4 lsa interface definition
9 [ uuid("12345778-1234-abcd-ef00-0123456789ab"),
11 endpoint("ncacn_np:[\\pipe\\lsarpc]","ncacn_np:[\\pipe\\netlogon]","ncacn_np:[\\pipe\\lsass]", "ncacn_ip_tcp:", "ncalrpc:"),
12 pointer_default(unique),
13 helpstring("Local Security Authority")
16 declare bitmap security_secinfo;
18 typedef [public,noejs] struct {
19 [value(2*strlen_m(string))] uint16 length;
20 [value(2*strlen_m(string))] uint16 size;
21 [charset(UTF16),size_is(size/2),length_is(length/2)] uint16 *string;
24 typedef [public] struct {
25 [value(2*strlen_m(string))] uint16 length;
26 [value(2*(strlen_m(string)+1))] uint16 size;
27 [charset(UTF16),size_is(size/2),length_is(length/2)] uint16 *string;
30 typedef [public] struct {
32 [size_is(count)] lsa_String *names;
35 typedef [public] struct {
36 [value(strlen_m(string))] uint16 length;
37 [value(strlen_m(string))] uint16 size;
38 ascstr_noterm *string;
44 [in,out] policy_handle *handle
50 [public] NTSTATUS lsa_Delete (
51 [in] policy_handle *handle
69 [size_is(count)] lsa_PrivEntry *privs;
72 [public] NTSTATUS lsa_EnumPrivs (
73 [in] policy_handle *handle,
74 [in,out] uint32 *resume_handle,
75 [in] uint32 max_count,
76 [out] lsa_PrivArray *privs
82 NTSTATUS lsa_QuerySecurity (
83 [in] policy_handle *handle,
84 [in] security_secinfo sec_info,
85 [out,unique] sec_desc_buf *sdbuf
91 NTSTATUS lsa_SetSecObj ();
96 NTSTATUS lsa_ChangePassword ();
102 uint32 len; /* ignored */
103 uint16 impersonation_level;
105 uint8 effective_only;
109 uint32 len; /* ignored */
111 [string,charset(UTF16)] uint16 *object_name;
113 security_descriptor *sec_desc;
114 lsa_QosInfo *sec_qos;
115 } lsa_ObjectAttribute;
117 /* notice the screwup with the system_name - thats why MS created
119 [public] NTSTATUS lsa_OpenPolicy (
120 [in,unique] uint16 *system_name,
121 [in] lsa_ObjectAttribute *attr,
122 [in] uint32 access_mask,
123 [out] policy_handle *handle
134 NTTIME retention_time;
135 uint8 shutdown_in_progress;
136 NTTIME time_to_shutdown;
137 uint32 next_audit_record;
142 uint32 auditing_mode;
143 [size_is(count)] uint32 *settings;
145 } lsa_AuditEventsInfo;
148 lsa_StringLarge name;
157 uint16 unknown; /* an midl padding bug? */
164 } lsa_ReplicaSourceInfo;
168 uint32 non_paged_pool;
173 } lsa_DefaultQuotaInfo;
177 NTTIME db_create_time;
178 } lsa_ModificationInfo;
181 uint8 shutdown_on_full;
182 } lsa_AuditFullSetInfo;
185 uint16 unknown; /* an midl padding bug? */
186 uint8 shutdown_on_full;
188 } lsa_AuditFullQueryInfo;
191 /* it's important that we use the lsa_StringLarge here,
192 * because otherwise windows clients result with such dns hostnames
193 * e.g. w2k3-client.samba4.samba.orgsamba4.samba.org
195 * w2k3-client.samba4.samba.org
197 lsa_StringLarge name;
198 lsa_StringLarge dns_domain;
199 lsa_StringLarge dns_forest;
205 LSA_POLICY_INFO_AUDIT_LOG=1,
206 LSA_POLICY_INFO_AUDIT_EVENTS=2,
207 LSA_POLICY_INFO_DOMAIN=3,
208 LSA_POLICY_INFO_PD=4,
209 LSA_POLICY_INFO_ACCOUNT_DOMAIN=5,
210 LSA_POLICY_INFO_ROLE=6,
211 LSA_POLICY_INFO_REPLICA=7,
212 LSA_POLICY_INFO_QUOTA=8,
213 LSA_POLICY_INFO_DB=9,
214 LSA_POLICY_INFO_AUDIT_FULL_SET=10,
215 LSA_POLICY_INFO_AUDIT_FULL_QUERY=11,
216 LSA_POLICY_INFO_DNS=12
219 typedef [switch_type(uint16)] union {
220 [case(LSA_POLICY_INFO_AUDIT_LOG)] lsa_AuditLogInfo audit_log;
221 [case(LSA_POLICY_INFO_AUDIT_EVENTS)] lsa_AuditEventsInfo audit_events;
222 [case(LSA_POLICY_INFO_DOMAIN)] lsa_DomainInfo domain;
223 [case(LSA_POLICY_INFO_PD)] lsa_PDAccountInfo pd;
224 [case(LSA_POLICY_INFO_ACCOUNT_DOMAIN)] lsa_DomainInfo account_domain;
225 [case(LSA_POLICY_INFO_ROLE)] lsa_ServerRole role;
226 [case(LSA_POLICY_INFO_REPLICA)] lsa_ReplicaSourceInfo replica;
227 [case(LSA_POLICY_INFO_QUOTA)] lsa_DefaultQuotaInfo quota;
228 [case(LSA_POLICY_INFO_DB)] lsa_ModificationInfo db;
229 [case(LSA_POLICY_INFO_AUDIT_FULL_SET)] lsa_AuditFullSetInfo auditfullset;
230 [case(LSA_POLICY_INFO_AUDIT_FULL_QUERY)] lsa_AuditFullQueryInfo auditfullquery;
231 [case(LSA_POLICY_INFO_DNS)] lsa_DnsDomainInfo dns;
232 } lsa_PolicyInformation;
234 NTSTATUS lsa_QueryInfoPolicy (
235 [in] policy_handle *handle,
237 [out,unique,switch_is(level)] lsa_PolicyInformation *info
242 NTSTATUS lsa_SetInfoPolicy ();
246 NTSTATUS lsa_ClearAuditLog ();
250 [public] NTSTATUS lsa_CreateAccount (
251 [in] policy_handle *handle,
253 [in] uint32 access_mask,
254 [out] policy_handle *acct_handle
258 /* NOTE: This only returns accounts that have at least
266 typedef [public] struct {
267 [range(0,1000)] uint32 num_sids;
268 [size_is(num_sids)] lsa_SidPtr *sids;
271 [public] NTSTATUS lsa_EnumAccounts (
272 [in] policy_handle *handle,
273 [in,out] uint32 *resume_handle,
274 [in,range(0,8192)] uint32 num_entries,
275 [out] lsa_SidArray *sids
279 /*************************************************/
282 [public] NTSTATUS lsa_CreateTrustedDomain(
283 [in] policy_handle *handle,
284 [in] lsa_DomainInfo *info,
285 [in] uint32 access_mask,
286 [out] policy_handle *trustdom_handle
293 /* w2k3 treats max_size as max_domains*60 */
294 const int LSA_ENUM_TRUST_DOMAIN_MULTIPLIER = 60;
298 [size_is(count)] lsa_DomainInfo *domains;
301 NTSTATUS lsa_EnumTrustDom (
302 [in] policy_handle *handle,
303 [in,out] uint32 *resume_handle,
304 [in,range(0,1000)] uint32 max_size,
305 [out] lsa_DomainList *domains
312 SID_NAME_USE_NONE = 0,/* NOTUSED */
313 SID_NAME_USER = 1, /* user */
314 SID_NAME_DOM_GRP = 2, /* domain group */
315 SID_NAME_DOMAIN = 3, /* domain: don't know what this is */
316 SID_NAME_ALIAS = 4, /* local group */
317 SID_NAME_WKN_GRP = 5, /* well-known group */
318 SID_NAME_DELETED = 6, /* deleted account: needed for c2 rating */
319 SID_NAME_INVALID = 7, /* invalid account */
320 SID_NAME_UNKNOWN = 8, /* oops. */
321 SID_NAME_COMPUTER = 9 /* machine */
325 lsa_SidType sid_type;
331 [range(0,1000)] uint32 count;
332 [size_is(count)] lsa_TranslatedSid *sids;
335 const int LSA_REF_DOMAIN_LIST_MULTIPLIER = 32;
337 [range(0,1000)] uint32 count;
338 [size_is(count)] lsa_DomainInfo *domains;
342 /* Level 1: Ask everywhere
343 * Level 2: Ask domain and trusted domains, no builtin and wkn
344 * Level 3: Only ask domain
345 * Level 4: W2k3ad: Only ask AD trusts
346 * Level 5: Don't lookup anything
351 LSA_LOOKUP_NAMES_ALL = 1,
352 LSA_LOOKUP_NAMES_DOMAINS_ONLY = 2,
353 LSA_LOOKUP_NAMES_PRIMARY_DOMAIN_ONLY = 3,
354 LSA_LOOKUP_NAMES_UPLEVEL_TRUSTS_ONLY = 4,
355 LSA_LOOKUP_NAMES_NONE = 5,
356 LSA_LOOKUP_NAMES_UPLEVEL_TRUSTS_ONLY2 = 6
357 } lsa_LookupNamesLevel;
359 [public] NTSTATUS lsa_LookupNames (
360 [in] policy_handle *handle,
361 [in,range(0,1000)] uint32 num_names,
362 [in,size_is(num_names)] lsa_String names[],
363 [out,unique] lsa_RefDomainList *domains,
364 [in,out] lsa_TransSidArray *sids,
365 [in] lsa_LookupNamesLevel level,
366 [in,out] uint32 *count
374 lsa_SidType sid_type;
377 } lsa_TranslatedName;
380 [range(0,1000)] uint32 count;
381 [size_is(count)] lsa_TranslatedName *names;
382 } lsa_TransNameArray;
384 [public] NTSTATUS lsa_LookupSids (
385 [in] policy_handle *handle,
386 [in] lsa_SidArray *sids,
387 [out,unique] lsa_RefDomainList *domains,
388 [in,out] lsa_TransNameArray *names,
390 [in,out] uint32 *count
395 [public] NTSTATUS lsa_CreateSecret(
396 [in] policy_handle *handle,
397 [in] lsa_String name,
398 [in] uint32 access_mask,
399 [out] policy_handle *sec_handle
403 /*****************************************/
405 NTSTATUS lsa_OpenAccount (
406 [in] policy_handle *handle,
408 [in] uint32 access_mask,
409 [out] policy_handle *acct_handle
413 /****************************************/
422 [range(0,1000)] uint32 count;
424 [size_is(count)] lsa_LUIDAttribute set[*];
427 NTSTATUS lsa_EnumPrivsAccount (
428 [in] policy_handle *handle,
429 [out,unique] lsa_PrivilegeSet *privs
433 /****************************************/
435 NTSTATUS lsa_AddPrivilegesToAccount(
436 [in] policy_handle *handle,
437 [in] lsa_PrivilegeSet *privs
441 /****************************************/
443 NTSTATUS lsa_RemovePrivilegesFromAccount(
444 [in] policy_handle *handle,
445 [in] uint8 remove_all,
446 [in,unique] lsa_PrivilegeSet *privs
450 NTSTATUS lsa_GetQuotasForAccount();
453 NTSTATUS lsa_SetQuotasForAccount();
456 NTSTATUS lsa_GetSystemAccessAccount();
458 NTSTATUS lsa_SetSystemAccessAccount();
461 NTSTATUS lsa_OpenTrustedDomain(
462 [in] policy_handle *handle,
464 [in] uint32 access_mask,
465 [out] policy_handle *trustdom_handle
468 typedef [flag(NDR_PAHEX)] struct {
471 [size_is(size),length_is(length)] uint8 *data;
474 typedef [flag(NDR_PAHEX)] struct {
475 [range(0,65536)] uint32 size;
476 [size_is(size)] uint8 *data;
480 LSA_TRUSTED_DOMAIN_INFO_NAME = 1,
481 LSA_TRUSTED_DOMAIN_INFO_CONTROLLERS_INFO = 2,
482 LSA_TRUSTED_DOMAIN_INFO_POSIX_OFFSET = 3,
483 LSA_TRUSTED_DOMAIN_INFO_PASSWORD = 4,
484 LSA_TRUSTED_DOMAIN_INFO_BASIC = 5,
485 LSA_TRUSTED_DOMAIN_INFO_INFO_EX = 6,
486 LSA_TRUSTED_DOMAIN_INFO_AUTH_INFO = 7,
487 LSA_TRUSTED_DOMAIN_INFO_FULL_INFO = 8,
488 LSA_TRUSTED_DOMAIN_INFO_11 = 11,
489 LSA_TRUSTED_DOMAIN_INFO_INFO_ALL = 12
490 } lsa_TrustDomInfoEnum;
493 lsa_StringLarge netbios_name;
494 } lsa_TrustDomainInfoName;
498 } lsa_TrustDomainInfoPosixOffset;
501 lsa_DATA_BUF *password;
502 lsa_DATA_BUF *old_password;
503 } lsa_TrustDomainInfoPassword;
506 lsa_String netbios_name;
508 } lsa_TrustDomainInfoBasic;
511 lsa_StringLarge domain_name;
512 lsa_StringLarge netbios_name;
514 uint32 trust_direction;
516 uint32 trust_attributes;
517 } lsa_TrustDomainInfoInfoEx;
520 NTTIME_hyper last_update_time;
523 } lsa_TrustDomainInfoBuffer;
526 uint32 incoming_count;
527 lsa_TrustDomainInfoBuffer *incoming_current_auth_info;
528 lsa_TrustDomainInfoBuffer *incoming_previous_auth_info;
529 uint32 outgoing_count;
530 lsa_TrustDomainInfoBuffer *outgoing_current_auth_info;
531 lsa_TrustDomainInfoBuffer *outgoing_previous_auth_info;
532 } lsa_TrustDomainInfoAuthInfo;
535 lsa_TrustDomainInfoInfoEx info_ex;
536 lsa_TrustDomainInfoPosixOffset posix_offset;
537 lsa_TrustDomainInfoAuthInfo auth_info;
538 } lsa_TrustDomainInfoFullInfo;
541 lsa_TrustDomainInfoInfoEx info_ex;
543 } lsa_TrustDomainInfo11;
546 lsa_TrustDomainInfoInfoEx info_ex;
548 lsa_TrustDomainInfoPosixOffset posix_offset;
549 lsa_TrustDomainInfoAuthInfo auth_info;
550 } lsa_TrustDomainInfoInfoAll;
552 typedef [switch_type(lsa_TrustDomInfoEnum)] union {
553 [case(LSA_TRUSTED_DOMAIN_INFO_NAME)] lsa_TrustDomainInfoName name;
554 [case(LSA_TRUSTED_DOMAIN_INFO_POSIX_OFFSET)] lsa_TrustDomainInfoPosixOffset posix_offset;
555 [case(LSA_TRUSTED_DOMAIN_INFO_PASSWORD)] lsa_TrustDomainInfoPassword password;
556 [case(LSA_TRUSTED_DOMAIN_INFO_BASIC)] lsa_TrustDomainInfoBasic info_basic;
557 [case(LSA_TRUSTED_DOMAIN_INFO_INFO_EX)] lsa_TrustDomainInfoInfoEx info_ex;
558 [case(LSA_TRUSTED_DOMAIN_INFO_AUTH_INFO)] lsa_TrustDomainInfoAuthInfo auth_info;
559 [case(LSA_TRUSTED_DOMAIN_INFO_FULL_INFO)] lsa_TrustDomainInfoFullInfo full_info;
560 [case(LSA_TRUSTED_DOMAIN_INFO_11)] lsa_TrustDomainInfo11 info11;
561 [case(LSA_TRUSTED_DOMAIN_INFO_INFO_ALL)] lsa_TrustDomainInfoInfoAll info_all;
562 } lsa_TrustedDomainInfo;
565 NTSTATUS lsa_QueryTrustedDomainInfo(
566 [in] policy_handle *trustdom_handle,
567 [in] lsa_TrustDomInfoEnum level,
568 [out,switch_is(level),unique] lsa_TrustedDomainInfo *info
572 NTSTATUS lsa_SetInformationTrustedDomain();
575 [public] NTSTATUS lsa_OpenSecret(
576 [in] policy_handle *handle,
577 [in] lsa_String name,
578 [in] uint32 access_mask,
579 [out] policy_handle *sec_handle
584 [public] NTSTATUS lsa_SetSecret(
585 [in] policy_handle *sec_handle,
586 [in,unique] lsa_DATA_BUF *new_val,
587 [in,unique] lsa_DATA_BUF *old_val
595 [public] NTSTATUS lsa_QuerySecret (
596 [in] policy_handle *sec_handle,
597 [in,out,unique] lsa_DATA_BUF_PTR *new_val,
598 [in,out,unique] NTTIME_hyper *new_mtime,
599 [in,out,unique] lsa_DATA_BUF_PTR *old_val,
600 [in,out,unique] NTTIME_hyper *old_mtime
604 NTSTATUS lsa_LookupPrivValue(
605 [in] policy_handle *handle,
606 [in] lsa_String *name,
612 NTSTATUS lsa_LookupPrivName (
613 [in] policy_handle *handle,
615 [out,unique] lsa_StringLarge *name
619 /*******************/
621 NTSTATUS lsa_LookupPrivDisplayName (
622 [in] policy_handle *handle,
623 [in] lsa_String *name,
624 [out,unique] lsa_StringLarge *disp_name,
625 /* see http://www.microsoft.com/globaldev/nlsweb/ for
626 language definitions */
627 [in,out] uint16 *language_id,
632 NTSTATUS lsa_DeleteObject();
635 /*******************/
637 NTSTATUS lsa_EnumAccountsWithUserRight (
638 [in] policy_handle *handle,
639 [in,unique] lsa_String *name,
640 [out] lsa_SidArray *sids
645 [string,charset(UTF16)] uint16 *name;
646 } lsa_RightAttribute;
650 [size_is(count)] lsa_StringLarge *names;
653 NTSTATUS lsa_EnumAccountRights (
654 [in] policy_handle *handle,
656 [out] lsa_RightSet *rights
660 /**********************/
662 NTSTATUS lsa_AddAccountRights (
663 [in] policy_handle *handle,
665 [in] lsa_RightSet *rights
668 /**********************/
670 NTSTATUS lsa_RemoveAccountRights (
671 [in] policy_handle *handle,
674 [in] lsa_RightSet *rights
678 NTSTATUS lsa_QueryTrustedDomainInfoBySid(
679 [in] policy_handle *handle,
680 [in] dom_sid2 *dom_sid,
681 [in] lsa_TrustDomInfoEnum level,
682 [out,switch_is(level),unique] lsa_TrustedDomainInfo *info
686 NTSTATUS lsa_SetTrustedDomainInfo();
688 NTSTATUS lsa_DeleteTrustedDomain(
689 [in] policy_handle *handle,
690 [in] dom_sid2 *dom_sid
694 NTSTATUS lsa_StorePrivateData();
696 NTSTATUS lsa_RetrievePrivateData();
699 /**********************/
701 [public] NTSTATUS lsa_OpenPolicy2 (
702 [in,unique] [string,charset(UTF16)] uint16 *system_name,
703 [in] lsa_ObjectAttribute *attr,
704 [in] uint32 access_mask,
705 [out] policy_handle *handle
708 /**********************/
714 NTSTATUS lsa_GetUserName(
715 [in,unique] [string,charset(UTF16)] uint16 *system_name,
716 [in,out,unique] lsa_String *account_name,
717 [in,out,unique] lsa_StringPointer *authority_name
720 /**********************/
723 NTSTATUS lsa_QueryInfoPolicy2(
724 [in] policy_handle *handle,
726 [out,unique,switch_is(level)] lsa_PolicyInformation *info
730 NTSTATUS lsa_SetInfoPolicy2();
732 /**********************/
734 NTSTATUS lsa_QueryTrustedDomainInfoByName(
735 [in] policy_handle *handle,
736 [in] lsa_String trusted_domain,
737 [in] lsa_TrustDomInfoEnum level,
738 [out,unique,switch_is(level)] lsa_TrustedDomainInfo *info
741 /**********************/
743 NTSTATUS lsa_SetTrustedDomainInfoByName(
744 [in] policy_handle *handle,
745 [in] lsa_String trusted_domain,
746 [in] lsa_TrustDomInfoEnum level,
747 [in,unique,switch_is(level)] lsa_TrustedDomainInfo *info
752 /* w2k3 treats max_size as max_domains*82 */
753 const int LSA_ENUM_TRUST_DOMAIN_EX_MULTIPLIER = 82;
757 [size_is(count)] lsa_TrustDomainInfoInfoEx *domains;
760 NTSTATUS lsa_EnumTrustedDomainsEx (
761 [in] policy_handle *handle,
762 [in,out] uint32 *resume_handle,
763 [out] lsa_DomainListEx *domains,
769 NTSTATUS lsa_CreateTrustedDomainEx();
772 NTSTATUS lsa_CloseTrustedDomainEx(
773 [in,out] policy_handle *handle
778 /* w2k3 returns either 0x000bbbd000000000 or 0x000a48e800000000
781 uint32 enforce_restrictions;
782 hyper service_tkt_lifetime;
783 hyper user_tkt_lifetime;
784 hyper user_tkt_renewaltime;
787 } lsa_DomainInfoKerberos;
791 [size_is(blob_size)] uint8 *efs_blob;
795 LSA_DOMAIN_INFO_POLICY_EFS=2,
796 LSA_DOMAIN_INFO_POLICY_KERBEROS=3
797 } lsa_DomainInfoEnum;
799 typedef [switch_type(uint16)] union {
800 [case(LSA_DOMAIN_INFO_POLICY_EFS)] lsa_DomainInfoEfs efs_info;
801 [case(LSA_DOMAIN_INFO_POLICY_KERBEROS)] lsa_DomainInfoKerberos kerberos_info;
802 } lsa_DomainInformationPolicy;
804 NTSTATUS lsa_QueryDomainInformationPolicy(
805 [in] policy_handle *handle,
807 [out,unique,switch_is(level)] lsa_DomainInformationPolicy *info
811 NTSTATUS lsa_SetDomainInformationPolicy(
812 [in] policy_handle *handle,
814 [in,unique,switch_is(level)] lsa_DomainInformationPolicy *info
817 /**********************/
819 NTSTATUS lsa_OpenTrustedDomainByName(
820 [in] policy_handle *handle,
821 [in] lsa_String name,
822 [in] uint32 access_mask,
823 [out] policy_handle *trustdom_handle
827 NTSTATUS lsa_TestCall();
829 /**********************/
833 lsa_SidType sid_type;
837 } lsa_TranslatedName2;
840 [range(0,1000)] uint32 count;
841 [size_is(count)] lsa_TranslatedName2 *names;
842 } lsa_TransNameArray2;
844 [public] NTSTATUS lsa_LookupSids2(
845 [in] policy_handle *handle,
846 [in] lsa_SidArray *sids,
847 [out,unique] lsa_RefDomainList *domains,
848 [in,out] lsa_TransNameArray2 *names,
850 [in,out] uint32 *count,
851 [in] uint32 unknown1,
855 /**********************/
859 lsa_SidType sid_type;
863 } lsa_TranslatedSid2;
866 [range(0,1000)] uint32 count;
867 [size_is(count)] lsa_TranslatedSid2 *sids;
868 } lsa_TransSidArray2;
870 [public] NTSTATUS lsa_LookupNames2 (
871 [in] policy_handle *handle,
872 [in,range(0,1000)] uint32 num_names,
873 [in,size_is(num_names)] lsa_String names[],
874 [out,unique] lsa_RefDomainList *domains,
875 [in,out] lsa_TransSidArray2 *sids,
876 [in] lsa_LookupNamesLevel level,
877 [in,out] uint32 *count,
878 [in] uint32 unknown1,
883 NTSTATUS lsa_CreateTrustedDomainEx2();
886 NTSTATUS lsa_CREDRWRITE();
889 NTSTATUS lsa_CREDRREAD();
892 NTSTATUS lsa_CREDRENUMERATE();
895 NTSTATUS lsa_CREDRWRITEDOMAINCREDENTIALS();
898 NTSTATUS lsa_CREDRREADDOMAINCREDENTIALS();
901 NTSTATUS lsa_CREDRDELETE();
904 NTSTATUS lsa_CREDRGETTARGETINFO();
907 NTSTATUS lsa_CREDRPROFILELOADED();
909 /**********************/
912 lsa_SidType sid_type;
916 } lsa_TranslatedSid3;
919 [range(0,1000)] uint32 count;
920 [size_is(count)] lsa_TranslatedSid3 *sids;
921 } lsa_TransSidArray3;
923 [public] NTSTATUS lsa_LookupNames3 (
924 [in] policy_handle *handle,
925 [in,range(0,1000)] uint32 num_names,
926 [in,size_is(num_names)] lsa_String names[],
927 [out,unique] lsa_RefDomainList *domains,
928 [in,out] lsa_TransSidArray3 *sids,
929 [in] lsa_LookupNamesLevel level,
930 [in,out] uint32 *count,
931 [in] uint32 unknown1,
936 NTSTATUS lsa_CREDRGETSESSIONTYPES();
939 NTSTATUS lsa_LSARREGISTERAUDITEVENT();
942 NTSTATUS lsa_LSARGENAUDITEVENT();
945 NTSTATUS lsa_LSARUNREGISTERAUDITEVENT();
949 [range(0,131072)] uint32 length;
950 [size_is(length)] uint8 *data;
951 } lsa_ForestTrustBinaryData;
954 dom_sid2 *domain_sid;
955 lsa_StringLarge dns_domain_name;
956 lsa_StringLarge netbios_domain_name;
957 } lsa_ForestTrustDomainInfo;
959 typedef [switch_type(uint32)] union {
960 [case(LSA_FOREST_TRUST_TOP_LEVEL_NAME)] lsa_String top_level_name;
961 [case(LSA_FOREST_TRUST_TOP_LEVEL_NAME_EX)] lsa_StringLarge top_level_name_ex;
962 [case(LSA_FOREST_TRUST_DOMAIN_INFO)] lsa_ForestTrustDomainInfo domain_info;
963 [default] lsa_ForestTrustBinaryData data;
964 } lsa_ForestTrustData;
966 typedef [v1_enum] enum {
967 LSA_FOREST_TRUST_TOP_LEVEL_NAME = 0,
968 LSA_FOREST_TRUST_TOP_LEVEL_NAME_EX = 1,
969 LSA_FOREST_TRUST_DOMAIN_INFO = 2,
970 LSA_FOREST_TRUST_RECORD_TYPE_LAST = 3
971 } lsa_ForestTrustRecordType;
975 lsa_ForestTrustRecordType level;
977 [switch_is(level)] lsa_ForestTrustData forest_trust_data;
978 } lsa_ForestTrustRecord;
980 typedef [public] struct {
981 [range(0,4000)] uint32 count;
982 [size_is(count)] lsa_ForestTrustRecord **entries;
983 } lsa_ForestTrustInformation;
985 NTSTATUS lsa_lsaRQueryForestTrustInformation(
986 [in] policy_handle *handle,
987 [in,ref] lsa_String *trusted_domain_name,
988 [in] uint16 unknown, /* level ? */
989 [out,ref] lsa_ForestTrustInformation **forest_trust_info
993 NTSTATUS lsa_LSARSETFORESTTRUSTINFORMATION();
996 NTSTATUS lsa_CREDRRENAME();
1001 [public] NTSTATUS lsa_LookupSids3(
1002 [in] lsa_SidArray *sids,
1003 [out,unique] lsa_RefDomainList *domains,
1004 [in,out] lsa_TransNameArray2 *names,
1006 [in,out] uint32 *count,
1007 [in] uint32 unknown1,
1008 [in] uint32 unknown2
1012 NTSTATUS lsa_LookupNames4(
1013 [in,range(0,1000)] uint32 num_names,
1014 [in,size_is(num_names)] lsa_String names[],
1015 [out,unique] lsa_RefDomainList *domains,
1016 [in,out] lsa_TransSidArray3 *sids,
1017 [in] lsa_LookupNamesLevel level,
1018 [in,out] uint32 *count,
1019 [in] uint32 unknown1,
1020 [in] uint32 unknown2
1024 NTSTATUS lsa_LSAROPENPOLICYSCE();
1027 NTSTATUS lsa_LSARADTREGISTERSECURITYEVENTSOURCE();
1030 NTSTATUS lsa_LSARADTUNREGISTERSECURITYEVENTSOURCE();
1033 NTSTATUS lsa_LSARADTREPORTSECURITYEVENT();