2 * Unix SMB/CIFS implementation.
3 * client auto-generated by pidl. DO NOT MODIFY!
7 #include "librpc/gen_ndr/cli_lsa.h"
9 NTSTATUS rpccli_lsa_Close(struct rpc_pipe_client *cli,
11 struct policy_handle *handle /* [in,out] [ref] */)
19 if (DEBUGLEVEL >= 10) {
20 NDR_PRINT_IN_DEBUG(lsa_Close, &r);
23 status = cli_do_rpc_ndr(cli,
29 if (!NT_STATUS_IS_OK(status)) {
33 if (DEBUGLEVEL >= 10) {
34 NDR_PRINT_OUT_DEBUG(lsa_Close, &r);
37 if (NT_STATUS_IS_ERR(status)) {
41 /* Return variables */
42 *handle = *r.out.handle;
48 NTSTATUS rpccli_lsa_Delete(struct rpc_pipe_client *cli,
50 struct policy_handle *handle /* [in] [ref] */)
58 if (DEBUGLEVEL >= 10) {
59 NDR_PRINT_IN_DEBUG(lsa_Delete, &r);
62 status = cli_do_rpc_ndr(cli,
68 if (!NT_STATUS_IS_OK(status)) {
72 if (DEBUGLEVEL >= 10) {
73 NDR_PRINT_OUT_DEBUG(lsa_Delete, &r);
76 if (NT_STATUS_IS_ERR(status)) {
80 /* Return variables */
86 NTSTATUS rpccli_lsa_EnumPrivs(struct rpc_pipe_client *cli,
88 struct policy_handle *handle /* [in] [ref] */,
89 uint32_t *resume_handle /* [in,out] [ref] */,
90 struct lsa_PrivArray *privs /* [out] [ref] */,
91 uint32_t max_count /* [in] */)
93 struct lsa_EnumPrivs r;
98 r.in.resume_handle = resume_handle;
99 r.in.max_count = max_count;
101 if (DEBUGLEVEL >= 10) {
102 NDR_PRINT_IN_DEBUG(lsa_EnumPrivs, &r);
105 status = cli_do_rpc_ndr(cli,
111 if (!NT_STATUS_IS_OK(status)) {
115 if (DEBUGLEVEL >= 10) {
116 NDR_PRINT_OUT_DEBUG(lsa_EnumPrivs, &r);
119 if (NT_STATUS_IS_ERR(status)) {
123 /* Return variables */
124 *resume_handle = *r.out.resume_handle;
125 *privs = *r.out.privs;
131 NTSTATUS rpccli_lsa_QuerySecurity(struct rpc_pipe_client *cli,
133 struct policy_handle *handle /* [in] [ref] */,
134 uint32_t sec_info /* [in] */,
135 struct sec_desc_buf **sdbuf /* [out] [ref] */)
137 struct lsa_QuerySecurity r;
141 r.in.handle = handle;
142 r.in.sec_info = sec_info;
144 if (DEBUGLEVEL >= 10) {
145 NDR_PRINT_IN_DEBUG(lsa_QuerySecurity, &r);
148 status = cli_do_rpc_ndr(cli,
151 NDR_LSA_QUERYSECURITY,
154 if (!NT_STATUS_IS_OK(status)) {
158 if (DEBUGLEVEL >= 10) {
159 NDR_PRINT_OUT_DEBUG(lsa_QuerySecurity, &r);
162 if (NT_STATUS_IS_ERR(status)) {
166 /* Return variables */
167 *sdbuf = *r.out.sdbuf;
173 NTSTATUS rpccli_lsa_SetSecObj(struct rpc_pipe_client *cli,
175 struct policy_handle *handle /* [in] [ref] */,
176 uint32_t sec_info /* [in] */,
177 struct sec_desc_buf *sdbuf /* [in] [ref] */)
179 struct lsa_SetSecObj r;
183 r.in.handle = handle;
184 r.in.sec_info = sec_info;
187 if (DEBUGLEVEL >= 10) {
188 NDR_PRINT_IN_DEBUG(lsa_SetSecObj, &r);
191 status = cli_do_rpc_ndr(cli,
197 if (!NT_STATUS_IS_OK(status)) {
201 if (DEBUGLEVEL >= 10) {
202 NDR_PRINT_OUT_DEBUG(lsa_SetSecObj, &r);
205 if (NT_STATUS_IS_ERR(status)) {
209 /* Return variables */
215 NTSTATUS rpccli_lsa_ChangePassword(struct rpc_pipe_client *cli,
218 struct lsa_ChangePassword r;
223 if (DEBUGLEVEL >= 10) {
224 NDR_PRINT_IN_DEBUG(lsa_ChangePassword, &r);
227 status = cli_do_rpc_ndr(cli,
230 NDR_LSA_CHANGEPASSWORD,
233 if (!NT_STATUS_IS_OK(status)) {
237 if (DEBUGLEVEL >= 10) {
238 NDR_PRINT_OUT_DEBUG(lsa_ChangePassword, &r);
241 if (NT_STATUS_IS_ERR(status)) {
245 /* Return variables */
251 NTSTATUS rpccli_lsa_OpenPolicy(struct rpc_pipe_client *cli,
253 uint16_t *system_name /* [in] [unique] */,
254 struct lsa_ObjectAttribute *attr /* [in] [ref] */,
255 uint32_t access_mask /* [in] */,
256 struct policy_handle *handle /* [out] [ref] */)
258 struct lsa_OpenPolicy r;
262 r.in.system_name = system_name;
264 r.in.access_mask = access_mask;
266 if (DEBUGLEVEL >= 10) {
267 NDR_PRINT_IN_DEBUG(lsa_OpenPolicy, &r);
270 status = cli_do_rpc_ndr(cli,
276 if (!NT_STATUS_IS_OK(status)) {
280 if (DEBUGLEVEL >= 10) {
281 NDR_PRINT_OUT_DEBUG(lsa_OpenPolicy, &r);
284 if (NT_STATUS_IS_ERR(status)) {
288 /* Return variables */
289 *handle = *r.out.handle;
295 NTSTATUS rpccli_lsa_QueryInfoPolicy(struct rpc_pipe_client *cli,
297 struct policy_handle *handle /* [in] [ref] */,
298 enum lsa_PolicyInfo level /* [in] */,
299 union lsa_PolicyInformation **info /* [out] [ref,switch_is(level)] */)
301 struct lsa_QueryInfoPolicy r;
305 r.in.handle = handle;
308 if (DEBUGLEVEL >= 10) {
309 NDR_PRINT_IN_DEBUG(lsa_QueryInfoPolicy, &r);
312 status = cli_do_rpc_ndr(cli,
315 NDR_LSA_QUERYINFOPOLICY,
318 if (!NT_STATUS_IS_OK(status)) {
322 if (DEBUGLEVEL >= 10) {
323 NDR_PRINT_OUT_DEBUG(lsa_QueryInfoPolicy, &r);
326 if (NT_STATUS_IS_ERR(status)) {
330 /* Return variables */
337 NTSTATUS rpccli_lsa_SetInfoPolicy(struct rpc_pipe_client *cli,
339 struct policy_handle *handle /* [in] [ref] */,
340 enum lsa_PolicyInfo level /* [in] */,
341 union lsa_PolicyInformation *info /* [in] [ref,switch_is(level)] */)
343 struct lsa_SetInfoPolicy r;
347 r.in.handle = handle;
351 if (DEBUGLEVEL >= 10) {
352 NDR_PRINT_IN_DEBUG(lsa_SetInfoPolicy, &r);
355 status = cli_do_rpc_ndr(cli,
358 NDR_LSA_SETINFOPOLICY,
361 if (!NT_STATUS_IS_OK(status)) {
365 if (DEBUGLEVEL >= 10) {
366 NDR_PRINT_OUT_DEBUG(lsa_SetInfoPolicy, &r);
369 if (NT_STATUS_IS_ERR(status)) {
373 /* Return variables */
379 NTSTATUS rpccli_lsa_ClearAuditLog(struct rpc_pipe_client *cli,
382 struct lsa_ClearAuditLog r;
387 if (DEBUGLEVEL >= 10) {
388 NDR_PRINT_IN_DEBUG(lsa_ClearAuditLog, &r);
391 status = cli_do_rpc_ndr(cli,
394 NDR_LSA_CLEARAUDITLOG,
397 if (!NT_STATUS_IS_OK(status)) {
401 if (DEBUGLEVEL >= 10) {
402 NDR_PRINT_OUT_DEBUG(lsa_ClearAuditLog, &r);
405 if (NT_STATUS_IS_ERR(status)) {
409 /* Return variables */
415 NTSTATUS rpccli_lsa_CreateAccount(struct rpc_pipe_client *cli,
417 struct policy_handle *handle /* [in] [ref] */,
418 struct dom_sid2 *sid /* [in] [ref] */,
419 uint32_t access_mask /* [in] */,
420 struct policy_handle *acct_handle /* [out] [ref] */)
422 struct lsa_CreateAccount r;
426 r.in.handle = handle;
428 r.in.access_mask = access_mask;
430 if (DEBUGLEVEL >= 10) {
431 NDR_PRINT_IN_DEBUG(lsa_CreateAccount, &r);
434 status = cli_do_rpc_ndr(cli,
437 NDR_LSA_CREATEACCOUNT,
440 if (!NT_STATUS_IS_OK(status)) {
444 if (DEBUGLEVEL >= 10) {
445 NDR_PRINT_OUT_DEBUG(lsa_CreateAccount, &r);
448 if (NT_STATUS_IS_ERR(status)) {
452 /* Return variables */
453 *acct_handle = *r.out.acct_handle;
459 NTSTATUS rpccli_lsa_EnumAccounts(struct rpc_pipe_client *cli,
461 struct policy_handle *handle /* [in] [ref] */,
462 uint32_t *resume_handle /* [in,out] [ref] */,
463 struct lsa_SidArray *sids /* [out] [ref] */,
464 uint32_t num_entries /* [in] [range(0,8192)] */)
466 struct lsa_EnumAccounts r;
470 r.in.handle = handle;
471 r.in.resume_handle = resume_handle;
472 r.in.num_entries = num_entries;
474 if (DEBUGLEVEL >= 10) {
475 NDR_PRINT_IN_DEBUG(lsa_EnumAccounts, &r);
478 status = cli_do_rpc_ndr(cli,
481 NDR_LSA_ENUMACCOUNTS,
484 if (!NT_STATUS_IS_OK(status)) {
488 if (DEBUGLEVEL >= 10) {
489 NDR_PRINT_OUT_DEBUG(lsa_EnumAccounts, &r);
492 if (NT_STATUS_IS_ERR(status)) {
496 /* Return variables */
497 *resume_handle = *r.out.resume_handle;
504 NTSTATUS rpccli_lsa_CreateTrustedDomain(struct rpc_pipe_client *cli,
506 struct policy_handle *handle /* [in] [ref] */,
507 struct lsa_DomainInfo *info /* [in] [ref] */,
508 uint32_t access_mask /* [in] */,
509 struct policy_handle *trustdom_handle /* [out] [ref] */)
511 struct lsa_CreateTrustedDomain r;
515 r.in.handle = handle;
517 r.in.access_mask = access_mask;
519 if (DEBUGLEVEL >= 10) {
520 NDR_PRINT_IN_DEBUG(lsa_CreateTrustedDomain, &r);
523 status = cli_do_rpc_ndr(cli,
526 NDR_LSA_CREATETRUSTEDDOMAIN,
529 if (!NT_STATUS_IS_OK(status)) {
533 if (DEBUGLEVEL >= 10) {
534 NDR_PRINT_OUT_DEBUG(lsa_CreateTrustedDomain, &r);
537 if (NT_STATUS_IS_ERR(status)) {
541 /* Return variables */
542 *trustdom_handle = *r.out.trustdom_handle;
548 NTSTATUS rpccli_lsa_EnumTrustDom(struct rpc_pipe_client *cli,
550 struct policy_handle *handle /* [in] [ref] */,
551 uint32_t *resume_handle /* [in,out] [ref] */,
552 struct lsa_DomainList *domains /* [out] [ref] */,
553 uint32_t max_size /* [in] */)
555 struct lsa_EnumTrustDom r;
559 r.in.handle = handle;
560 r.in.resume_handle = resume_handle;
561 r.in.max_size = max_size;
563 if (DEBUGLEVEL >= 10) {
564 NDR_PRINT_IN_DEBUG(lsa_EnumTrustDom, &r);
567 status = cli_do_rpc_ndr(cli,
570 NDR_LSA_ENUMTRUSTDOM,
573 if (!NT_STATUS_IS_OK(status)) {
577 if (DEBUGLEVEL >= 10) {
578 NDR_PRINT_OUT_DEBUG(lsa_EnumTrustDom, &r);
581 if (NT_STATUS_IS_ERR(status)) {
585 /* Return variables */
586 *resume_handle = *r.out.resume_handle;
587 *domains = *r.out.domains;
593 NTSTATUS rpccli_lsa_LookupNames(struct rpc_pipe_client *cli,
595 struct policy_handle *handle /* [in] [ref] */,
596 uint32_t num_names /* [in] [range(0,1000)] */,
597 struct lsa_String *names /* [in] [size_is(num_names)] */,
598 struct lsa_RefDomainList **domains /* [out] [ref] */,
599 struct lsa_TransSidArray *sids /* [in,out] [ref] */,
600 enum lsa_LookupNamesLevel level /* [in] */,
601 uint32_t *count /* [in,out] [ref] */)
603 struct lsa_LookupNames r;
607 r.in.handle = handle;
608 r.in.num_names = num_names;
614 if (DEBUGLEVEL >= 10) {
615 NDR_PRINT_IN_DEBUG(lsa_LookupNames, &r);
618 status = cli_do_rpc_ndr(cli,
624 if (!NT_STATUS_IS_OK(status)) {
628 if (DEBUGLEVEL >= 10) {
629 NDR_PRINT_OUT_DEBUG(lsa_LookupNames, &r);
632 if (NT_STATUS_IS_ERR(status)) {
636 /* Return variables */
637 *domains = *r.out.domains;
639 *count = *r.out.count;
645 NTSTATUS rpccli_lsa_LookupSids(struct rpc_pipe_client *cli,
647 struct policy_handle *handle /* [in] [ref] */,
648 struct lsa_SidArray *sids /* [in] [ref] */,
649 struct lsa_RefDomainList **domains /* [out] [ref] */,
650 struct lsa_TransNameArray *names /* [in,out] [ref] */,
651 uint16_t level /* [in] */,
652 uint32_t *count /* [in,out] [ref] */)
654 struct lsa_LookupSids r;
658 r.in.handle = handle;
664 if (DEBUGLEVEL >= 10) {
665 NDR_PRINT_IN_DEBUG(lsa_LookupSids, &r);
668 status = cli_do_rpc_ndr(cli,
674 if (!NT_STATUS_IS_OK(status)) {
678 if (DEBUGLEVEL >= 10) {
679 NDR_PRINT_OUT_DEBUG(lsa_LookupSids, &r);
682 if (NT_STATUS_IS_ERR(status)) {
686 /* Return variables */
687 *domains = *r.out.domains;
688 *names = *r.out.names;
689 *count = *r.out.count;
695 NTSTATUS rpccli_lsa_CreateSecret(struct rpc_pipe_client *cli,
697 struct policy_handle *handle /* [in] [ref] */,
698 struct lsa_String name /* [in] */,
699 uint32_t access_mask /* [in] */,
700 struct policy_handle *sec_handle /* [out] [ref] */)
702 struct lsa_CreateSecret r;
706 r.in.handle = handle;
708 r.in.access_mask = access_mask;
710 if (DEBUGLEVEL >= 10) {
711 NDR_PRINT_IN_DEBUG(lsa_CreateSecret, &r);
714 status = cli_do_rpc_ndr(cli,
717 NDR_LSA_CREATESECRET,
720 if (!NT_STATUS_IS_OK(status)) {
724 if (DEBUGLEVEL >= 10) {
725 NDR_PRINT_OUT_DEBUG(lsa_CreateSecret, &r);
728 if (NT_STATUS_IS_ERR(status)) {
732 /* Return variables */
733 *sec_handle = *r.out.sec_handle;
739 NTSTATUS rpccli_lsa_OpenAccount(struct rpc_pipe_client *cli,
741 struct policy_handle *handle /* [in] [ref] */,
742 struct dom_sid2 *sid /* [in] [ref] */,
743 uint32_t access_mask /* [in] */,
744 struct policy_handle *acct_handle /* [out] [ref] */)
746 struct lsa_OpenAccount r;
750 r.in.handle = handle;
752 r.in.access_mask = access_mask;
754 if (DEBUGLEVEL >= 10) {
755 NDR_PRINT_IN_DEBUG(lsa_OpenAccount, &r);
758 status = cli_do_rpc_ndr(cli,
764 if (!NT_STATUS_IS_OK(status)) {
768 if (DEBUGLEVEL >= 10) {
769 NDR_PRINT_OUT_DEBUG(lsa_OpenAccount, &r);
772 if (NT_STATUS_IS_ERR(status)) {
776 /* Return variables */
777 *acct_handle = *r.out.acct_handle;
783 NTSTATUS rpccli_lsa_EnumPrivsAccount(struct rpc_pipe_client *cli,
785 struct policy_handle *handle /* [in] [ref] */,
786 struct lsa_PrivilegeSet **privs /* [out] [ref] */)
788 struct lsa_EnumPrivsAccount r;
792 r.in.handle = handle;
794 if (DEBUGLEVEL >= 10) {
795 NDR_PRINT_IN_DEBUG(lsa_EnumPrivsAccount, &r);
798 status = cli_do_rpc_ndr(cli,
801 NDR_LSA_ENUMPRIVSACCOUNT,
804 if (!NT_STATUS_IS_OK(status)) {
808 if (DEBUGLEVEL >= 10) {
809 NDR_PRINT_OUT_DEBUG(lsa_EnumPrivsAccount, &r);
812 if (NT_STATUS_IS_ERR(status)) {
816 /* Return variables */
817 *privs = *r.out.privs;
823 NTSTATUS rpccli_lsa_AddPrivilegesToAccount(struct rpc_pipe_client *cli,
825 struct policy_handle *handle /* [in] [ref] */,
826 struct lsa_PrivilegeSet *privs /* [in] [ref] */)
828 struct lsa_AddPrivilegesToAccount r;
832 r.in.handle = handle;
835 if (DEBUGLEVEL >= 10) {
836 NDR_PRINT_IN_DEBUG(lsa_AddPrivilegesToAccount, &r);
839 status = cli_do_rpc_ndr(cli,
842 NDR_LSA_ADDPRIVILEGESTOACCOUNT,
845 if (!NT_STATUS_IS_OK(status)) {
849 if (DEBUGLEVEL >= 10) {
850 NDR_PRINT_OUT_DEBUG(lsa_AddPrivilegesToAccount, &r);
853 if (NT_STATUS_IS_ERR(status)) {
857 /* Return variables */
863 NTSTATUS rpccli_lsa_RemovePrivilegesFromAccount(struct rpc_pipe_client *cli,
865 struct policy_handle *handle /* [in] [ref] */,
866 uint8_t remove_all /* [in] */,
867 struct lsa_PrivilegeSet *privs /* [in] [unique] */)
869 struct lsa_RemovePrivilegesFromAccount r;
873 r.in.handle = handle;
874 r.in.remove_all = remove_all;
877 if (DEBUGLEVEL >= 10) {
878 NDR_PRINT_IN_DEBUG(lsa_RemovePrivilegesFromAccount, &r);
881 status = cli_do_rpc_ndr(cli,
884 NDR_LSA_REMOVEPRIVILEGESFROMACCOUNT,
887 if (!NT_STATUS_IS_OK(status)) {
891 if (DEBUGLEVEL >= 10) {
892 NDR_PRINT_OUT_DEBUG(lsa_RemovePrivilegesFromAccount, &r);
895 if (NT_STATUS_IS_ERR(status)) {
899 /* Return variables */
905 NTSTATUS rpccli_lsa_GetQuotasForAccount(struct rpc_pipe_client *cli,
908 struct lsa_GetQuotasForAccount r;
913 if (DEBUGLEVEL >= 10) {
914 NDR_PRINT_IN_DEBUG(lsa_GetQuotasForAccount, &r);
917 status = cli_do_rpc_ndr(cli,
920 NDR_LSA_GETQUOTASFORACCOUNT,
923 if (!NT_STATUS_IS_OK(status)) {
927 if (DEBUGLEVEL >= 10) {
928 NDR_PRINT_OUT_DEBUG(lsa_GetQuotasForAccount, &r);
931 if (NT_STATUS_IS_ERR(status)) {
935 /* Return variables */
941 NTSTATUS rpccli_lsa_SetQuotasForAccount(struct rpc_pipe_client *cli,
944 struct lsa_SetQuotasForAccount r;
949 if (DEBUGLEVEL >= 10) {
950 NDR_PRINT_IN_DEBUG(lsa_SetQuotasForAccount, &r);
953 status = cli_do_rpc_ndr(cli,
956 NDR_LSA_SETQUOTASFORACCOUNT,
959 if (!NT_STATUS_IS_OK(status)) {
963 if (DEBUGLEVEL >= 10) {
964 NDR_PRINT_OUT_DEBUG(lsa_SetQuotasForAccount, &r);
967 if (NT_STATUS_IS_ERR(status)) {
971 /* Return variables */
977 NTSTATUS rpccli_lsa_GetSystemAccessAccount(struct rpc_pipe_client *cli,
979 struct policy_handle *handle /* [in] [ref] */,
980 uint32_t *access_mask /* [out] [ref] */)
982 struct lsa_GetSystemAccessAccount r;
986 r.in.handle = handle;
988 if (DEBUGLEVEL >= 10) {
989 NDR_PRINT_IN_DEBUG(lsa_GetSystemAccessAccount, &r);
992 status = cli_do_rpc_ndr(cli,
995 NDR_LSA_GETSYSTEMACCESSACCOUNT,
998 if (!NT_STATUS_IS_OK(status)) {
1002 if (DEBUGLEVEL >= 10) {
1003 NDR_PRINT_OUT_DEBUG(lsa_GetSystemAccessAccount, &r);
1006 if (NT_STATUS_IS_ERR(status)) {
1010 /* Return variables */
1011 *access_mask = *r.out.access_mask;
1014 return r.out.result;
1017 NTSTATUS rpccli_lsa_SetSystemAccessAccount(struct rpc_pipe_client *cli,
1018 TALLOC_CTX *mem_ctx,
1019 struct policy_handle *handle /* [in] [ref] */,
1020 uint32_t access_mask /* [in] */)
1022 struct lsa_SetSystemAccessAccount r;
1026 r.in.handle = handle;
1027 r.in.access_mask = access_mask;
1029 if (DEBUGLEVEL >= 10) {
1030 NDR_PRINT_IN_DEBUG(lsa_SetSystemAccessAccount, &r);
1033 status = cli_do_rpc_ndr(cli,
1036 NDR_LSA_SETSYSTEMACCESSACCOUNT,
1039 if (!NT_STATUS_IS_OK(status)) {
1043 if (DEBUGLEVEL >= 10) {
1044 NDR_PRINT_OUT_DEBUG(lsa_SetSystemAccessAccount, &r);
1047 if (NT_STATUS_IS_ERR(status)) {
1051 /* Return variables */
1054 return r.out.result;
1057 NTSTATUS rpccli_lsa_OpenTrustedDomain(struct rpc_pipe_client *cli,
1058 TALLOC_CTX *mem_ctx,
1059 struct policy_handle *handle /* [in] [ref] */,
1060 struct dom_sid2 *sid /* [in] [ref] */,
1061 uint32_t access_mask /* [in] */,
1062 struct policy_handle *trustdom_handle /* [out] [ref] */)
1064 struct lsa_OpenTrustedDomain r;
1068 r.in.handle = handle;
1070 r.in.access_mask = access_mask;
1072 if (DEBUGLEVEL >= 10) {
1073 NDR_PRINT_IN_DEBUG(lsa_OpenTrustedDomain, &r);
1076 status = cli_do_rpc_ndr(cli,
1079 NDR_LSA_OPENTRUSTEDDOMAIN,
1082 if (!NT_STATUS_IS_OK(status)) {
1086 if (DEBUGLEVEL >= 10) {
1087 NDR_PRINT_OUT_DEBUG(lsa_OpenTrustedDomain, &r);
1090 if (NT_STATUS_IS_ERR(status)) {
1094 /* Return variables */
1095 *trustdom_handle = *r.out.trustdom_handle;
1098 return r.out.result;
1101 NTSTATUS rpccli_lsa_QueryTrustedDomainInfo(struct rpc_pipe_client *cli,
1102 TALLOC_CTX *mem_ctx,
1103 struct policy_handle *trustdom_handle /* [in] [ref] */,
1104 enum lsa_TrustDomInfoEnum level /* [in] */,
1105 union lsa_TrustedDomainInfo **info /* [out] [ref,switch_is(level)] */)
1107 struct lsa_QueryTrustedDomainInfo r;
1111 r.in.trustdom_handle = trustdom_handle;
1114 if (DEBUGLEVEL >= 10) {
1115 NDR_PRINT_IN_DEBUG(lsa_QueryTrustedDomainInfo, &r);
1118 status = cli_do_rpc_ndr(cli,
1121 NDR_LSA_QUERYTRUSTEDDOMAININFO,
1124 if (!NT_STATUS_IS_OK(status)) {
1128 if (DEBUGLEVEL >= 10) {
1129 NDR_PRINT_OUT_DEBUG(lsa_QueryTrustedDomainInfo, &r);
1132 if (NT_STATUS_IS_ERR(status)) {
1136 /* Return variables */
1137 *info = *r.out.info;
1140 return r.out.result;
1143 NTSTATUS rpccli_lsa_SetInformationTrustedDomain(struct rpc_pipe_client *cli,
1144 TALLOC_CTX *mem_ctx)
1146 struct lsa_SetInformationTrustedDomain r;
1151 if (DEBUGLEVEL >= 10) {
1152 NDR_PRINT_IN_DEBUG(lsa_SetInformationTrustedDomain, &r);
1155 status = cli_do_rpc_ndr(cli,
1158 NDR_LSA_SETINFORMATIONTRUSTEDDOMAIN,
1161 if (!NT_STATUS_IS_OK(status)) {
1165 if (DEBUGLEVEL >= 10) {
1166 NDR_PRINT_OUT_DEBUG(lsa_SetInformationTrustedDomain, &r);
1169 if (NT_STATUS_IS_ERR(status)) {
1173 /* Return variables */
1176 return r.out.result;
1179 NTSTATUS rpccli_lsa_OpenSecret(struct rpc_pipe_client *cli,
1180 TALLOC_CTX *mem_ctx,
1181 struct policy_handle *handle /* [in] [ref] */,
1182 struct lsa_String name /* [in] */,
1183 uint32_t access_mask /* [in] */,
1184 struct policy_handle *sec_handle /* [out] [ref] */)
1186 struct lsa_OpenSecret r;
1190 r.in.handle = handle;
1192 r.in.access_mask = access_mask;
1194 if (DEBUGLEVEL >= 10) {
1195 NDR_PRINT_IN_DEBUG(lsa_OpenSecret, &r);
1198 status = cli_do_rpc_ndr(cli,
1204 if (!NT_STATUS_IS_OK(status)) {
1208 if (DEBUGLEVEL >= 10) {
1209 NDR_PRINT_OUT_DEBUG(lsa_OpenSecret, &r);
1212 if (NT_STATUS_IS_ERR(status)) {
1216 /* Return variables */
1217 *sec_handle = *r.out.sec_handle;
1220 return r.out.result;
1223 NTSTATUS rpccli_lsa_SetSecret(struct rpc_pipe_client *cli,
1224 TALLOC_CTX *mem_ctx,
1225 struct policy_handle *sec_handle /* [in] [ref] */,
1226 struct lsa_DATA_BUF *new_val /* [in] [unique] */,
1227 struct lsa_DATA_BUF *old_val /* [in] [unique] */)
1229 struct lsa_SetSecret r;
1233 r.in.sec_handle = sec_handle;
1234 r.in.new_val = new_val;
1235 r.in.old_val = old_val;
1237 if (DEBUGLEVEL >= 10) {
1238 NDR_PRINT_IN_DEBUG(lsa_SetSecret, &r);
1241 status = cli_do_rpc_ndr(cli,
1247 if (!NT_STATUS_IS_OK(status)) {
1251 if (DEBUGLEVEL >= 10) {
1252 NDR_PRINT_OUT_DEBUG(lsa_SetSecret, &r);
1255 if (NT_STATUS_IS_ERR(status)) {
1259 /* Return variables */
1262 return r.out.result;
1265 NTSTATUS rpccli_lsa_QuerySecret(struct rpc_pipe_client *cli,
1266 TALLOC_CTX *mem_ctx,
1267 struct policy_handle *sec_handle /* [in] [ref] */,
1268 struct lsa_DATA_BUF_PTR *new_val /* [in,out] [unique] */,
1269 NTTIME *new_mtime /* [in,out] [unique] */,
1270 struct lsa_DATA_BUF_PTR *old_val /* [in,out] [unique] */,
1271 NTTIME *old_mtime /* [in,out] [unique] */)
1273 struct lsa_QuerySecret r;
1277 r.in.sec_handle = sec_handle;
1278 r.in.new_val = new_val;
1279 r.in.new_mtime = new_mtime;
1280 r.in.old_val = old_val;
1281 r.in.old_mtime = old_mtime;
1283 if (DEBUGLEVEL >= 10) {
1284 NDR_PRINT_IN_DEBUG(lsa_QuerySecret, &r);
1287 status = cli_do_rpc_ndr(cli,
1290 NDR_LSA_QUERYSECRET,
1293 if (!NT_STATUS_IS_OK(status)) {
1297 if (DEBUGLEVEL >= 10) {
1298 NDR_PRINT_OUT_DEBUG(lsa_QuerySecret, &r);
1301 if (NT_STATUS_IS_ERR(status)) {
1305 /* Return variables */
1306 if (new_val && r.out.new_val) {
1307 *new_val = *r.out.new_val;
1309 if (new_mtime && r.out.new_mtime) {
1310 *new_mtime = *r.out.new_mtime;
1312 if (old_val && r.out.old_val) {
1313 *old_val = *r.out.old_val;
1315 if (old_mtime && r.out.old_mtime) {
1316 *old_mtime = *r.out.old_mtime;
1320 return r.out.result;
1323 NTSTATUS rpccli_lsa_LookupPrivValue(struct rpc_pipe_client *cli,
1324 TALLOC_CTX *mem_ctx,
1325 struct policy_handle *handle /* [in] [ref] */,
1326 struct lsa_String *name /* [in] [ref] */,
1327 struct lsa_LUID *luid /* [out] [ref] */)
1329 struct lsa_LookupPrivValue r;
1333 r.in.handle = handle;
1336 if (DEBUGLEVEL >= 10) {
1337 NDR_PRINT_IN_DEBUG(lsa_LookupPrivValue, &r);
1340 status = cli_do_rpc_ndr(cli,
1343 NDR_LSA_LOOKUPPRIVVALUE,
1346 if (!NT_STATUS_IS_OK(status)) {
1350 if (DEBUGLEVEL >= 10) {
1351 NDR_PRINT_OUT_DEBUG(lsa_LookupPrivValue, &r);
1354 if (NT_STATUS_IS_ERR(status)) {
1358 /* Return variables */
1359 *luid = *r.out.luid;
1362 return r.out.result;
1365 NTSTATUS rpccli_lsa_LookupPrivName(struct rpc_pipe_client *cli,
1366 TALLOC_CTX *mem_ctx,
1367 struct policy_handle *handle /* [in] [ref] */,
1368 struct lsa_LUID *luid /* [in] [ref] */,
1369 struct lsa_StringLarge **name /* [out] [ref] */)
1371 struct lsa_LookupPrivName r;
1375 r.in.handle = handle;
1378 if (DEBUGLEVEL >= 10) {
1379 NDR_PRINT_IN_DEBUG(lsa_LookupPrivName, &r);
1382 status = cli_do_rpc_ndr(cli,
1385 NDR_LSA_LOOKUPPRIVNAME,
1388 if (!NT_STATUS_IS_OK(status)) {
1392 if (DEBUGLEVEL >= 10) {
1393 NDR_PRINT_OUT_DEBUG(lsa_LookupPrivName, &r);
1396 if (NT_STATUS_IS_ERR(status)) {
1400 /* Return variables */
1401 *name = *r.out.name;
1404 return r.out.result;
1407 NTSTATUS rpccli_lsa_LookupPrivDisplayName(struct rpc_pipe_client *cli,
1408 TALLOC_CTX *mem_ctx,
1409 struct policy_handle *handle /* [in] [ref] */,
1410 struct lsa_String *name /* [in] [ref] */,
1411 uint16_t language_id /* [in] */,
1412 uint16_t language_id_sys /* [in] */,
1413 struct lsa_StringLarge **disp_name /* [out] [ref] */,
1414 uint16_t *returned_language_id /* [out] [ref] */)
1416 struct lsa_LookupPrivDisplayName r;
1420 r.in.handle = handle;
1422 r.in.language_id = language_id;
1423 r.in.language_id_sys = language_id_sys;
1425 if (DEBUGLEVEL >= 10) {
1426 NDR_PRINT_IN_DEBUG(lsa_LookupPrivDisplayName, &r);
1429 status = cli_do_rpc_ndr(cli,
1432 NDR_LSA_LOOKUPPRIVDISPLAYNAME,
1435 if (!NT_STATUS_IS_OK(status)) {
1439 if (DEBUGLEVEL >= 10) {
1440 NDR_PRINT_OUT_DEBUG(lsa_LookupPrivDisplayName, &r);
1443 if (NT_STATUS_IS_ERR(status)) {
1447 /* Return variables */
1448 *disp_name = *r.out.disp_name;
1449 *returned_language_id = *r.out.returned_language_id;
1452 return r.out.result;
1455 NTSTATUS rpccli_lsa_DeleteObject(struct rpc_pipe_client *cli,
1456 TALLOC_CTX *mem_ctx,
1457 struct policy_handle *handle /* [in,out] [ref] */)
1459 struct lsa_DeleteObject r;
1463 r.in.handle = handle;
1465 if (DEBUGLEVEL >= 10) {
1466 NDR_PRINT_IN_DEBUG(lsa_DeleteObject, &r);
1469 status = cli_do_rpc_ndr(cli,
1472 NDR_LSA_DELETEOBJECT,
1475 if (!NT_STATUS_IS_OK(status)) {
1479 if (DEBUGLEVEL >= 10) {
1480 NDR_PRINT_OUT_DEBUG(lsa_DeleteObject, &r);
1483 if (NT_STATUS_IS_ERR(status)) {
1487 /* Return variables */
1488 *handle = *r.out.handle;
1491 return r.out.result;
1494 NTSTATUS rpccli_lsa_EnumAccountsWithUserRight(struct rpc_pipe_client *cli,
1495 TALLOC_CTX *mem_ctx,
1496 struct policy_handle *handle /* [in] [ref] */,
1497 struct lsa_String *name /* [in] [unique] */,
1498 struct lsa_SidArray *sids /* [out] [ref] */)
1500 struct lsa_EnumAccountsWithUserRight r;
1504 r.in.handle = handle;
1507 if (DEBUGLEVEL >= 10) {
1508 NDR_PRINT_IN_DEBUG(lsa_EnumAccountsWithUserRight, &r);
1511 status = cli_do_rpc_ndr(cli,
1514 NDR_LSA_ENUMACCOUNTSWITHUSERRIGHT,
1517 if (!NT_STATUS_IS_OK(status)) {
1521 if (DEBUGLEVEL >= 10) {
1522 NDR_PRINT_OUT_DEBUG(lsa_EnumAccountsWithUserRight, &r);
1525 if (NT_STATUS_IS_ERR(status)) {
1529 /* Return variables */
1530 *sids = *r.out.sids;
1533 return r.out.result;
1536 NTSTATUS rpccli_lsa_EnumAccountRights(struct rpc_pipe_client *cli,
1537 TALLOC_CTX *mem_ctx,
1538 struct policy_handle *handle /* [in] [ref] */,
1539 struct dom_sid2 *sid /* [in] [ref] */,
1540 struct lsa_RightSet *rights /* [out] [ref] */)
1542 struct lsa_EnumAccountRights r;
1546 r.in.handle = handle;
1549 if (DEBUGLEVEL >= 10) {
1550 NDR_PRINT_IN_DEBUG(lsa_EnumAccountRights, &r);
1553 status = cli_do_rpc_ndr(cli,
1556 NDR_LSA_ENUMACCOUNTRIGHTS,
1559 if (!NT_STATUS_IS_OK(status)) {
1563 if (DEBUGLEVEL >= 10) {
1564 NDR_PRINT_OUT_DEBUG(lsa_EnumAccountRights, &r);
1567 if (NT_STATUS_IS_ERR(status)) {
1571 /* Return variables */
1572 *rights = *r.out.rights;
1575 return r.out.result;
1578 NTSTATUS rpccli_lsa_AddAccountRights(struct rpc_pipe_client *cli,
1579 TALLOC_CTX *mem_ctx,
1580 struct policy_handle *handle /* [in] [ref] */,
1581 struct dom_sid2 *sid /* [in] [ref] */,
1582 struct lsa_RightSet *rights /* [in] [ref] */)
1584 struct lsa_AddAccountRights r;
1588 r.in.handle = handle;
1590 r.in.rights = rights;
1592 if (DEBUGLEVEL >= 10) {
1593 NDR_PRINT_IN_DEBUG(lsa_AddAccountRights, &r);
1596 status = cli_do_rpc_ndr(cli,
1599 NDR_LSA_ADDACCOUNTRIGHTS,
1602 if (!NT_STATUS_IS_OK(status)) {
1606 if (DEBUGLEVEL >= 10) {
1607 NDR_PRINT_OUT_DEBUG(lsa_AddAccountRights, &r);
1610 if (NT_STATUS_IS_ERR(status)) {
1614 /* Return variables */
1617 return r.out.result;
1620 NTSTATUS rpccli_lsa_RemoveAccountRights(struct rpc_pipe_client *cli,
1621 TALLOC_CTX *mem_ctx,
1622 struct policy_handle *handle /* [in] [ref] */,
1623 struct dom_sid2 *sid /* [in] [ref] */,
1624 uint8_t remove_all /* [in] */,
1625 struct lsa_RightSet *rights /* [in] [ref] */)
1627 struct lsa_RemoveAccountRights r;
1631 r.in.handle = handle;
1633 r.in.remove_all = remove_all;
1634 r.in.rights = rights;
1636 if (DEBUGLEVEL >= 10) {
1637 NDR_PRINT_IN_DEBUG(lsa_RemoveAccountRights, &r);
1640 status = cli_do_rpc_ndr(cli,
1643 NDR_LSA_REMOVEACCOUNTRIGHTS,
1646 if (!NT_STATUS_IS_OK(status)) {
1650 if (DEBUGLEVEL >= 10) {
1651 NDR_PRINT_OUT_DEBUG(lsa_RemoveAccountRights, &r);
1654 if (NT_STATUS_IS_ERR(status)) {
1658 /* Return variables */
1661 return r.out.result;
1664 NTSTATUS rpccli_lsa_QueryTrustedDomainInfoBySid(struct rpc_pipe_client *cli,
1665 TALLOC_CTX *mem_ctx,
1666 struct policy_handle *handle /* [in] [ref] */,
1667 struct dom_sid2 *dom_sid /* [in] [ref] */,
1668 enum lsa_TrustDomInfoEnum level /* [in] */,
1669 union lsa_TrustedDomainInfo **info /* [out] [ref,switch_is(level)] */)
1671 struct lsa_QueryTrustedDomainInfoBySid r;
1675 r.in.handle = handle;
1676 r.in.dom_sid = dom_sid;
1679 if (DEBUGLEVEL >= 10) {
1680 NDR_PRINT_IN_DEBUG(lsa_QueryTrustedDomainInfoBySid, &r);
1683 status = cli_do_rpc_ndr(cli,
1686 NDR_LSA_QUERYTRUSTEDDOMAININFOBYSID,
1689 if (!NT_STATUS_IS_OK(status)) {
1693 if (DEBUGLEVEL >= 10) {
1694 NDR_PRINT_OUT_DEBUG(lsa_QueryTrustedDomainInfoBySid, &r);
1697 if (NT_STATUS_IS_ERR(status)) {
1701 /* Return variables */
1702 *info = *r.out.info;
1705 return r.out.result;
1708 NTSTATUS rpccli_lsa_SetTrustedDomainInfo(struct rpc_pipe_client *cli,
1709 TALLOC_CTX *mem_ctx)
1711 struct lsa_SetTrustedDomainInfo r;
1716 if (DEBUGLEVEL >= 10) {
1717 NDR_PRINT_IN_DEBUG(lsa_SetTrustedDomainInfo, &r);
1720 status = cli_do_rpc_ndr(cli,
1723 NDR_LSA_SETTRUSTEDDOMAININFO,
1726 if (!NT_STATUS_IS_OK(status)) {
1730 if (DEBUGLEVEL >= 10) {
1731 NDR_PRINT_OUT_DEBUG(lsa_SetTrustedDomainInfo, &r);
1734 if (NT_STATUS_IS_ERR(status)) {
1738 /* Return variables */
1741 return r.out.result;
1744 NTSTATUS rpccli_lsa_DeleteTrustedDomain(struct rpc_pipe_client *cli,
1745 TALLOC_CTX *mem_ctx,
1746 struct policy_handle *handle /* [in] [ref] */,
1747 struct dom_sid2 *dom_sid /* [in] [ref] */)
1749 struct lsa_DeleteTrustedDomain r;
1753 r.in.handle = handle;
1754 r.in.dom_sid = dom_sid;
1756 if (DEBUGLEVEL >= 10) {
1757 NDR_PRINT_IN_DEBUG(lsa_DeleteTrustedDomain, &r);
1760 status = cli_do_rpc_ndr(cli,
1763 NDR_LSA_DELETETRUSTEDDOMAIN,
1766 if (!NT_STATUS_IS_OK(status)) {
1770 if (DEBUGLEVEL >= 10) {
1771 NDR_PRINT_OUT_DEBUG(lsa_DeleteTrustedDomain, &r);
1774 if (NT_STATUS_IS_ERR(status)) {
1778 /* Return variables */
1781 return r.out.result;
1784 NTSTATUS rpccli_lsa_StorePrivateData(struct rpc_pipe_client *cli,
1785 TALLOC_CTX *mem_ctx)
1787 struct lsa_StorePrivateData r;
1792 if (DEBUGLEVEL >= 10) {
1793 NDR_PRINT_IN_DEBUG(lsa_StorePrivateData, &r);
1796 status = cli_do_rpc_ndr(cli,
1799 NDR_LSA_STOREPRIVATEDATA,
1802 if (!NT_STATUS_IS_OK(status)) {
1806 if (DEBUGLEVEL >= 10) {
1807 NDR_PRINT_OUT_DEBUG(lsa_StorePrivateData, &r);
1810 if (NT_STATUS_IS_ERR(status)) {
1814 /* Return variables */
1817 return r.out.result;
1820 NTSTATUS rpccli_lsa_RetrievePrivateData(struct rpc_pipe_client *cli,
1821 TALLOC_CTX *mem_ctx)
1823 struct lsa_RetrievePrivateData r;
1828 if (DEBUGLEVEL >= 10) {
1829 NDR_PRINT_IN_DEBUG(lsa_RetrievePrivateData, &r);
1832 status = cli_do_rpc_ndr(cli,
1835 NDR_LSA_RETRIEVEPRIVATEDATA,
1838 if (!NT_STATUS_IS_OK(status)) {
1842 if (DEBUGLEVEL >= 10) {
1843 NDR_PRINT_OUT_DEBUG(lsa_RetrievePrivateData, &r);
1846 if (NT_STATUS_IS_ERR(status)) {
1850 /* Return variables */
1853 return r.out.result;
1856 NTSTATUS rpccli_lsa_OpenPolicy2(struct rpc_pipe_client *cli,
1857 TALLOC_CTX *mem_ctx,
1858 const char *system_name /* [in] [unique,charset(UTF16)] */,
1859 struct lsa_ObjectAttribute *attr /* [in] [ref] */,
1860 uint32_t access_mask /* [in] */,
1861 struct policy_handle *handle /* [out] [ref] */)
1863 struct lsa_OpenPolicy2 r;
1867 r.in.system_name = system_name;
1869 r.in.access_mask = access_mask;
1871 if (DEBUGLEVEL >= 10) {
1872 NDR_PRINT_IN_DEBUG(lsa_OpenPolicy2, &r);
1875 status = cli_do_rpc_ndr(cli,
1878 NDR_LSA_OPENPOLICY2,
1881 if (!NT_STATUS_IS_OK(status)) {
1885 if (DEBUGLEVEL >= 10) {
1886 NDR_PRINT_OUT_DEBUG(lsa_OpenPolicy2, &r);
1889 if (NT_STATUS_IS_ERR(status)) {
1893 /* Return variables */
1894 *handle = *r.out.handle;
1897 return r.out.result;
1900 NTSTATUS rpccli_lsa_GetUserName(struct rpc_pipe_client *cli,
1901 TALLOC_CTX *mem_ctx,
1902 const char *system_name /* [in] [unique,charset(UTF16)] */,
1903 struct lsa_String **account_name /* [in,out] [ref] */,
1904 struct lsa_String **authority_name /* [in,out] [unique] */)
1906 struct lsa_GetUserName r;
1910 r.in.system_name = system_name;
1911 r.in.account_name = account_name;
1912 r.in.authority_name = authority_name;
1914 if (DEBUGLEVEL >= 10) {
1915 NDR_PRINT_IN_DEBUG(lsa_GetUserName, &r);
1918 status = cli_do_rpc_ndr(cli,
1921 NDR_LSA_GETUSERNAME,
1924 if (!NT_STATUS_IS_OK(status)) {
1928 if (DEBUGLEVEL >= 10) {
1929 NDR_PRINT_OUT_DEBUG(lsa_GetUserName, &r);
1932 if (NT_STATUS_IS_ERR(status)) {
1936 /* Return variables */
1937 *account_name = *r.out.account_name;
1938 if (authority_name && r.out.authority_name) {
1939 *authority_name = *r.out.authority_name;
1943 return r.out.result;
1946 NTSTATUS rpccli_lsa_QueryInfoPolicy2(struct rpc_pipe_client *cli,
1947 TALLOC_CTX *mem_ctx,
1948 struct policy_handle *handle /* [in] [ref] */,
1949 enum lsa_PolicyInfo level /* [in] */,
1950 union lsa_PolicyInformation **info /* [out] [ref,switch_is(level)] */)
1952 struct lsa_QueryInfoPolicy2 r;
1956 r.in.handle = handle;
1959 if (DEBUGLEVEL >= 10) {
1960 NDR_PRINT_IN_DEBUG(lsa_QueryInfoPolicy2, &r);
1963 status = cli_do_rpc_ndr(cli,
1966 NDR_LSA_QUERYINFOPOLICY2,
1969 if (!NT_STATUS_IS_OK(status)) {
1973 if (DEBUGLEVEL >= 10) {
1974 NDR_PRINT_OUT_DEBUG(lsa_QueryInfoPolicy2, &r);
1977 if (NT_STATUS_IS_ERR(status)) {
1981 /* Return variables */
1982 *info = *r.out.info;
1985 return r.out.result;
1988 NTSTATUS rpccli_lsa_SetInfoPolicy2(struct rpc_pipe_client *cli,
1989 TALLOC_CTX *mem_ctx,
1990 struct policy_handle *handle /* [in] [ref] */,
1991 enum lsa_PolicyInfo level /* [in] */,
1992 union lsa_PolicyInformation *info /* [in] [ref,switch_is(level)] */)
1994 struct lsa_SetInfoPolicy2 r;
1998 r.in.handle = handle;
2002 if (DEBUGLEVEL >= 10) {
2003 NDR_PRINT_IN_DEBUG(lsa_SetInfoPolicy2, &r);
2006 status = cli_do_rpc_ndr(cli,
2009 NDR_LSA_SETINFOPOLICY2,
2012 if (!NT_STATUS_IS_OK(status)) {
2016 if (DEBUGLEVEL >= 10) {
2017 NDR_PRINT_OUT_DEBUG(lsa_SetInfoPolicy2, &r);
2020 if (NT_STATUS_IS_ERR(status)) {
2024 /* Return variables */
2027 return r.out.result;
2030 NTSTATUS rpccli_lsa_QueryTrustedDomainInfoByName(struct rpc_pipe_client *cli,
2031 TALLOC_CTX *mem_ctx,
2032 struct policy_handle *handle /* [in] [ref] */,
2033 struct lsa_String *trusted_domain /* [in] [ref] */,
2034 enum lsa_TrustDomInfoEnum level /* [in] */,
2035 union lsa_TrustedDomainInfo **info /* [out] [ref,switch_is(level)] */)
2037 struct lsa_QueryTrustedDomainInfoByName r;
2041 r.in.handle = handle;
2042 r.in.trusted_domain = trusted_domain;
2045 if (DEBUGLEVEL >= 10) {
2046 NDR_PRINT_IN_DEBUG(lsa_QueryTrustedDomainInfoByName, &r);
2049 status = cli_do_rpc_ndr(cli,
2052 NDR_LSA_QUERYTRUSTEDDOMAININFOBYNAME,
2055 if (!NT_STATUS_IS_OK(status)) {
2059 if (DEBUGLEVEL >= 10) {
2060 NDR_PRINT_OUT_DEBUG(lsa_QueryTrustedDomainInfoByName, &r);
2063 if (NT_STATUS_IS_ERR(status)) {
2067 /* Return variables */
2068 *info = *r.out.info;
2071 return r.out.result;
2074 NTSTATUS rpccli_lsa_SetTrustedDomainInfoByName(struct rpc_pipe_client *cli,
2075 TALLOC_CTX *mem_ctx,
2076 struct policy_handle *handle /* [in] [ref] */,
2077 struct lsa_String trusted_domain /* [in] */,
2078 enum lsa_TrustDomInfoEnum level /* [in] */,
2079 union lsa_TrustedDomainInfo *info /* [in] [unique,switch_is(level)] */)
2081 struct lsa_SetTrustedDomainInfoByName r;
2085 r.in.handle = handle;
2086 r.in.trusted_domain = trusted_domain;
2090 if (DEBUGLEVEL >= 10) {
2091 NDR_PRINT_IN_DEBUG(lsa_SetTrustedDomainInfoByName, &r);
2094 status = cli_do_rpc_ndr(cli,
2097 NDR_LSA_SETTRUSTEDDOMAININFOBYNAME,
2100 if (!NT_STATUS_IS_OK(status)) {
2104 if (DEBUGLEVEL >= 10) {
2105 NDR_PRINT_OUT_DEBUG(lsa_SetTrustedDomainInfoByName, &r);
2108 if (NT_STATUS_IS_ERR(status)) {
2112 /* Return variables */
2115 return r.out.result;
2118 NTSTATUS rpccli_lsa_EnumTrustedDomainsEx(struct rpc_pipe_client *cli,
2119 TALLOC_CTX *mem_ctx,
2120 struct policy_handle *handle /* [in] [ref] */,
2121 uint32_t *resume_handle /* [in,out] [ref] */,
2122 struct lsa_DomainListEx *domains /* [out] [ref] */,
2123 uint32_t max_size /* [in] */)
2125 struct lsa_EnumTrustedDomainsEx r;
2129 r.in.handle = handle;
2130 r.in.resume_handle = resume_handle;
2131 r.in.max_size = max_size;
2133 if (DEBUGLEVEL >= 10) {
2134 NDR_PRINT_IN_DEBUG(lsa_EnumTrustedDomainsEx, &r);
2137 status = cli_do_rpc_ndr(cli,
2140 NDR_LSA_ENUMTRUSTEDDOMAINSEX,
2143 if (!NT_STATUS_IS_OK(status)) {
2147 if (DEBUGLEVEL >= 10) {
2148 NDR_PRINT_OUT_DEBUG(lsa_EnumTrustedDomainsEx, &r);
2151 if (NT_STATUS_IS_ERR(status)) {
2155 /* Return variables */
2156 *resume_handle = *r.out.resume_handle;
2157 *domains = *r.out.domains;
2160 return r.out.result;
2163 NTSTATUS rpccli_lsa_CreateTrustedDomainEx(struct rpc_pipe_client *cli,
2164 TALLOC_CTX *mem_ctx)
2166 struct lsa_CreateTrustedDomainEx r;
2171 if (DEBUGLEVEL >= 10) {
2172 NDR_PRINT_IN_DEBUG(lsa_CreateTrustedDomainEx, &r);
2175 status = cli_do_rpc_ndr(cli,
2178 NDR_LSA_CREATETRUSTEDDOMAINEX,
2181 if (!NT_STATUS_IS_OK(status)) {
2185 if (DEBUGLEVEL >= 10) {
2186 NDR_PRINT_OUT_DEBUG(lsa_CreateTrustedDomainEx, &r);
2189 if (NT_STATUS_IS_ERR(status)) {
2193 /* Return variables */
2196 return r.out.result;
2199 NTSTATUS rpccli_lsa_CloseTrustedDomainEx(struct rpc_pipe_client *cli,
2200 TALLOC_CTX *mem_ctx,
2201 struct policy_handle *handle /* [in,out] [ref] */)
2203 struct lsa_CloseTrustedDomainEx r;
2207 r.in.handle = handle;
2209 if (DEBUGLEVEL >= 10) {
2210 NDR_PRINT_IN_DEBUG(lsa_CloseTrustedDomainEx, &r);
2213 status = cli_do_rpc_ndr(cli,
2216 NDR_LSA_CLOSETRUSTEDDOMAINEX,
2219 if (!NT_STATUS_IS_OK(status)) {
2223 if (DEBUGLEVEL >= 10) {
2224 NDR_PRINT_OUT_DEBUG(lsa_CloseTrustedDomainEx, &r);
2227 if (NT_STATUS_IS_ERR(status)) {
2231 /* Return variables */
2232 *handle = *r.out.handle;
2235 return r.out.result;
2238 NTSTATUS rpccli_lsa_QueryDomainInformationPolicy(struct rpc_pipe_client *cli,
2239 TALLOC_CTX *mem_ctx,
2240 struct policy_handle *handle /* [in] [ref] */,
2241 uint16_t level /* [in] */,
2242 union lsa_DomainInformationPolicy **info /* [out] [ref,switch_is(level)] */)
2244 struct lsa_QueryDomainInformationPolicy r;
2248 r.in.handle = handle;
2251 if (DEBUGLEVEL >= 10) {
2252 NDR_PRINT_IN_DEBUG(lsa_QueryDomainInformationPolicy, &r);
2255 status = cli_do_rpc_ndr(cli,
2258 NDR_LSA_QUERYDOMAININFORMATIONPOLICY,
2261 if (!NT_STATUS_IS_OK(status)) {
2265 if (DEBUGLEVEL >= 10) {
2266 NDR_PRINT_OUT_DEBUG(lsa_QueryDomainInformationPolicy, &r);
2269 if (NT_STATUS_IS_ERR(status)) {
2273 /* Return variables */
2274 *info = *r.out.info;
2277 return r.out.result;
2280 NTSTATUS rpccli_lsa_SetDomainInformationPolicy(struct rpc_pipe_client *cli,
2281 TALLOC_CTX *mem_ctx,
2282 struct policy_handle *handle /* [in] [ref] */,
2283 uint16_t level /* [in] */,
2284 union lsa_DomainInformationPolicy *info /* [in] [unique,switch_is(level)] */)
2286 struct lsa_SetDomainInformationPolicy r;
2290 r.in.handle = handle;
2294 if (DEBUGLEVEL >= 10) {
2295 NDR_PRINT_IN_DEBUG(lsa_SetDomainInformationPolicy, &r);
2298 status = cli_do_rpc_ndr(cli,
2301 NDR_LSA_SETDOMAININFORMATIONPOLICY,
2304 if (!NT_STATUS_IS_OK(status)) {
2308 if (DEBUGLEVEL >= 10) {
2309 NDR_PRINT_OUT_DEBUG(lsa_SetDomainInformationPolicy, &r);
2312 if (NT_STATUS_IS_ERR(status)) {
2316 /* Return variables */
2319 return r.out.result;
2322 NTSTATUS rpccli_lsa_OpenTrustedDomainByName(struct rpc_pipe_client *cli,
2323 TALLOC_CTX *mem_ctx,
2324 struct policy_handle *handle /* [in] [ref] */,
2325 struct lsa_String name /* [in] */,
2326 uint32_t access_mask /* [in] */,
2327 struct policy_handle *trustdom_handle /* [out] [ref] */)
2329 struct lsa_OpenTrustedDomainByName r;
2333 r.in.handle = handle;
2335 r.in.access_mask = access_mask;
2337 if (DEBUGLEVEL >= 10) {
2338 NDR_PRINT_IN_DEBUG(lsa_OpenTrustedDomainByName, &r);
2341 status = cli_do_rpc_ndr(cli,
2344 NDR_LSA_OPENTRUSTEDDOMAINBYNAME,
2347 if (!NT_STATUS_IS_OK(status)) {
2351 if (DEBUGLEVEL >= 10) {
2352 NDR_PRINT_OUT_DEBUG(lsa_OpenTrustedDomainByName, &r);
2355 if (NT_STATUS_IS_ERR(status)) {
2359 /* Return variables */
2360 *trustdom_handle = *r.out.trustdom_handle;
2363 return r.out.result;
2366 NTSTATUS rpccli_lsa_TestCall(struct rpc_pipe_client *cli,
2367 TALLOC_CTX *mem_ctx)
2369 struct lsa_TestCall r;
2374 if (DEBUGLEVEL >= 10) {
2375 NDR_PRINT_IN_DEBUG(lsa_TestCall, &r);
2378 status = cli_do_rpc_ndr(cli,
2384 if (!NT_STATUS_IS_OK(status)) {
2388 if (DEBUGLEVEL >= 10) {
2389 NDR_PRINT_OUT_DEBUG(lsa_TestCall, &r);
2392 if (NT_STATUS_IS_ERR(status)) {
2396 /* Return variables */
2399 return r.out.result;
2402 NTSTATUS rpccli_lsa_LookupSids2(struct rpc_pipe_client *cli,
2403 TALLOC_CTX *mem_ctx,
2404 struct policy_handle *handle /* [in] [ref] */,
2405 struct lsa_SidArray *sids /* [in] [ref] */,
2406 struct lsa_RefDomainList **domains /* [out] [ref] */,
2407 struct lsa_TransNameArray2 *names /* [in,out] [ref] */,
2408 uint16_t level /* [in] */,
2409 uint32_t *count /* [in,out] [ref] */,
2410 uint32_t unknown1 /* [in] */,
2411 uint32_t unknown2 /* [in] */)
2413 struct lsa_LookupSids2 r;
2417 r.in.handle = handle;
2422 r.in.unknown1 = unknown1;
2423 r.in.unknown2 = unknown2;
2425 if (DEBUGLEVEL >= 10) {
2426 NDR_PRINT_IN_DEBUG(lsa_LookupSids2, &r);
2429 status = cli_do_rpc_ndr(cli,
2432 NDR_LSA_LOOKUPSIDS2,
2435 if (!NT_STATUS_IS_OK(status)) {
2439 if (DEBUGLEVEL >= 10) {
2440 NDR_PRINT_OUT_DEBUG(lsa_LookupSids2, &r);
2443 if (NT_STATUS_IS_ERR(status)) {
2447 /* Return variables */
2448 *domains = *r.out.domains;
2449 *names = *r.out.names;
2450 *count = *r.out.count;
2453 return r.out.result;
2456 NTSTATUS rpccli_lsa_LookupNames2(struct rpc_pipe_client *cli,
2457 TALLOC_CTX *mem_ctx,
2458 struct policy_handle *handle /* [in] [ref] */,
2459 uint32_t num_names /* [in] [range(0,1000)] */,
2460 struct lsa_String *names /* [in] [size_is(num_names)] */,
2461 struct lsa_RefDomainList **domains /* [out] [ref] */,
2462 struct lsa_TransSidArray2 *sids /* [in,out] [ref] */,
2463 enum lsa_LookupNamesLevel level /* [in] */,
2464 uint32_t *count /* [in,out] [ref] */,
2465 uint32_t unknown1 /* [in] */,
2466 uint32_t unknown2 /* [in] */)
2468 struct lsa_LookupNames2 r;
2472 r.in.handle = handle;
2473 r.in.num_names = num_names;
2478 r.in.unknown1 = unknown1;
2479 r.in.unknown2 = unknown2;
2481 if (DEBUGLEVEL >= 10) {
2482 NDR_PRINT_IN_DEBUG(lsa_LookupNames2, &r);
2485 status = cli_do_rpc_ndr(cli,
2488 NDR_LSA_LOOKUPNAMES2,
2491 if (!NT_STATUS_IS_OK(status)) {
2495 if (DEBUGLEVEL >= 10) {
2496 NDR_PRINT_OUT_DEBUG(lsa_LookupNames2, &r);
2499 if (NT_STATUS_IS_ERR(status)) {
2503 /* Return variables */
2504 *domains = *r.out.domains;
2505 *sids = *r.out.sids;
2506 *count = *r.out.count;
2509 return r.out.result;
2512 NTSTATUS rpccli_lsa_CreateTrustedDomainEx2(struct rpc_pipe_client *cli,
2513 TALLOC_CTX *mem_ctx)
2515 struct lsa_CreateTrustedDomainEx2 r;
2520 if (DEBUGLEVEL >= 10) {
2521 NDR_PRINT_IN_DEBUG(lsa_CreateTrustedDomainEx2, &r);
2524 status = cli_do_rpc_ndr(cli,
2527 NDR_LSA_CREATETRUSTEDDOMAINEX2,
2530 if (!NT_STATUS_IS_OK(status)) {
2534 if (DEBUGLEVEL >= 10) {
2535 NDR_PRINT_OUT_DEBUG(lsa_CreateTrustedDomainEx2, &r);
2538 if (NT_STATUS_IS_ERR(status)) {
2542 /* Return variables */
2545 return r.out.result;
2548 NTSTATUS rpccli_lsa_CREDRWRITE(struct rpc_pipe_client *cli,
2549 TALLOC_CTX *mem_ctx)
2551 struct lsa_CREDRWRITE r;
2556 if (DEBUGLEVEL >= 10) {
2557 NDR_PRINT_IN_DEBUG(lsa_CREDRWRITE, &r);
2560 status = cli_do_rpc_ndr(cli,
2566 if (!NT_STATUS_IS_OK(status)) {
2570 if (DEBUGLEVEL >= 10) {
2571 NDR_PRINT_OUT_DEBUG(lsa_CREDRWRITE, &r);
2574 if (NT_STATUS_IS_ERR(status)) {
2578 /* Return variables */
2581 return r.out.result;
2584 NTSTATUS rpccli_lsa_CREDRREAD(struct rpc_pipe_client *cli,
2585 TALLOC_CTX *mem_ctx)
2587 struct lsa_CREDRREAD r;
2592 if (DEBUGLEVEL >= 10) {
2593 NDR_PRINT_IN_DEBUG(lsa_CREDRREAD, &r);
2596 status = cli_do_rpc_ndr(cli,
2602 if (!NT_STATUS_IS_OK(status)) {
2606 if (DEBUGLEVEL >= 10) {
2607 NDR_PRINT_OUT_DEBUG(lsa_CREDRREAD, &r);
2610 if (NT_STATUS_IS_ERR(status)) {
2614 /* Return variables */
2617 return r.out.result;
2620 NTSTATUS rpccli_lsa_CREDRENUMERATE(struct rpc_pipe_client *cli,
2621 TALLOC_CTX *mem_ctx)
2623 struct lsa_CREDRENUMERATE r;
2628 if (DEBUGLEVEL >= 10) {
2629 NDR_PRINT_IN_DEBUG(lsa_CREDRENUMERATE, &r);
2632 status = cli_do_rpc_ndr(cli,
2635 NDR_LSA_CREDRENUMERATE,
2638 if (!NT_STATUS_IS_OK(status)) {
2642 if (DEBUGLEVEL >= 10) {
2643 NDR_PRINT_OUT_DEBUG(lsa_CREDRENUMERATE, &r);
2646 if (NT_STATUS_IS_ERR(status)) {
2650 /* Return variables */
2653 return r.out.result;
2656 NTSTATUS rpccli_lsa_CREDRWRITEDOMAINCREDENTIALS(struct rpc_pipe_client *cli,
2657 TALLOC_CTX *mem_ctx)
2659 struct lsa_CREDRWRITEDOMAINCREDENTIALS r;
2664 if (DEBUGLEVEL >= 10) {
2665 NDR_PRINT_IN_DEBUG(lsa_CREDRWRITEDOMAINCREDENTIALS, &r);
2668 status = cli_do_rpc_ndr(cli,
2671 NDR_LSA_CREDRWRITEDOMAINCREDENTIALS,
2674 if (!NT_STATUS_IS_OK(status)) {
2678 if (DEBUGLEVEL >= 10) {
2679 NDR_PRINT_OUT_DEBUG(lsa_CREDRWRITEDOMAINCREDENTIALS, &r);
2682 if (NT_STATUS_IS_ERR(status)) {
2686 /* Return variables */
2689 return r.out.result;
2692 NTSTATUS rpccli_lsa_CREDRREADDOMAINCREDENTIALS(struct rpc_pipe_client *cli,
2693 TALLOC_CTX *mem_ctx)
2695 struct lsa_CREDRREADDOMAINCREDENTIALS r;
2700 if (DEBUGLEVEL >= 10) {
2701 NDR_PRINT_IN_DEBUG(lsa_CREDRREADDOMAINCREDENTIALS, &r);
2704 status = cli_do_rpc_ndr(cli,
2707 NDR_LSA_CREDRREADDOMAINCREDENTIALS,
2710 if (!NT_STATUS_IS_OK(status)) {
2714 if (DEBUGLEVEL >= 10) {
2715 NDR_PRINT_OUT_DEBUG(lsa_CREDRREADDOMAINCREDENTIALS, &r);
2718 if (NT_STATUS_IS_ERR(status)) {
2722 /* Return variables */
2725 return r.out.result;
2728 NTSTATUS rpccli_lsa_CREDRDELETE(struct rpc_pipe_client *cli,
2729 TALLOC_CTX *mem_ctx)
2731 struct lsa_CREDRDELETE r;
2736 if (DEBUGLEVEL >= 10) {
2737 NDR_PRINT_IN_DEBUG(lsa_CREDRDELETE, &r);
2740 status = cli_do_rpc_ndr(cli,
2743 NDR_LSA_CREDRDELETE,
2746 if (!NT_STATUS_IS_OK(status)) {
2750 if (DEBUGLEVEL >= 10) {
2751 NDR_PRINT_OUT_DEBUG(lsa_CREDRDELETE, &r);
2754 if (NT_STATUS_IS_ERR(status)) {
2758 /* Return variables */
2761 return r.out.result;
2764 NTSTATUS rpccli_lsa_CREDRGETTARGETINFO(struct rpc_pipe_client *cli,
2765 TALLOC_CTX *mem_ctx)
2767 struct lsa_CREDRGETTARGETINFO r;
2772 if (DEBUGLEVEL >= 10) {
2773 NDR_PRINT_IN_DEBUG(lsa_CREDRGETTARGETINFO, &r);
2776 status = cli_do_rpc_ndr(cli,
2779 NDR_LSA_CREDRGETTARGETINFO,
2782 if (!NT_STATUS_IS_OK(status)) {
2786 if (DEBUGLEVEL >= 10) {
2787 NDR_PRINT_OUT_DEBUG(lsa_CREDRGETTARGETINFO, &r);
2790 if (NT_STATUS_IS_ERR(status)) {
2794 /* Return variables */
2797 return r.out.result;
2800 NTSTATUS rpccli_lsa_CREDRPROFILELOADED(struct rpc_pipe_client *cli,
2801 TALLOC_CTX *mem_ctx)
2803 struct lsa_CREDRPROFILELOADED r;
2808 if (DEBUGLEVEL >= 10) {
2809 NDR_PRINT_IN_DEBUG(lsa_CREDRPROFILELOADED, &r);
2812 status = cli_do_rpc_ndr(cli,
2815 NDR_LSA_CREDRPROFILELOADED,
2818 if (!NT_STATUS_IS_OK(status)) {
2822 if (DEBUGLEVEL >= 10) {
2823 NDR_PRINT_OUT_DEBUG(lsa_CREDRPROFILELOADED, &r);
2826 if (NT_STATUS_IS_ERR(status)) {
2830 /* Return variables */
2833 return r.out.result;
2836 NTSTATUS rpccli_lsa_LookupNames3(struct rpc_pipe_client *cli,
2837 TALLOC_CTX *mem_ctx,
2838 struct policy_handle *handle /* [in] [ref] */,
2839 uint32_t num_names /* [in] [range(0,1000)] */,
2840 struct lsa_String *names /* [in] [size_is(num_names)] */,
2841 struct lsa_RefDomainList **domains /* [out] [ref] */,
2842 struct lsa_TransSidArray3 *sids /* [in,out] [ref] */,
2843 enum lsa_LookupNamesLevel level /* [in] */,
2844 uint32_t *count /* [in,out] [ref] */,
2845 uint32_t unknown1 /* [in] */,
2846 uint32_t unknown2 /* [in] */)
2848 struct lsa_LookupNames3 r;
2852 r.in.handle = handle;
2853 r.in.num_names = num_names;
2858 r.in.unknown1 = unknown1;
2859 r.in.unknown2 = unknown2;
2861 if (DEBUGLEVEL >= 10) {
2862 NDR_PRINT_IN_DEBUG(lsa_LookupNames3, &r);
2865 status = cli_do_rpc_ndr(cli,
2868 NDR_LSA_LOOKUPNAMES3,
2871 if (!NT_STATUS_IS_OK(status)) {
2875 if (DEBUGLEVEL >= 10) {
2876 NDR_PRINT_OUT_DEBUG(lsa_LookupNames3, &r);
2879 if (NT_STATUS_IS_ERR(status)) {
2883 /* Return variables */
2884 *domains = *r.out.domains;
2885 *sids = *r.out.sids;
2886 *count = *r.out.count;
2889 return r.out.result;
2892 NTSTATUS rpccli_lsa_CREDRGETSESSIONTYPES(struct rpc_pipe_client *cli,
2893 TALLOC_CTX *mem_ctx)
2895 struct lsa_CREDRGETSESSIONTYPES r;
2900 if (DEBUGLEVEL >= 10) {
2901 NDR_PRINT_IN_DEBUG(lsa_CREDRGETSESSIONTYPES, &r);
2904 status = cli_do_rpc_ndr(cli,
2907 NDR_LSA_CREDRGETSESSIONTYPES,
2910 if (!NT_STATUS_IS_OK(status)) {
2914 if (DEBUGLEVEL >= 10) {
2915 NDR_PRINT_OUT_DEBUG(lsa_CREDRGETSESSIONTYPES, &r);
2918 if (NT_STATUS_IS_ERR(status)) {
2922 /* Return variables */
2925 return r.out.result;
2928 NTSTATUS rpccli_lsa_LSARREGISTERAUDITEVENT(struct rpc_pipe_client *cli,
2929 TALLOC_CTX *mem_ctx)
2931 struct lsa_LSARREGISTERAUDITEVENT r;
2936 if (DEBUGLEVEL >= 10) {
2937 NDR_PRINT_IN_DEBUG(lsa_LSARREGISTERAUDITEVENT, &r);
2940 status = cli_do_rpc_ndr(cli,
2943 NDR_LSA_LSARREGISTERAUDITEVENT,
2946 if (!NT_STATUS_IS_OK(status)) {
2950 if (DEBUGLEVEL >= 10) {
2951 NDR_PRINT_OUT_DEBUG(lsa_LSARREGISTERAUDITEVENT, &r);
2954 if (NT_STATUS_IS_ERR(status)) {
2958 /* Return variables */
2961 return r.out.result;
2964 NTSTATUS rpccli_lsa_LSARGENAUDITEVENT(struct rpc_pipe_client *cli,
2965 TALLOC_CTX *mem_ctx)
2967 struct lsa_LSARGENAUDITEVENT r;
2972 if (DEBUGLEVEL >= 10) {
2973 NDR_PRINT_IN_DEBUG(lsa_LSARGENAUDITEVENT, &r);
2976 status = cli_do_rpc_ndr(cli,
2979 NDR_LSA_LSARGENAUDITEVENT,
2982 if (!NT_STATUS_IS_OK(status)) {
2986 if (DEBUGLEVEL >= 10) {
2987 NDR_PRINT_OUT_DEBUG(lsa_LSARGENAUDITEVENT, &r);
2990 if (NT_STATUS_IS_ERR(status)) {
2994 /* Return variables */
2997 return r.out.result;
3000 NTSTATUS rpccli_lsa_LSARUNREGISTERAUDITEVENT(struct rpc_pipe_client *cli,
3001 TALLOC_CTX *mem_ctx)
3003 struct lsa_LSARUNREGISTERAUDITEVENT r;
3008 if (DEBUGLEVEL >= 10) {
3009 NDR_PRINT_IN_DEBUG(lsa_LSARUNREGISTERAUDITEVENT, &r);
3012 status = cli_do_rpc_ndr(cli,
3015 NDR_LSA_LSARUNREGISTERAUDITEVENT,
3018 if (!NT_STATUS_IS_OK(status)) {
3022 if (DEBUGLEVEL >= 10) {
3023 NDR_PRINT_OUT_DEBUG(lsa_LSARUNREGISTERAUDITEVENT, &r);
3026 if (NT_STATUS_IS_ERR(status)) {
3030 /* Return variables */
3033 return r.out.result;
3036 NTSTATUS rpccli_lsa_lsaRQueryForestTrustInformation(struct rpc_pipe_client *cli,
3037 TALLOC_CTX *mem_ctx,
3038 struct policy_handle *handle /* [in] [ref] */,
3039 struct lsa_String *trusted_domain_name /* [in] [ref] */,
3040 uint16_t unknown /* [in] */,
3041 struct lsa_ForestTrustInformation **forest_trust_info /* [out] [ref] */)
3043 struct lsa_lsaRQueryForestTrustInformation r;
3047 r.in.handle = handle;
3048 r.in.trusted_domain_name = trusted_domain_name;
3049 r.in.unknown = unknown;
3051 if (DEBUGLEVEL >= 10) {
3052 NDR_PRINT_IN_DEBUG(lsa_lsaRQueryForestTrustInformation, &r);
3055 status = cli_do_rpc_ndr(cli,
3058 NDR_LSA_LSARQUERYFORESTTRUSTINFORMATION,
3061 if (!NT_STATUS_IS_OK(status)) {
3065 if (DEBUGLEVEL >= 10) {
3066 NDR_PRINT_OUT_DEBUG(lsa_lsaRQueryForestTrustInformation, &r);
3069 if (NT_STATUS_IS_ERR(status)) {
3073 /* Return variables */
3074 *forest_trust_info = *r.out.forest_trust_info;
3077 return r.out.result;
3080 NTSTATUS rpccli_lsa_LSARSETFORESTTRUSTINFORMATION(struct rpc_pipe_client *cli,
3081 TALLOC_CTX *mem_ctx)
3083 struct lsa_LSARSETFORESTTRUSTINFORMATION r;
3088 if (DEBUGLEVEL >= 10) {
3089 NDR_PRINT_IN_DEBUG(lsa_LSARSETFORESTTRUSTINFORMATION, &r);
3092 status = cli_do_rpc_ndr(cli,
3095 NDR_LSA_LSARSETFORESTTRUSTINFORMATION,
3098 if (!NT_STATUS_IS_OK(status)) {
3102 if (DEBUGLEVEL >= 10) {
3103 NDR_PRINT_OUT_DEBUG(lsa_LSARSETFORESTTRUSTINFORMATION, &r);
3106 if (NT_STATUS_IS_ERR(status)) {
3110 /* Return variables */
3113 return r.out.result;
3116 NTSTATUS rpccli_lsa_CREDRRENAME(struct rpc_pipe_client *cli,
3117 TALLOC_CTX *mem_ctx)
3119 struct lsa_CREDRRENAME r;
3124 if (DEBUGLEVEL >= 10) {
3125 NDR_PRINT_IN_DEBUG(lsa_CREDRRENAME, &r);
3128 status = cli_do_rpc_ndr(cli,
3131 NDR_LSA_CREDRRENAME,
3134 if (!NT_STATUS_IS_OK(status)) {
3138 if (DEBUGLEVEL >= 10) {
3139 NDR_PRINT_OUT_DEBUG(lsa_CREDRRENAME, &r);
3142 if (NT_STATUS_IS_ERR(status)) {
3146 /* Return variables */
3149 return r.out.result;
3152 NTSTATUS rpccli_lsa_LookupSids3(struct rpc_pipe_client *cli,
3153 TALLOC_CTX *mem_ctx,
3154 struct lsa_SidArray *sids /* [in] [ref] */,
3155 struct lsa_RefDomainList **domains /* [out] [ref] */,
3156 struct lsa_TransNameArray2 *names /* [in,out] [ref] */,
3157 uint16_t level /* [in] */,
3158 uint32_t *count /* [in,out] [ref] */,
3159 uint32_t unknown1 /* [in] */,
3160 uint32_t unknown2 /* [in] */)
3162 struct lsa_LookupSids3 r;
3170 r.in.unknown1 = unknown1;
3171 r.in.unknown2 = unknown2;
3173 if (DEBUGLEVEL >= 10) {
3174 NDR_PRINT_IN_DEBUG(lsa_LookupSids3, &r);
3177 status = cli_do_rpc_ndr(cli,
3180 NDR_LSA_LOOKUPSIDS3,
3183 if (!NT_STATUS_IS_OK(status)) {
3187 if (DEBUGLEVEL >= 10) {
3188 NDR_PRINT_OUT_DEBUG(lsa_LookupSids3, &r);
3191 if (NT_STATUS_IS_ERR(status)) {
3195 /* Return variables */
3196 *domains = *r.out.domains;
3197 *names = *r.out.names;
3198 *count = *r.out.count;
3201 return r.out.result;
3204 NTSTATUS rpccli_lsa_LookupNames4(struct rpc_pipe_client *cli,
3205 TALLOC_CTX *mem_ctx,
3206 uint32_t num_names /* [in] [range(0,1000)] */,
3207 struct lsa_String *names /* [in] [size_is(num_names)] */,
3208 struct lsa_RefDomainList **domains /* [out] [ref] */,
3209 struct lsa_TransSidArray3 *sids /* [in,out] [ref] */,
3210 enum lsa_LookupNamesLevel level /* [in] */,
3211 uint32_t *count /* [in,out] [ref] */,
3212 uint32_t unknown1 /* [in] */,
3213 uint32_t unknown2 /* [in] */)
3215 struct lsa_LookupNames4 r;
3219 r.in.num_names = num_names;
3224 r.in.unknown1 = unknown1;
3225 r.in.unknown2 = unknown2;
3227 if (DEBUGLEVEL >= 10) {
3228 NDR_PRINT_IN_DEBUG(lsa_LookupNames4, &r);
3231 status = cli_do_rpc_ndr(cli,
3234 NDR_LSA_LOOKUPNAMES4,
3237 if (!NT_STATUS_IS_OK(status)) {
3241 if (DEBUGLEVEL >= 10) {
3242 NDR_PRINT_OUT_DEBUG(lsa_LookupNames4, &r);
3245 if (NT_STATUS_IS_ERR(status)) {
3249 /* Return variables */
3250 *domains = *r.out.domains;
3251 *sids = *r.out.sids;
3252 *count = *r.out.count;
3255 return r.out.result;
3258 NTSTATUS rpccli_lsa_LSAROPENPOLICYSCE(struct rpc_pipe_client *cli,
3259 TALLOC_CTX *mem_ctx)
3261 struct lsa_LSAROPENPOLICYSCE r;
3266 if (DEBUGLEVEL >= 10) {
3267 NDR_PRINT_IN_DEBUG(lsa_LSAROPENPOLICYSCE, &r);
3270 status = cli_do_rpc_ndr(cli,
3273 NDR_LSA_LSAROPENPOLICYSCE,
3276 if (!NT_STATUS_IS_OK(status)) {
3280 if (DEBUGLEVEL >= 10) {
3281 NDR_PRINT_OUT_DEBUG(lsa_LSAROPENPOLICYSCE, &r);
3284 if (NT_STATUS_IS_ERR(status)) {
3288 /* Return variables */
3291 return r.out.result;
3294 NTSTATUS rpccli_lsa_LSARADTREGISTERSECURITYEVENTSOURCE(struct rpc_pipe_client *cli,
3295 TALLOC_CTX *mem_ctx)
3297 struct lsa_LSARADTREGISTERSECURITYEVENTSOURCE r;
3302 if (DEBUGLEVEL >= 10) {
3303 NDR_PRINT_IN_DEBUG(lsa_LSARADTREGISTERSECURITYEVENTSOURCE, &r);
3306 status = cli_do_rpc_ndr(cli,
3309 NDR_LSA_LSARADTREGISTERSECURITYEVENTSOURCE,
3312 if (!NT_STATUS_IS_OK(status)) {
3316 if (DEBUGLEVEL >= 10) {
3317 NDR_PRINT_OUT_DEBUG(lsa_LSARADTREGISTERSECURITYEVENTSOURCE, &r);
3320 if (NT_STATUS_IS_ERR(status)) {
3324 /* Return variables */
3327 return r.out.result;
3330 NTSTATUS rpccli_lsa_LSARADTUNREGISTERSECURITYEVENTSOURCE(struct rpc_pipe_client *cli,
3331 TALLOC_CTX *mem_ctx)
3333 struct lsa_LSARADTUNREGISTERSECURITYEVENTSOURCE r;
3338 if (DEBUGLEVEL >= 10) {
3339 NDR_PRINT_IN_DEBUG(lsa_LSARADTUNREGISTERSECURITYEVENTSOURCE, &r);
3342 status = cli_do_rpc_ndr(cli,
3345 NDR_LSA_LSARADTUNREGISTERSECURITYEVENTSOURCE,
3348 if (!NT_STATUS_IS_OK(status)) {
3352 if (DEBUGLEVEL >= 10) {
3353 NDR_PRINT_OUT_DEBUG(lsa_LSARADTUNREGISTERSECURITYEVENTSOURCE, &r);
3356 if (NT_STATUS_IS_ERR(status)) {
3360 /* Return variables */
3363 return r.out.result;
3366 NTSTATUS rpccli_lsa_LSARADTREPORTSECURITYEVENT(struct rpc_pipe_client *cli,
3367 TALLOC_CTX *mem_ctx)
3369 struct lsa_LSARADTREPORTSECURITYEVENT r;
3374 if (DEBUGLEVEL >= 10) {
3375 NDR_PRINT_IN_DEBUG(lsa_LSARADTREPORTSECURITYEVENT, &r);
3378 status = cli_do_rpc_ndr(cli,
3381 NDR_LSA_LSARADTREPORTSECURITYEVENT,
3384 if (!NT_STATUS_IS_OK(status)) {
3388 if (DEBUGLEVEL >= 10) {
3389 NDR_PRINT_OUT_DEBUG(lsa_LSARADTREPORTSECURITYEVENT, &r);
3392 if (NT_STATUS_IS_ERR(status)) {
3396 /* Return variables */
3399 return r.out.result;