StringLarge dns_forest;
379                 GUID domain_guid;
380                 dom_sid2 *sid;
381         } lsa_DnsDomainInfo;
382
383         typedef enum {
384                 LSA_POLICY_INFO_AUDIT_LOG=1,
385                 LSA_POLICY_INFO_AUDIT_EVENTS=2,
386                 LSA_POLICY_INFO_DOMAIN=3,
387                 LSA_POLICY_INFO_PD=4,
388                 LSA_POLICY_INFO_ACCOUNT_DOMAIN=5,
389                 LSA_POLICY_INFO_ROLE=6,
390                 LSA_POLICY_INFO_REPLICA=7,
391                 LSA_POLICY_INFO_QUOTA=8,
392                 LSA_POLICY_INFO_MOD=9,
393                 LSA_POLICY_INFO_AUDIT_FULL_SET=10,
394                 LSA_POLICY_INFO_AUDIT_FULL_QUERY=11,
395                 LSA_POLICY_INFO_DNS=12,
396                 LSA_POLICY_INFO_DNS_INT=13,
397                 LSA_POLICY_INFO_L_ACCOUNT_DOMAIN=14
398         } lsa_PolicyInfo;
399
400         typedef [switch_type(uint16)] union {
401                 [case(LSA_POLICY_INFO_AUDIT_LOG)]        lsa_AuditLogInfo       audit_log;
402                 [case(LSA_POLICY_INFO_AUDIT_EVENTS)]     lsa_AuditEventsInfo    audit_events;
403                 [case(LSA_POLICY_INFO_DOMAIN)]           lsa_DomainInfo         domain;
404                 [case(LSA_POLICY_INFO_PD)]               lsa_PDAccountInfo      pd;
405                 [case(LSA_POLICY_INFO_ACCOUNT_DOMAIN)]   lsa_DomainInfo         account_domain;
406                 [case(LSA_POLICY_INFO_ROLE)]             lsa_ServerRole         role;
407                 [case(LSA_POLICY_INFO_REPLICA)]          lsa_ReplicaSourceInfo  replica;
408                 [case(LSA_POLICY_INFO_QUOTA)]            lsa_DefaultQuotaInfo   quota;
409                 [case(LSA_POLICY_INFO_MOD)]              lsa_ModificationInfo   mod;
410                 [case(LSA_POLICY_INFO_AUDIT_FULL_SET)]   lsa_AuditFullSetInfo   auditfullset;
411                 [case(LSA_POLICY_INFO_AUDIT_FULL_QUERY)] lsa_AuditFullQueryInfo auditfullquery;
412                 [case(LSA_POLICY_INFO_DNS)]              lsa_DnsDomainInfo      dns;
413                 [case(LSA_POLICY_INFO_DNS_INT)]          lsa_DnsDomainInfo      dns;
414                 [case(LSA_POLICY_INFO_L_ACCOUNT_DOMAIN)] lsa_DomainInfo         l_account_domain;
415         } lsa_PolicyInformation;
416
417         NTSTATUS lsa_QueryInfoPolicy(
418                 [in]                            policy_handle *handle,
419                 [in]                            lsa_PolicyInfo level,
420                 [out,ref,switch_is(level)]      lsa_PolicyInformation **info
421                 );
422
423         /******************/
424         /* Function:       0x08 */
425         NTSTATUS lsa_SetInfoPolicy (
426                 [in]                            policy_handle *handle,
427                 [in]                            lsa_PolicyInfo level,
428                 [in,switch_is(level)]           lsa_PolicyInformation *info
429                 );
430
431         /******************/
432         /* Function:       0x09 */
433         [todo] NTSTATUS lsa_ClearAuditLog ();
434
435         /******************/
436         /* Function: 0x0a */
437         [public] NTSTATUS lsa_CreateAccount (
438                 [in]    policy_handle *handle,
439                 [in,ref] dom_sid2 *sid,
440                 [in]    lsa_AccountAccessMask access_mask,
441                 [out]   policy_handle *acct_handle
442                 );
443
444         /******************/
445         /* NOTE: This only returns accounts that have at least
446            one privilege set
447         */
448         /* Function: 0x0b */
449         typedef struct {
450                 dom_sid2 *sid;
451         } lsa_SidPtr;
452
453         typedef [public] struct {
454                 [range(0,20480)] uint32 num_sids;
455                 [size_is(num_sids)] lsa_SidPtr *sids;
456         } lsa_SidArray;
457
458         [public] NTSTATUS lsa_EnumAccounts(
459                 [in]         policy_handle *handle,
460                 [in,out,ref] uint32 *resume_handle,
461                 [out,ref]    lsa_SidArray *sids,
462                 [in,range(0,8192)] uint32 num_entries
463                 );
464
465         /*************************************************/
466         /* Function: 0x0c                                */
467
468         [public] NTSTATUS lsa_CreateTrustedDomain(
469                 [in]         policy_handle *policy_handle,
470                 [in]         lsa_DomainInfo *info,
471                 [in]         lsa_TrustedAccessMask access_mask,
472                 [out]        policy_handle *trustdom_handle
473                 );
474
475
476         /******************/
477         /* Function: 0x0d */
478
479         /* w2k3 treats max_size as max_domains*60       */
480         const int LSA_ENUM_TRUST_DOMAIN_MULTIPLIER = 60;
481
482         typedef struct {
483                 uint32 count;
484                 [size_is(count)] lsa_DomainInfo *domains;
485         } lsa_DomainList;
486
487         NTSTATUS lsa_EnumTrustDom(
488                 [in]               policy_handle *handle,
489                 [in,out,ref]       uint32 *resume_handle,
490                 [out,ref]          lsa_DomainList *domains,
491                 [in]               uint32 max_size
492                 );
493
494
495         /******************/
496         /* Function: 0x0e */
497         typedef [public] enum {
498                 SID_NAME_USE_NONE = 0,/* NOTUSED */
499                 SID_NAME_USER     = 1, /* user */
500                 SID_NAME_DOM_GRP  = 2, /* domain group */
501                 SID_NAME_DOMAIN   = 3, /* domain: don't know what this is */
502                 SID_NAME_ALIAS    = 4, /* local group */
503                 SID_NAME_WKN_GRP  = 5, /* well-known group */
504                 SID_NAME_DELETED  = 6, /* deleted account: needed for c2 rating */
505                 SID_NAME_INVALID  = 7, /* invalid account */
506                 SID_NAME_UNKNOWN  = 8, /* oops. */
507                 SID_NAME_COMPUTER = 9  /* machine */
508         } lsa_SidType;
509
510         typedef struct {
511                 lsa_SidType sid_type;
512                 uint32 rid;
513                 uint32 sid_index;
514         } lsa_TranslatedSid;
515
516         typedef struct {
517                 [range(0,1000)] uint32 count;
518                 [size_is(count)] lsa_TranslatedSid *sids;
519         } lsa_TransSidArray;
520
521         const int LSA_REF_DOMAIN_LIST_MULTIPLIER = 32;
522         typedef struct {
523                 [range(0,1000)] uint32 count;
524                 [size_is(count)] lsa_DomainInfo *domains;
525                 uint32 max_size;
526         } lsa_RefDomainList;
527
528         /* Level 1: Ask everywhere
529          * Level 2: Ask domain and trusted domains, no builtin and wkn
530          * Level 3: Only ask domain
531          * Level 4: W2k3ad: Only ask AD trusts
532          * Level 5: Only ask transitive forest trusts
533          * Level 6: Like 4
534          */
535
536         typedef enum {
537                 LSA_LOOKUP_NAMES_ALL = 1,
538                 LSA_LOOKUP_NAMES_DOMAINS_ONLY = 2,
539                 LSA_LOOKUP_NAMES_PRIMARY_DOMAIN_ONLY = 3,
540                 LSA_LOOKUP_NAMES_UPLEVEL_TRUSTS_ONLY = 4,
541                 LSA_LOOKUP_NAMES_FOREST_TRUSTS_ONLY = 5,
542                 LSA_LOOKUP_NAMES_UPLEVEL_TRUSTS_ONLY2 = 6,
543                 LSA_LOOKUP_NAMES_RODC_REFERRAL_TO_FULL_DC = 7
544         } lsa_LookupNamesLevel;
545
546         [public] NTSTATUS lsa_LookupNames (
547                 [in]         policy_handle *handle,
548                 [in,range(0,1000)] uint32 num_names,
549                 [in,size_is(num_names)]  lsa_String names[],
550                 [out,ref]    lsa_RefDomainList **domains,
551                 [in,out,ref] lsa_TransSidArray *sids,
552                 [in]         lsa_LookupNamesLevel level,
553                 [in,out,ref] uint32 *count
554                 );
555
556
557         /******************/
558         /* Function: 0x0f */
559
560         typedef struct {
561                 lsa_SidType sid_type;
562                 lsa_String name;
563                 uint32 sid_index;
564         } lsa_TranslatedName;
565
566         typedef struct {
567                 [range(0,20480)] uint32 count;
568                 [size_is(count)] lsa_TranslatedName *names;
569         } lsa_TransNameArray;
570
571         [public] NTSTATUS lsa_LookupSids(
572                 [in]         policy_handle *handle,
573                 [in,ref]     lsa_SidArray *sids,
574                 [out,ref]    lsa_RefDomainList **domains,
575                 [in,out,ref] lsa_TransNameArray *names,
576                 [in]         lsa_LookupNamesLevel level,
577                 [in,out,ref] uint32 *count
578                 );
579
580
581         /* Function:        0x10 */
582         [public] NTSTATUS lsa_CreateSecret(
583                 [in]         policy_handle *handle,
584                 [in]         lsa_String       name,
585                 [in]         lsa_SecretAccessMask access_mask,
586                 [out]        policy_handle *sec_handle
587                 );
588
589
590         /*****************************************/
591         /* Function:     0x11                    */
592         NTSTATUS lsa_OpenAccount(
593                 [in]         policy_handle *handle,
594                 [in,ref]     dom_sid2 *sid,
595                 [in]         lsa_AccountAccessMask access_mask,
596                 [out]        policy_handle *acct_handle
597                 );
598
599
600         /****************************************/
601         /* Function:    0x12                    */
602
603         typedef struct {
604                 lsa_LUID luid;
605                 uint32 attribute;
606         } lsa_LUIDAttribute;
607
608         typedef struct {
609                 [range(0,1000)] uint32 count;
610                 uint32 unknown;
611                 [size_is(count)] lsa_LUIDAttribute set[*];
612         } lsa_PrivilegeSet;
613
614         NTSTATUS lsa_EnumPrivsAccount(
615                 [in]         policy_handle *handle,
616                 [out,ref] lsa_PrivilegeSet **privs
617                 );
618
619
620         /****************************************/
621         /* Function:            0x13 */
622         NTSTATUS lsa_AddPrivilegesToAccount(
623                 [in]         policy_handle *handle,
624                 [in,ref]     lsa_PrivilegeSet *privs
625                 );
626
627
628         /****************************************/
629         /* Function:         0x14 */
630         NTSTATUS lsa_RemovePrivilegesFromAccount(
631                 [in]         policy_handle *handle,
632                 [in]         uint8 remove_all,
633                 [in,unique]  lsa_PrivilegeSet *privs
634                 );
635
636         /* Function:           0x15 */
637         [todo] NTSTATUS lsa_GetQuotasForAccount();
638
639         /* Function:           0x16 */
640         [todo] NTSTATUS lsa_SetQuotasForAccount();
641
642         typedef [bitmap32bit] bitmap {
643                 LSA_POLICY_MODE_INTERACTIVE             = 0x00000001,
644                 LSA_POLICY_MODE_NETWORK                 = 0x00000002,
645                 LSA_POLICY_MODE_BATCH                   = 0x00000004,
646                 LSA_POLICY_MODE_SERVICE                 = 0x00000010,
647                 LSA_POLICY_MODE_PROXY                   = 0x00000020,
648                 LSA_POLICY_MODE_DENY_INTERACTIVE        = 0x00000040,
649                 LSA_POLICY_MODE_DENY_NETWORK            = 0x00000080,
650                 LSA_POLICY_MODE_DENY_BATCH              = 0x00000100,
651                 LSA_POLICY_MODE_DENY_SERVICE            = 0x00000200,
652                 LSA_POLICY_MODE_REMOTE_INTERACTIVE      = 0x00000400,
653                 LSA_POLICY_MODE_DENY_REMOTE_INTERACTIVE = 0x00000800,
654                 LSA_POLICY_MODE_ALL                     = 0x00000FF7,
655                 LSA_POLICY_MODE_ALL_NT4                 = 0x00000037
656         } lsa_SystemAccessModeFlags;
657
658         /* Function:    0x17 */
659         NTSTATUS lsa_GetSystemAccessAccount(
660                 [in]      policy_handle *handle,
661                 [out,ref] lsa_AccountAccessMask *access_mask
662                 );
663
664         /* Function:    0x18 */
665         NTSTATUS lsa_SetSystemAccessAccount(
666                 [in] policy_handle *handle,
667                 [in] lsa_AccountAccessMask access_mask
668                 );
669
670         /* Function:        0x19 */
671         NTSTATUS lsa_OpenTrustedDomain(
672                 [in]     policy_handle *handle,
673                 [in]     dom_sid2      *sid,
674                 [in]     lsa_TrustedAccessMask access_mask,
675                 [out]    policy_handle *trustdom_handle
676                 );
677
678         typedef [flag(NDR_PAHEX)] struct {
679                 uint3264 length;
680                 uint3264 size;
681                 [size_is(size),length_is(length)] uint8 *data;
682         } lsa_DATA_BUF;
683
684         typedef [flag(NDR_PAHEX)] struct {
685                 [range(0,65536)] uint32 size;
686                 [size_is(size)] uint8 *data;
687         } lsa_DATA_BUF2;
688
689         typedef enum {
690                 LSA_TRUSTED_DOMAIN_INFO_NAME                  = 1,
691                 LSA_TRUSTED_DOMAIN_INFO_CONTROLLERS           = 2,
692                 LSA_TRUSTED_DOMAIN_INFO_POSIX_OFFSET          = 3,
693                 LSA_TRUSTED_DOMAIN_INFO_PASSWORD              = 4,
694                 LSA_TRUSTED_DOMAIN_INFO_BASIC                 = 5,
695                 LSA_TRUSTED_DOMAIN_INFO_INFO_EX               = 6,
696                 LSA_TRUSTED_DOMAIN_INFO_AUTH_INFO             = 7,
697                 LSA_TRUSTED_DOMAIN_INFO_FULL_INFO             = 8,
698                 LSA_TRUSTED_DOMAIN_INFO_AUTH_INFO_INTERNAL    = 9,
699                 LSA_TRUSTED_DOMAIN_INFO_FULL_INFO_INTERNAL    = 10,
700                 LSA_TRUSTED_DOMAIN_INFO_INFO_EX2_INTERNAL     = 11,
701                 LSA_TRUSTED_DOMAIN_INFO_FULL_INFO_2_INTERNAL  = 12,
702                 LSA_TRUSTED_DOMAIN_SUPPORTED_ENCRYPTION_TYPES = 13
703         } lsa_TrustDomInfoEnum;
704
705         typedef [public,bitmap32bit] bitmap {
706                 LSA_TRUST_DIRECTION_INBOUND  = 0x00000001,
707                 LSA_TRUST_DIRECTION_OUTBOUND = 0x00000002
708         } lsa_TrustDirection;
709
710         typedef [v1_enum] enum {
711                 LSA_TRUST_TYPE_DOWNLEVEL  = 0x00000001,
712                 LSA_TRUST_TYPE_UPLEVEL    = 0x00000002,
713                 LSA_TRUST_TYPE_MIT        = 0x00000003
714         } lsa_TrustType;
715
716         typedef [public,bitmap32bit] bitmap {
717                 LSA_TRUST_ATTRIBUTE_NON_TRANSITIVE      = 0x00000001,
718                 LSA_TRUST_ATTRIBUTE_UPLEVEL_ONLY        = 0x00000002,
719                 LSA_TRUST_ATTRIBUTE_QUARANTINED_DOMAIN  = 0x00000004,
720                 LSA_TRUST_ATTRIBUTE_FOREST_TRANSITIVE   = 0x00000008,
721                 LSA_TRUST_ATTRIBUTE_CROSS_ORGANIZATION  = 0x00000010,
722                 LSA_TRUST_ATTRIBUTE_WITHIN_FOREST       = 0x00000020,
723                 LSA_TRUST_ATTRIBUTE_TREAT_AS_EXTERNAL   = 0x00000040,
724                 LSA_TRUST_ATTRIBUTE_USES_RC4_ENCRYPTION = 0x00000080
725         } lsa_TrustAttributes;
726
727         typedef struct {
728                 lsa_StringLarge  netbios_name;
729         } lsa_TrustDomainInfoName;
730
731
732         typedef struct {
733                 uint32 entries;
734                 [size_is(entries)] lsa_StringLarge  *netbios_names;
735         } lsa_TrustDomainInfoControllers;
736
737         typedef struct {
738                 uint32         posix_offset;
739         } lsa_TrustDomainInfoPosixOffset;
740
741         typedef struct {
742                 lsa_DATA_BUF  *password;
743                 lsa_DATA_BUF  *old_password;
744         } lsa_TrustDomainInfoPassword;
745
746         typedef struct {
747                 lsa_String     netbios_name;
748                 dom_sid2      *sid;
749         } lsa_TrustDomainInfoBasic;
750
751         typedef struct {
752                 lsa_StringLarge     domain_name;
753                 lsa_StringLarge     netbios_name;
754                 dom_sid2           *sid;
755                 lsa_TrustDirection  trust_direction;
756                 lsa_TrustType       trust_type;
757                 lsa_TrustAttributes trust_attributes;
758         } lsa_TrustDomainInfoInfoEx;
759
760         typedef [public,v1_enum] enum {
761                 TRUST_AUTH_TYPE_NONE = 0,
762                 TRUST_AUTH_TYPE_NT4OWF = 1,
763                 TRUST_AUTH_TYPE_CLEAR = 2,
764                 TRUST_AUTH_TYPE_VERSION = 3
765         } lsa_TrustAuthType;
766
767         typedef struct {
768                 NTTIME_hyper   last_update_time;
769                 lsa_TrustAuthType AuthType;
770                 lsa_DATA_BUF2  data;
771         } lsa_TrustDomainInfoBuffer;
772
773         typedef struct {
774                 uint32 incoming_count;
775                 lsa_TrustDomainInfoBuffer *incoming_current_auth_info;
776                 lsa_TrustDomainInfoBuffer *incoming_previous_auth_info;
777                 uint32 outgoing_count;
778                 lsa_TrustDomainInfoBuffer *outgoing_current_auth_info;
779                 lsa_TrustDomainInfoBuffer *outgoing_previous_auth_info;
780         } lsa_TrustDomainInfoAuthInfo;
781
782         typedef struct {
783                 lsa_TrustDomainInfoInfoEx      info_ex;
784                 lsa_TrustDomainInfoPosixOffset posix_offset;
785                 lsa_TrustDomainInfoAuthInfo    auth_info;
786         } lsa_TrustDomainInfoFullInfo;
787
788         typedef struct {
789                 lsa_DATA_BUF2                          auth_blob;
790         } lsa_TrustDomainInfoAuthInfoInternal;
791
792         typedef struct {
793                 lsa_TrustDomainInfoInfoEx              info_ex;
794                 lsa_TrustDomainInfoPosixOffset         posix_offset;
795                 lsa_TrustDomainInfoAuthInfoInternal    auth_info;
796         } lsa_TrustDomainInfoFullInfoInternal;
797
798         typedef struct {
799                 lsa_TrustDomainInfoInfoEx      info_ex;
800                 uint32 forest_trust_length;
801                 [size_is(forest_trust_length)] uint8 *forest_trust_data;
802         } lsa_TrustDomainInfoInfoEx2Internal;
803
804         typedef struct {
805                 lsa_TrustDomainInfoInfoEx2Internal     info;
806                 lsa_TrustDomainInfoPosixOffset posix_offset;
807                 lsa_TrustDomainInfoAuthInfo    auth_info;
808         } lsa_TrustDomainInfoFullInfo2Internal;
809
810         typedef struct {
811                 kerb_EncTypes enc_types;
812         } lsa_TrustDomainInfoSupportedEncTypes;
813
814         typedef [switch_type(lsa_TrustDomInfoEnum)] union {
815                 [case(LSA_TRUSTED_DOMAIN_INFO_NAME)]
816                         lsa_TrustDomainInfoName              name;
817                 [case(LSA_TRUSTED_DOMAIN_INFO_CONTROLLERS)]
818                         lsa_TrustDomainInfoControllers   controllers;
819                 [case(LSA_TRUSTED_DOMAIN_INFO_POSIX_OFFSET)]
820                         lsa_TrustDomainInfoPosixOffset       posix_offset;
821                 [case(LSA_TRUSTED_DOMAIN_INFO_PASSWORD)]
822                         lsa_TrustDomainInfoPassword          password;
823                 [case(LSA_TRUSTED_DOMAIN_INFO_BASIC)]
824                         lsa_TrustDomainInfoBasic             info_basic;
825                 [case(LSA_TRUSTED_DOMAIN_INFO_INFO_EX)]
826                         lsa_TrustDomainInfoInfoEx            info_ex;
827                 [case(LSA_TRUSTED_DOMAIN_INFO_AUTH_INFO)]
828                         lsa_TrustDomainInfoAuthInfo          auth_info;
829                 [case(LSA_TRUSTED_DOMAIN_INFO_FULL_INFO)]
830                         lsa_TrustDomainInfoFullInfo          full_info;
831                 [case(LSA_TRUSTED_DOMAIN_INFO_AUTH_INFO_INTERNAL)]
832                         lsa_TrustDomainInfoAuthInfoInternal  auth_info_internal;
833                 [case(LSA_TRUSTED_DOMAIN_INFO_FULL_INFO_INTERNAL)]
834                         lsa_TrustDomainInfoFullInfoInternal  full_info_internal;
835                 [case(LSA_TRUSTED_DOMAIN_INFO_INFO_EX2_INTERNAL)]
836                         lsa_TrustDomainInfoInfoEx2Internal   info_ex2_internal;
837                 [case(LSA_TRUSTED_DOMAIN_INFO_FULL_INFO_2_INTERNAL)]
838                         lsa_TrustDomainInfoFullInfo2Internal     full_info2_internal;
839                 [case(LSA_TRUSTED_DOMAIN_SUPPORTED_ENCRYPTION_TYPES)]
840                         lsa_TrustDomainInfoSupportedEncTypes enc_types;
841         } lsa_TrustedDomainInfo;
842
843         /* Function:       0x1a */
844         NTSTATUS lsa_QueryTrustedDomainInfo(
845                 [in]     policy_handle                   *trustdom_handle,
846                 [in]     lsa_TrustDomInfoEnum             level,
847                 [out,switch_is(level),ref] lsa_TrustedDomainInfo **info
848                 );
849
850         /* Function:     0x1b */
851         NTSTATUS lsa_SetInformationTrustedDomain(
852                 [in]                  policy_handle         *trustdom_handle,
853                 [in]                  lsa_TrustDomInfoEnum   level,
854                 [in,switch_is(level)] lsa_TrustedDomainInfo *info
855                 );
856
857         /* Function:          0x1c */
858         [public] NTSTATUS lsa_OpenSecret(
859                 [in]     policy_handle    *handle,
860                 [in]         lsa_String        name,
861                 [in]     lsa_SecretAccessMask access_mask,
862                 [out]    policy_handle    *sec_handle
863                 );
864
865         /* Function:           0x1d */
866
867         [public] NTSTATUS lsa_SetSecret(
868                 [in]     policy_handle    *sec_handle,
869                 [in,unique]         lsa_DATA_BUF     *new_val,
870                 [in,unique]         lsa_DATA_BUF     *old_val
871                 );
872
873         typedef struct {
874                 lsa_DATA_BUF *buf;
875         } lsa_DATA_BUF_PTR;
876
877         /* Function:         0x1e */
878         [public] NTSTATUS lsa_QuerySecret (
879                 [in]     policy_handle     *sec_handle,
880                 [in,out,unique]     lsa_DATA_BUF_PTR  *new_val,
881                 [in,out,unique]     NTTIME_hyper      *new_mtime,
882                 [in,out,unique]     lsa_DATA_BUF_PTR  *old_val,
883                 [in,out,unique]     NTTIME_hyper      *old_mtime
884                 );
885
886         /* Function:     0x1f */
887         NTSTATUS lsa_LookupPrivValue(
888                 [in]     policy_handle *handle,
889                 [in,ref] lsa_String *name,
890                 [out,ref] lsa_LUID *luid
891                 );
892
893
894         /* Function:      0x20 */
895         NTSTATUS lsa_LookupPrivName(
896                 [in]     policy_handle *handle,
897                 [in,ref] lsa_LUID *luid,
898                 [out,ref] lsa_StringLarge **name
899                 );
900
901
902         /*******************/
903         /* Function:  0x21 */
904         NTSTATUS lsa_LookupPrivDisplayName(
905                 [in] policy_handle *handle,
906                 [in,ref] lsa_String *name,
907                 [in] uint16 language_id,
908                 [in] uint16 language_id_sys,
909                 [out,ref] lsa_StringLarge **disp_name,
910                 /* see http://www.microsoft.com/globaldev/nlsweb/ for
911                    language definitions */
912                 [out,ref] uint16 *returned_language_id
913                 );
914
915         /*******************/
916         /* Function:  0x22 */
917         NTSTATUS lsa_DeleteObject (
918                 [in,out]     policy_handle *handle
919                 );
920
921         /*******************/
922         /* Function:      0x23 */
923         NTSTATUS lsa_EnumAccountsWithUserRight (
924                 [in]     policy_handle *handle,
925                 [in,unique]         lsa_String *name,
926                 [out]    lsa_SidArray *sids
927                 );
928
929         /* Function:      0x24 */
930         typedef struct {
931                 [string,charset(UTF16)] uint16 *name;
932         } lsa_RightAttribute;
933
934         typedef struct {
935                 [range(0,256)] uint32 count;
936                 [size_is(count)] lsa_StringLarge *names;
937         } lsa_RightSet;
938
939         NTSTATUS lsa_EnumAccountRights (
940                 [in]     policy_handle *handle,
941                 [in,ref] dom_sid2 *sid,
942                 [out,ref] lsa_RightSet *rights
943                 );
944
945
946         /**********************/
947         /* Function:       0x25 */
948         NTSTATUS lsa_AddAccountRights (
949                 [in]     policy_handle *handle,
950                 [in,ref] dom_sid2 *sid,
951                 [in,ref] lsa_RightSet *rights
952                 );
953
954         /**********************/
955         /* Function:       0x26 */
956         NTSTATUS lsa_RemoveAccountRights (
957                 [in]     policy_handle *handle,
958                 [in,ref] dom_sid2 *sid,
959                 [in]     uint8 remove_all,
960                 [in,ref] lsa_RightSet *rights
961                 );
962
963         /* Function:   0x27 */
964         NTSTATUS lsa_QueryTrustedDomainInfoBySid(
965                 [in]               policy_handle         *handle,
966                 [in,ref]           dom_sid2              *dom_sid,
967                 [in]               lsa_TrustDomInfoEnum  level,
968                 [out,switch_is(level),ref] lsa_TrustedDomainInfo **info
969         );
970
971         /* Function:     0x28 */
972         NTSTATUS lsa_SetTrustedDomainInfo(
973                 [in]               policy_handle         *handle,
974                 [in]               dom_sid2              *dom_sid,
975                 [in]               lsa_TrustDomInfoEnum  level,
976                 [in,switch_is(level)] lsa_TrustedDomainInfo *info
977         );
978
979         /* Function:      0x29 */
980         NTSTATUS lsa_DeleteTrustedDomain(
981                 [in]               policy_handle         *handle,
982                 [in]               dom_sid2              *dom_sid
983         );
984
985         /* Function:       0x2a */
986         NTSTATUS lsa_StorePrivateData(
987                 [in]            policy_handle   *handle,
988                 [in,ref]        lsa_String      *name,
989                 [in,unique]     lsa_DATA_BUF    *val
990         );
991
992         /* Function:        0x2b */
993         NTSTATUS lsa_RetrievePrivateData(
994                 [in]            policy_handle   *handle,
995                 [in,ref]        lsa_String      *name,
996                 [in,out,ref]    lsa_DATA_BUF    **val
997         );
998
999         /**********************/
1000         /* Function:     0x2c */
1001         [public] NTSTATUS lsa_OpenPolicy2 (
1002                 [in,unique]      [string,charset(UTF16)] uint16 *system_name,
1003                 [in]  lsa_ObjectAttribute *attr,
1004                 [in]  lsa_PolicyAccessMask access_mask,
1005                 [out] policy_handle *handle
1006                 );
1007
1008         /**********************/
1009         /* Function:     0x2d */
1010         NTSTATUS lsa_GetUserName(
1011                 [in,unique] [string,charset(UTF16)] uint16 *system_name,
1012                 [in,out,ref] lsa_String **account_name,
1013                 [in,out,unique] lsa_String **authority_name
1014                 );
1015
1016         /**********************/
1017         /* Function:          0x2e */
1018
1019         NTSTATUS lsa_QueryInfoPolicy2(
1020                 [in]                         policy_handle *handle,
1021                 [in]                         lsa_PolicyInfo level,
1022                 [out,ref,switch_is(level)]   lsa_PolicyInformation **info
1023                 );
1024
1025         /* Function 0x2f */
1026         NTSTATUS lsa_SetInfoPolicy2(
1027                 [in]                            policy_handle *handle,
1028                 [in]                            lsa_PolicyInfo level,
1029                 [in,switch_is(level)]           lsa_PolicyInformation *info
1030                 );
1031
1032         /**********************/
1033         /* Function 0x30 */
1034         NTSTATUS lsa_QueryTrustedDomainInfoByName(
1035                 [in]                   policy_handle          *handle,
1036                 [in,ref]               lsa_String             *trusted_domain,
1037                 [in]                   lsa_TrustDomInfoEnum   level,
1038                 [out,ref,switch_is(level)] lsa_TrustedDomainInfo **info
1039                 );
1040
1041         /**********************/
1042         /* Function 0x31 */
1043         NTSTATUS lsa_SetTrustedDomainInfoByName(
1044                 [in]                   policy_handle         *handle,
1045                 [in]                   lsa_String             trusted_domain,
1046                 [in]                   lsa_TrustDomInfoEnum   level,
1047                 [in,unique,switch_is(level)] lsa_TrustedDomainInfo *info
1048                 );
1049
1050         /* Function 0x32 */
1051
1052         /* w2k3 treats max_size as max_domains*82       */
1053         const int LSA_ENUM_TRUST_DOMAIN_EX_MULTIPLIER = 82;
1054
1055         typedef struct {
1056                 uint32 count;
1057                 [size_is(count)] lsa_TrustDomainInfoInfoEx *domains;
1058         } lsa_DomainListEx;
1059
1060         NTSTATUS lsa_EnumTrustedDomainsEx (
1061                 [in]               policy_handle *handle,
1062                 [in,out]           uint32 *resume_handle,
1063                 [out]              lsa_DomainListEx *domains,
1064                 [in]               uint32 max_size
1065                 );
1066
1067         /* Function 0x33 */
1068         NTSTATUS lsa_CreateTrustedDomainEx(
1069                 [in]  policy_handle               *policy_handle,
1070                 [in]  lsa_TrustDomainInfoInfoEx   *info,
1071                 [in]  lsa_TrustDomainInfoAuthInfoInternal *auth_info,
1072                 [in]  uint32 access_mask,
1073                 [out] policy_handle               *trustdom_handle
1074                 );
1075
1076
1077         /* Function 0x34 */
1078         NTSTATUS lsa_CloseTrustedDomainEx(
1079                 [in,out]                   policy_handle         *handle
1080         );
1081
1082         /* Function 0x35 */
1083
1084         /* w2k3 returns either 0x000bbbd000000000 or 0x000a48e800000000
1085            for unknown6 - gd */
1086         typedef struct {
1087                 uint32 enforce_restrictions;
1088                 hyper service_tkt_lifetime;
1089                 hyper user_tkt_lifetime;
1090                 hyper user_tkt_renewaltime;
1091                 hyper clock_skew;
1092                 hyper unknown6;
1093         } lsa_DomainInfoKerberos;
1094
1095         typedef struct {
1096                 uint32 blob_size;
1097                 [size_is(blob_size)] uint8 *efs_blob;
1098         } lsa_DomainInfoEfs;
1099
1100         typedef enum {
1101                 LSA_DOMAIN_INFO_POLICY_EFS=2,
1102                 LSA_DOMAIN_INFO_POLICY_KERBEROS=3
1103         } lsa_DomainInfoEnum;
1104
1105         typedef [switch_type(uint16)] union {
1106                 [case(LSA_DOMAIN_INFO_POLICY_EFS)]      lsa_DomainInfoEfs       efs_info;
1107                 [case(LSA_DOMAIN_INFO_POLICY_KERBEROS)] lsa_DomainInfoKerberos  kerberos_info;
1108         } lsa_DomainInformationPolicy;
1109
1110         NTSTATUS lsa_QueryDomainInformationPolicy(
1111                 [in]            policy_handle *handle,
1112                 [in]            uint16 level,
1113                 [out,ref,switch_is(level)]      lsa_DomainInformationPolicy **info
1114                 );
1115
1116         /* Function 0x36 */
1117         NTSTATUS lsa_SetDomainInformationPolicy(
1118                 [in]            policy_handle *handle,
1119                 [in]                    uint16 level,
1120                 [in,unique,switch_is(level)]    lsa_DomainInformationPolicy *info
1121                 );
1122
1123         /**********************/
1124         /* Function 0x37 */
1125         NTSTATUS lsa_OpenTrustedDomainByName(
1126                 [in]     policy_handle *handle,
1127                 [in]         lsa_String     name,
1128                 [in]         uint32         access_mask,
1129                 [out]    policy_handle *trustdom_handle
1130                 );
1131
1132         /* Function 0x38 */
1133         [todo] NTSTATUS lsa_TestCall();
1134
1135         /**********************/
1136         /* Function 0x39 */
1137
1138         typedef struct {
1139                 lsa_SidType sid_type;
1140                 lsa_String name;
1141                 uint32 sid_index;
1142                 uint32 unknown;
1143         } lsa_TranslatedName2;
1144
1145         typedef struct {
1146                 [range(0,1000)] uint32 count;
1147                 [size_is(count)] lsa_TranslatedName2 *names;
1148         } lsa_TransNameArray2;
1149
1150         typedef [v1_enum] enum {
1151                 LSA_LOOKUP_OPTION_SEARCH_ISOLATED_NAMES         = 0x00000000,
1152                 LSA_LOOKUP_OPTION_SEARCH_ISOLATED_NAMES_LOCAL   = 0x80000000
1153         } lsa_LookupOptions;
1154
1155         typedef [v1_enum] enum {
1156                 LSA_CLIENT_REVISION_1   = 0x00000001,
1157                 LSA_CLIENT_REVISION_2   = 0x00000002
1158         } lsa_ClientRevision;
1159
1160         [public] NTSTATUS lsa_LookupSids2(
1161                 [in]     policy_handle *handle,
1162                 [in,ref] lsa_SidArray *sids,
1163                 [out,ref]    lsa_RefDomainList **domains,
1164                 [in,out,ref] lsa_TransNameArray2 *names,
1165                 [in]         lsa_LookupNamesLevel level,
1166                 [in,out,ref] uint32 *count,
1167                 [in]         lsa_LookupOptions lookup_options,
1168                 [in]         lsa_ClientRevision client_revision
1169                 );
1170
1171         /**********************/
1172         /* Function 0x3a */
1173
1174         typedef struct {
1175                 lsa_SidType sid_type;
1176                 uint32 rid;
1177                 uint32 sid_index;
1178                 uint32 unknown;
1179         } lsa_TranslatedSid2;
1180
1181         typedef struct {
1182                 [range(0,1000)] uint32 count;
1183                 [size_is(count)] lsa_TranslatedSid2 *sids;
1184         } lsa_TransSidArray2;
1185
1186         [public] NTSTATUS lsa_LookupNames2 (
1187                 [in]     policy_handle *handle,
1188                 [in,range(0,1000)] uint32 num_names,
1189                 [in,size_is(num_names)]  lsa_String names[],
1190                 [out,ref]    lsa_RefDomainList **domains,
1191                 [in,out,ref] lsa_TransSidArray2 *sids,
1192                 [in]         lsa_LookupNamesLevel level,
1193                 [in,out,ref] uint32 *count,
1194                 [in]         lsa_LookupOptions lookup_options,
1195                 [in]         lsa_ClientRevision client_revision
1196                 );
1197
1198         /* Function 0x3b */
1199         NTSTATUS lsa_CreateTrustedDomainEx2(
1200                 [in]  policy_handle               *policy_handle,
1201                 [in]  lsa_TrustDomainInfoInfoEx   *info,
1202                 [in]  lsa_TrustDomainInfoAuthInfoInternal *auth_info,
1203                 [in]  uint32                       access_mask,
1204                 [out] policy_handle               *trustdom_handle
1205                 );
1206
1207         /* Function 0x3c */
1208         [todo] NTSTATUS lsa_CREDRWRITE();
1209
1210         /* Function 0x3d */
1211         [todo] NTSTATUS lsa_CREDRREAD();
1212
1213         /* Function 0x3e */
1214         [todo] NTSTATUS lsa_CREDRENUMERATE();
1215
1216         /* Function 0x3f */
1217         [todo] NTSTATUS lsa_CREDRWRITEDOMAINCREDENTIALS();
1218
1219         /* Function 0x40 */
1220         [todo] NTSTATUS lsa_CREDRREADDOMAINCREDENTIALS();
1221
1222         /* Function 0x41 */
1223         [todo] NTSTATUS lsa_CREDRDELETE();
1224
1225         /* Function 0x42 */
1226         [todo] NTSTATUS lsa_CREDRGETTARGETINFO();
1227
1228         /* Function 0x43 */
1229         [todo] NTSTATUS lsa_CREDRPROFILELOADED();
1230
1231         /**********************/
1232         /* Function 0x44 */
1233         typedef struct {
1234                 lsa_SidType sid_type;
1235                 dom_sid2 *sid;
1236                 uint32 sid_index;
1237                 uint32 flags;
1238         } lsa_TranslatedSid3;
1239
1240         typedef struct {
1241                 [range(0,1000)] uint32 count;
1242                 [size_is(count)] lsa_TranslatedSid3 *sids;
1243         } lsa_TransSidArray3;
1244
1245         [public] NTSTATUS lsa_LookupNames3 (
1246                 [in]     policy_handle *handle,
1247                 [in,range(0,1000)] uint32 num_names,
1248                 [in,size_is(num_names)]  lsa_String names[],
1249                 [out,ref]    lsa_RefDomainList **domains,
1250                 [in,out,ref] lsa_TransSidArray3 *sids,
1251                 [in]         lsa_LookupNamesLevel level,
1252                 [in,out,ref] uint32 *count,
1253                 [in]         lsa_LookupOptions lookup_options,
1254                 [in]         lsa_ClientRevision client_revision
1255                 );
1256
1257         /* Function 0x45 */
1258         [todo] NTSTATUS lsa_CREDRGETSESSIONTYPES();
1259
1260         /* Function 0x46 */
1261         [todo] NTSTATUS lsa_LSARREGISTERAUDITEVENT();
1262
1263         /* Function 0x47 */
1264         [todo] NTSTATUS lsa_LSARGENAUDITEVENT();
1265
1266         /* Function 0x48 */
1267         [todo] NTSTATUS lsa_LSARUNREGISTERAUDITEVENT();
1268
1269         /* Function 0x49 */
1270         typedef struct {
1271                 [range(0,131072)] uint3264 length;
1272                 [size_is(length)] uint8 *data;
1273         } lsa_ForestTrustBinaryData;
1274
1275         typedef struct {
1276                 dom_sid2 *domain_sid;
1277                 lsa_StringLarge dns_domain_name;
1278                 lsa_StringLarge netbios_domain_name;
1279         } lsa_ForestTrustDomainInfo;
1280
1281         typedef [switch_type(uint32)] union {
1282                 [case(LSA_FOREST_TRUST_TOP_LEVEL_NAME)] lsa_String top_level_name;
1283                 [case(LSA_FOREST_TRUST_TOP_LEVEL_NAME_EX)] lsa_StringLarge top_level_name_ex;
1284                 [case(LSA_FOREST_TRUST_DOMAIN_INFO)] lsa_ForestTrustDomainInfo domain_info;
1285                 [default] lsa_ForestTrustBinaryData data;
1286         } lsa_ForestTrustData;
1287
1288         typedef [v1_enum] enum {
1289                 LSA_FOREST_TRUST_TOP_LEVEL_NAME = 0,
1290                 LSA_FOREST_TRUST_TOP_LEVEL_NAME_EX = 1,
1291                 LSA_FOREST_TRUST_DOMAIN_INFO = 2,
1292                 LSA_FOREST_TRUST_RECORD_TYPE_LAST = 3
1293         } lsa_ForestTrustRecordType;
1294
1295         typedef struct {
1296                 uint32 flags;
1297                 lsa_ForestTrustRecordType level;
1298                 hyper time;
1299                 [switch_is(level)] lsa_ForestTrustData forest_trust_data;
1300         } lsa_ForestTrustRecord;
1301
1302         typedef [public] struct {
1303                 [range(0,4000)] uint32 count;
1304                 [size_is(count)] lsa_ForestTrustRecord **entries;
1305         } lsa_ForestTrustInformation;
1306
1307         NTSTATUS lsa_lsaRQueryForestTrustInformation(
1308                 [in] policy_handle *handle,
1309                 [in,ref] lsa_String *trusted_domain_name,
1310                 [in] uint16 unknown, /* level ? */
1311                 [out,ref] lsa_ForestTrustInformation **forest_trust_info
1312                 );
1313
1314         /* Function 0x4a */
1315         [todo] NTSTATUS lsa_LSARSETFORESTTRUSTINFORMATION();
1316
1317         /* Function 0x4b */
1318         [todo] NTSTATUS lsa_CREDRRENAME();
1319
1320         /*****************/
1321         /* Function 0x4c */
1322
1323         [public] NTSTATUS lsa_LookupSids3(
1324                 [in,ref]     lsa_SidArray *sids,
1325                 [out,ref]    lsa_RefDomainList **domains,
1326                 [in,out,ref] lsa_TransNameArray2 *names,
1327                 [in]         lsa_LookupNamesLevel level,
1328                 [in,out,ref] uint32 *count,
1329                 [in]         lsa_LookupOptions lookup_options,
1330                 [in]         lsa_ClientRevision client_revision
1331                 );
1332
1333         const int LSA_CLIENT_REVISION_NO_DNS     = 0x00000001;
1334         const int LSA_CLIENT_REVISION_DNS        = 0x00000002;
1335
1336         const int LSA_LOOKUP_OPTIONS_NO_ISOLATED = 0x80000000;
1337
1338         /* Function 0x4d */
1339         NTSTATUS lsa_LookupNames4(
1340                 [in,range(0,1000)] uint32 num_names,
1341                 [in,size_is(num_names)]  lsa_String names[],
1342                 [out,ref]    lsa_RefDomainList **domains,
1343                 [in,out,ref] lsa_TransSidArray3 *sids,
1344                 [in]         lsa_LookupNamesLevel level,
1345                 [in,out,ref] uint32 *count,
1346                 [in]         lsa_LookupOptions lookup_options,
1347                 [in]         lsa_ClientRevision client_revision
1348                 );
1349
1350         /* Function 0x4e */
1351         [todo] NTSTATUS lsa_LSAROPENPOLICYSCE();
1352
1353         /* Function 0x4f */
1354         [todo] NTSTATUS lsa_LSARADTREGISTERSECURITYEVENTSOURCE();
1355
1356         /* Function 0x50 */
1357         [todo] NTSTATUS lsa_LSARADTUNREGISTERSECURITYEVENTSOURCE();
1358
1359         /* Function 0x51 */
1360         [todo] NTSTATUS lsa_LSARADTREPORTSECURITYEVENT();
1361
1362 }