2
* Unix SMB/CIFS implementation.
3
* client auto-generated by pidl. DO NOT MODIFY!
7
#include "../librpc/gen_ndr/cli_lsa.h"
9
NTSTATUS rpccli_lsa_Close(struct rpc_pipe_client *cli,
11
struct policy_handle *handle /* [in,out] [ref] */)
19
if (DEBUGLEVEL >= 10) {
20
NDR_PRINT_IN_DEBUG(lsa_Close, &r);
23
status = cli->dispatch(cli,
29
if (!NT_STATUS_IS_OK(status)) {
33
if (DEBUGLEVEL >= 10) {
34
NDR_PRINT_OUT_DEBUG(lsa_Close, &r);
37
if (NT_STATUS_IS_ERR(status)) {
41
/* Return variables */
42
*handle = *r.out.handle;
48
NTSTATUS rpccli_lsa_Delete(struct rpc_pipe_client *cli,
50
struct policy_handle *handle /* [in] [ref] */)
58
if (DEBUGLEVEL >= 10) {
59
NDR_PRINT_IN_DEBUG(lsa_Delete, &r);
62
status = cli->dispatch(cli,
68
if (!NT_STATUS_IS_OK(status)) {
72
if (DEBUGLEVEL >= 10) {
73
NDR_PRINT_OUT_DEBUG(lsa_Delete, &r);
76
if (NT_STATUS_IS_ERR(status)) {
80
/* Return variables */
86
NTSTATUS rpccli_lsa_EnumPrivs(struct rpc_pipe_client *cli,
88
struct policy_handle *handle /* [in] [ref] */,
89
uint32_t *resume_handle /* [in,out] [ref] */,
90
struct lsa_PrivArray *privs /* [out] [ref] */,
91
uint32_t max_count /* [in] */)
93
struct lsa_EnumPrivs r;
98
r.in.resume_handle = resume_handle;
99
r.in.max_count = max_count;
101
if (DEBUGLEVEL >= 10) {
102
NDR_PRINT_IN_DEBUG(lsa_EnumPrivs, &r);
105
status = cli->dispatch(cli,
111
if (!NT_STATUS_IS_OK(status)) {
115
if (DEBUGLEVEL >= 10) {
116
NDR_PRINT_OUT_DEBUG(lsa_EnumPrivs, &r);
119
if (NT_STATUS_IS_ERR(status)) {
123
/* Return variables */
124
*resume_handle = *r.out.resume_handle;
125
*privs = *r.out.privs;
131
NTSTATUS rpccli_lsa_QuerySecurity(struct rpc_pipe_client *cli,
133
struct policy_handle *handle /* [in] [ref] */,
134
uint32_t sec_info /* [in] */,
135
struct sec_desc_buf **sdbuf /* [out] [ref] */)
137
struct lsa_QuerySecurity r;
141
r.in.handle = handle;
142
r.in.sec_info = sec_info;
144
if (DEBUGLEVEL >= 10) {
145
NDR_PRINT_IN_DEBUG(lsa_QuerySecurity, &r);
148
status = cli->dispatch(cli,
151
NDR_LSA_QUERYSECURITY,
154
if (!NT_STATUS_IS_OK(status)) {
158
if (DEBUGLEVEL >= 10) {
159
NDR_PRINT_OUT_DEBUG(lsa_QuerySecurity, &r);
162
if (NT_STATUS_IS_ERR(status)) {
166
/* Return variables */
167
*sdbuf = *r.out.sdbuf;
173
NTSTATUS rpccli_lsa_SetSecObj(struct rpc_pipe_client *cli,
175
struct policy_handle *handle /* [in] [ref] */,
176
uint32_t sec_info /* [in] */,
177
struct sec_desc_buf *sdbuf /* [in] [ref] */)
179
struct lsa_SetSecObj r;
183
r.in.handle = handle;
184
r.in.sec_info = sec_info;
187
if (DEBUGLEVEL >= 10) {
188
NDR_PRINT_IN_DEBUG(lsa_SetSecObj, &r);
191
status = cli->dispatch(cli,
197
if (!NT_STATUS_IS_OK(status)) {
201
if (DEBUGLEVEL >= 10) {
202
NDR_PRINT_OUT_DEBUG(lsa_SetSecObj, &r);
205
if (NT_STATUS_IS_ERR(status)) {
209
/* Return variables */
215
NTSTATUS rpccli_lsa_ChangePassword(struct rpc_pipe_client *cli,
218
struct lsa_ChangePassword r;
223
if (DEBUGLEVEL >= 10) {
224
NDR_PRINT_IN_DEBUG(lsa_ChangePassword, &r);
227
status = cli->dispatch(cli,
230
NDR_LSA_CHANGEPASSWORD,
233
if (!NT_STATUS_IS_OK(status)) {
237
if (DEBUGLEVEL >= 10) {
238
NDR_PRINT_OUT_DEBUG(lsa_ChangePassword, &r);
241
if (NT_STATUS_IS_ERR(status)) {
245
/* Return variables */
251
NTSTATUS rpccli_lsa_OpenPolicy(struct rpc_pipe_client *cli,
253
uint16_t *system_name /* [in] [unique] */,
254
struct lsa_ObjectAttribute *attr /* [in] [ref] */,
255
uint32_t access_mask /* [in] */,
256
struct policy_handle *handle /* [out] [ref] */)
258
struct lsa_OpenPolicy r;
262
r.in.system_name = system_name;
264
r.in.access_mask = access_mask;
266
if (DEBUGLEVEL >= 10) {
267
NDR_PRINT_IN_DEBUG(lsa_OpenPolicy, &r);
270
status = cli->dispatch(cli,
276
if (!NT_STATUS_IS_OK(status)) {
280
if (DEBUGLEVEL >= 10) {
281
NDR_PRINT_OUT_DEBUG(lsa_OpenPolicy, &r);
284
if (NT_STATUS_IS_ERR(status)) {
288
/* Return variables */
289
*handle = *r.out.handle;
295
NTSTATUS rpccli_lsa_QueryInfoPolicy(struct rpc_pipe_client *cli,
297
struct policy_handle *handle /* [in] [ref] */,
298
enum lsa_PolicyInfo level /* [in] */,
299
union lsa_PolicyInformation **info /* [out] [ref,switch_is(level)] */)
301
struct lsa_QueryInfoPolicy r;
305
r.in.handle = handle;
308
if (DEBUGLEVEL >= 10) {
309
NDR_PRINT_IN_DEBUG(lsa_QueryInfoPolicy, &r);
312
status = cli->dispatch(cli,
315
NDR_LSA_QUERYINFOPOLICY,
318
if (!NT_STATUS_IS_OK(status)) {
322
if (DEBUGLEVEL >= 10) {
323
NDR_PRINT_OUT_DEBUG(lsa_QueryInfoPolicy, &r);
326
if (NT_STATUS_IS_ERR(status)) {
330
/* Return variables */
337
NTSTATUS rpccli_lsa_SetInfoPolicy(struct rpc_pipe_client *cli,
339
struct policy_handle *handle /* [in] [ref] */,
340
enum lsa_PolicyInfo level /* [in] */,
341
union lsa_PolicyInformation *info /* [in] [ref,switch_is(level)] */)
343
struct lsa_SetInfoPolicy r;
347
r.in.handle = handle;
351
if (DEBUGLEVEL >= 10) {
352
NDR_PRINT_IN_DEBUG(lsa_SetInfoPolicy, &r);
355
status = cli->dispatch(cli,
358
NDR_LSA_SETINFOPOLICY,
361
if (!NT_STATUS_IS_OK(status)) {
365
if (DEBUGLEVEL >= 10) {
366
NDR_PRINT_OUT_DEBUG(lsa_SetInfoPolicy, &r);
369
if (NT_STATUS_IS_ERR(status)) {
373
/* Return variables */
379
NTSTATUS rpccli_lsa_ClearAuditLog(struct rpc_pipe_client *cli,
382
struct lsa_ClearAuditLog r;
387
if (DEBUGLEVEL >= 10) {
388
NDR_PRINT_IN_DEBUG(lsa_ClearAuditLog, &r);
391
status = cli->dispatch(cli,
394
NDR_LSA_CLEARAUDITLOG,
397
if (!NT_STATUS_IS_OK(status)) {
401
if (DEBUGLEVEL >= 10) {
402
NDR_PRINT_OUT_DEBUG(lsa_ClearAuditLog, &r);
405
if (NT_STATUS_IS_ERR(status)) {
409
/* Return variables */
415
NTSTATUS rpccli_lsa_CreateAccount(struct rpc_pipe_client *cli,
417
struct policy_handle *handle /* [in] [ref] */,
418
struct dom_sid2 *sid /* [in] [ref] */,
419
uint32_t access_mask /* [in] */,
420
struct policy_handle *acct_handle /* [out] [ref] */)
422
struct lsa_CreateAccount r;
426
r.in.handle = handle;
428
r.in.access_mask = access_mask;
430
if (DEBUGLEVEL >= 10) {
431
NDR_PRINT_IN_DEBUG(lsa_CreateAccount, &r);
434
status = cli->dispatch(cli,
437
NDR_LSA_CREATEACCOUNT,
440
if (!NT_STATUS_IS_OK(status)) {
444
if (DEBUGLEVEL >= 10) {
445
NDR_PRINT_OUT_DEBUG(lsa_CreateAccount, &r);
448
if (NT_STATUS_IS_ERR(status)) {
452
/* Return variables */
453
*acct_handle = *r.out.acct_handle;
459
NTSTATUS rpccli_lsa_EnumAccounts(struct rpc_pipe_client *cli,
461
struct policy_handle *handle /* [in] [ref] */,
462
uint32_t *resume_handle /* [in,out] [ref] */,
463
struct lsa_SidArray *sids /* [out] [ref] */,
464
uint32_t num_entries /* [in] [range(0,8192)] */)
466
struct lsa_EnumAccounts r;
470
r.in.handle = handle;
471
r.in.resume_handle = resume_handle;
472
r.in.num_entries = num_entries;
474
if (DEBUGLEVEL >= 10) {
475
NDR_PRINT_IN_DEBUG(lsa_EnumAccounts, &r);
478
status = cli->dispatch(cli,
481
NDR_LSA_ENUMACCOUNTS,
484
if (!NT_STATUS_IS_OK(status)) {
488
if (DEBUGLEVEL >= 10) {
489
NDR_PRINT_OUT_DEBUG(lsa_EnumAccounts, &r);
492
if (NT_STATUS_IS_ERR(status)) {
496
/* Return variables */
497
*resume_handle = *r.out.resume_handle;
504
NTSTATUS rpccli_lsa_CreateTrustedDomain(struct rpc_pipe_client *cli,
506
struct policy_handle *policy_handle /* [in] [ref] */,
507
struct lsa_DomainInfo *info /* [in] [ref] */,
508
uint32_t access_mask /* [in] */,
509
struct policy_handle *trustdom_handle /* [out] [ref] */)
511
struct lsa_CreateTrustedDomain r;
515
r.in.policy_handle = policy_handle;
517
r.in.access_mask = access_mask;
519
if (DEBUGLEVEL >= 10) {
520
NDR_PRINT_IN_DEBUG(lsa_CreateTrustedDomain, &r);
523
status = cli->dispatch(cli,
526
NDR_LSA_CREATETRUSTEDDOMAIN,
529
if (!NT_STATUS_IS_OK(status)) {
533
if (DEBUGLEVEL >= 10) {
534
NDR_PRINT_OUT_DEBUG(lsa_CreateTrustedDomain, &r);
537
if (NT_STATUS_IS_ERR(status)) {
541
/* Return variables */
542
*trustdom_handle = *r.out.trustdom_handle;
548
NTSTATUS rpccli_lsa_EnumTrustDom(struct rpc_pipe_client *cli,
550
struct policy_handle *handle /* [in] [ref] */,
551
uint32_t *resume_handle /* [in,out] [ref] */,
552
struct lsa_DomainList *domains /* [out] [ref] */,
553
uint32_t max_size /* [in] */)
555
struct lsa_EnumTrustDom r;
559
r.in.handle = handle;
560
r.in.resume_handle = resume_handle;
561
r.in.max_size = max_size;
563
if (DEBUGLEVEL >= 10) {
564
NDR_PRINT_IN_DEBUG(lsa_EnumTrustDom, &r);
567
status = cli->dispatch(cli,
570
NDR_LSA_ENUMTRUSTDOM,
573
if (!NT_STATUS_IS_OK(status)) {
577
if (DEBUGLEVEL >= 10) {
578
NDR_PRINT_OUT_DEBUG(lsa_EnumTrustDom, &r);
581
if (NT_STATUS_IS_ERR(status)) {
585
/* Return variables */
586
*resume_handle = *r.out.resume_handle;
587
*domains = *r.out.domains;
593
NTSTATUS rpccli_lsa_LookupNames(struct rpc_pipe_client *cli,
595
struct policy_handle *handle /* [in] [ref] */,
596
uint32_t num_names /* [in] [range(0,1000)] */,
597
struct lsa_String *names /* [in] [size_is(num_names)] */,
598
struct lsa_RefDomainList **domains /* [out] [ref] */,
599
struct lsa_TransSidArray *sids /* [in,out] [ref] */,
600
enum lsa_LookupNamesLevel level /* [in] */,
601
uint32_t *count /* [in,out] [ref] */)
603
struct lsa_LookupNames r;
607
r.in.handle = handle;
608
r.in.num_names = num_names;
614
if (DEBUGLEVEL >= 10) {
615
NDR_PRINT_IN_DEBUG(lsa_LookupNames, &r);
618
status = cli->dispatch(cli,
624
if (!NT_STATUS_IS_OK(status)) {
628
if (DEBUGLEVEL >= 10) {
629
NDR_PRINT_OUT_DEBUG(lsa_LookupNames, &r);
632
if (NT_STATUS_IS_ERR(status)) {
636
/* Return variables */
637
*domains = *r.out.domains;
639
*count = *r.out.count;
645
NTSTATUS rpccli_lsa_LookupSids(struct rpc_pipe_client *cli,
647
struct policy_handle *handle /* [in] [ref] */,
648
struct lsa_SidArray *sids /* [in] [ref] */,
649
struct lsa_RefDomainList **domains /* [out] [ref] */,
650
struct lsa_TransNameArray *names /* [in,out] [ref] */,
651
uint16_t level /* [in] */,
652
uint32_t *count /* [in,out] [ref] */)
654
struct lsa_LookupSids r;
658
r.in.handle = handle;
664
if (DEBUGLEVEL >= 10) {
665
NDR_PRINT_IN_DEBUG(lsa_LookupSids, &r);
668
status = cli->dispatch(cli,
674
if (!NT_STATUS_IS_OK(status)) {
678
if (DEBUGLEVEL >= 10) {
679
NDR_PRINT_OUT_DEBUG(lsa_LookupSids, &r);
682
if (NT_STATUS_IS_ERR(status)) {
686
/* Return variables */
687
*domains = *r.out.domains;
688
*names = *r.out.names;
689
*count = *r.out.count;
695
NTSTATUS rpccli_lsa_CreateSecret(struct rpc_pipe_client *cli,
697
struct policy_handle *handle /* [in] [ref] */,
698
struct lsa_String name /* [in] */,
699
uint32_t access_mask /* [in] */,
700
struct policy_handle *sec_handle /* [out] [ref] */)
702
struct lsa_CreateSecret r;
706
r.in.handle = handle;
708
r.in.access_mask = access_mask;
710
if (DEBUGLEVEL >= 10) {
711
NDR_PRINT_IN_DEBUG(lsa_CreateSecret, &r);
714
status = cli->dispatch(cli,
717
NDR_LSA_CREATESECRET,
720
if (!NT_STATUS_IS_OK(status)) {
724
if (DEBUGLEVEL >= 10) {
725
NDR_PRINT_OUT_DEBUG(lsa_CreateSecret, &r);
728
if (NT_STATUS_IS_ERR(status)) {
732
/* Return variables */
733
*sec_handle = *r.out.sec_handle;
739
NTSTATUS rpccli_lsa_OpenAccount(struct rpc_pipe_client *cli,
741
struct policy_handle *handle /* [in] [ref] */,
742
struct dom_sid2 *sid /* [in] [ref] */,
743
uint32_t access_mask /* [in] */,
744
struct policy_handle *acct_handle /* [out] [ref] */)
746
struct lsa_OpenAccount r;
750
r.in.handle = handle;
752
r.in.access_mask = access_mask;
754
if (DEBUGLEVEL >= 10) {
755
NDR_PRINT_IN_DEBUG(lsa_OpenAccount, &r);
758
status = cli->dispatch(cli,
764
if (!NT_STATUS_IS_OK(status)) {
768
if (DEBUGLEVEL >= 10) {
769
NDR_PRINT_OUT_DEBUG(lsa_OpenAccount, &r);
772
if (NT_STATUS_IS_ERR(status)) {
776
/* Return variables */
777
*acct_handle = *r.out.acct_handle;
783
NTSTATUS rpccli_lsa_EnumPrivsAccount(struct rpc_pipe_client *cli,
785
struct policy_handle *handle /* [in] [ref] */,
786
struct lsa_PrivilegeSet **privs /* [out] [ref] */)
788
struct lsa_EnumPrivsAccount r;
792
r.in.handle = handle;
794
if (DEBUGLEVEL >= 10) {
795
NDR_PRINT_IN_DEBUG(lsa_EnumPrivsAccount, &r);
798
status = cli->dispatch(cli,
801
NDR_LSA_ENUMPRIVSACCOUNT,
804
if (!NT_STATUS_IS_OK(status)) {
808
if (DEBUGLEVEL >= 10) {
809
NDR_PRINT_OUT_DEBUG(lsa_EnumPrivsAccount, &r);
812
if (NT_STATUS_IS_ERR(status)) {
816
/* Return variables */
817
*privs = *r.out.privs;
823
NTSTATUS rpccli_lsa_AddPrivilegesToAccount(struct rpc_pipe_client *cli,
825
struct policy_handle *handle /* [in] [ref] */,
826
struct lsa_PrivilegeSet *privs /* [in] [ref] */)
828
struct lsa_AddPrivilegesToAccount r;
832
r.in.handle = handle;
835
if (DEBUGLEVEL >= 10) {
836
NDR_PRINT_IN_DEBUG(lsa_AddPrivilegesToAccount, &r);
839
status = cli->dispatch(cli,
842
NDR_LSA_ADDPRIVILEGESTOACCOUNT,
845
if (!NT_STATUS_IS_OK(status)) {
849
if (DEBUGLEVEL >= 10) {
850
NDR_PRINT_OUT_DEBUG(lsa_AddPrivilegesToAccount, &r);
853
if (NT_STATUS_IS_ERR(status)) {
857
/* Return variables */
863
NTSTATUS rpccli_lsa_RemovePrivilegesFromAccount(struct rpc_pipe_client *cli,
865
struct policy_handle *handle /* [in] [ref] */,
866
uint8_t remove_all /* [in] */,
867
struct lsa_PrivilegeSet *privs /* [in] [unique] */)
869
struct lsa_RemovePrivilegesFromAccount r;
873
r.in.handle = handle;
874
r.in.remove_all = remove_all;
877
if (DEBUGLEVEL >= 10) {
878
NDR_PRINT_IN_DEBUG(lsa_RemovePrivilegesFromAccount, &r);
881
status = cli->dispatch(cli,
884
NDR_LSA_REMOVEPRIVILEGESFROMACCOUNT,
887
if (!NT_STATUS_IS_OK(status)) {
891
if (DEBUGLEVEL >= 10) {
892
NDR_PRINT_OUT_DEBUG(lsa_RemovePrivilegesFromAccount, &r);
895
if (NT_STATUS_IS_ERR(status)) {
899
/* Return variables */
905
NTSTATUS rpccli_lsa_GetQuotasForAccount(struct rpc_pipe_client *cli,
908
struct lsa_GetQuotasForAccount r;
913
if (DEBUGLEVEL >= 10) {
914
NDR_PRINT_IN_DEBUG(lsa_GetQuotasForAccount, &r);
917
status = cli->dispatch(cli,
920
NDR_LSA_GETQUOTASFORACCOUNT,
923
if (!NT_STATUS_IS_OK(status)) {
927
if (DEBUGLEVEL >= 10) {
928
NDR_PRINT_OUT_DEBUG(lsa_GetQuotasForAccount, &r);
931
if (NT_STATUS_IS_ERR(status)) {
935
/* Return variables */
941
NTSTATUS rpccli_lsa_SetQuotasForAccount(struct rpc_pipe_client *cli,
944
struct lsa_SetQuotasForAccount r;
949
if (DEBUGLEVEL >= 10) {
950
NDR_PRINT_IN_DEBUG(lsa_SetQuotasForAccount, &r);
953
status = cli->dispatch(cli,
956
NDR_LSA_SETQUOTASFORACCOUNT,
959
if (!NT_STATUS_IS_OK(status)) {
963
if (DEBUGLEVEL >= 10) {
964
NDR_PRINT_OUT_DEBUG(lsa_SetQuotasForAccount, &r);
967
if (NT_STATUS_IS_ERR(status)) {
971
/* Return variables */
977
NTSTATUS rpccli_lsa_GetSystemAccessAccount(struct rpc_pipe_client *cli,
979
struct policy_handle *handle /* [in] [ref] */,
980
uint32_t *access_mask /* [out] [ref] */)
982
struct lsa_GetSystemAccessAccount r;
986
r.in.handle = handle;
988
if (DEBUGLEVEL >= 10) {
989
NDR_PRINT_IN_DEBUG(lsa_GetSystemAccessAccount, &r);
992
status = cli->dispatch(cli,
995
NDR_LSA_GETSYSTEMACCESSACCOUNT,
998
if (!NT_STATUS_IS_OK(status)) {
1002
if (DEBUGLEVEL >= 10) {
1003
NDR_PRINT_OUT_DEBUG(lsa_GetSystemAccessAccount, &r);
1006
if (NT_STATUS_IS_ERR(status)) {
1010
/* Return variables */
1011
*access_mask = *r.out.access_mask;
1014
return r.out.result;
1017
NTSTATUS rpccli_lsa_SetSystemAccessAccount(struct rpc_pipe_client *cli,
1018
TALLOC_CTX *mem_ctx,
1019
struct policy_handle *handle /* [in] [ref] */,
1020
uint32_t access_mask /* [in] */)
1022
struct lsa_SetSystemAccessAccount r;
1026
r.in.handle = handle;
1027
r.in.access_mask = access_mask;
1029
if (DEBUGLEVEL >= 10) {
1030
NDR_PRINT_IN_DEBUG(lsa_SetSystemAccessAccount, &r);
1033
status = cli->dispatch(cli,
1036
NDR_LSA_SETSYSTEMACCESSACCOUNT,
1039
if (!NT_STATUS_IS_OK(status)) {
1043
if (DEBUGLEVEL >= 10) {
1044
NDR_PRINT_OUT_DEBUG(lsa_SetSystemAccessAccount, &r);
1047
if (NT_STATUS_IS_ERR(status)) {
1051
/* Return variables */
1054
return r.out.result;
1057
NTSTATUS rpccli_lsa_OpenTrustedDomain(struct rpc_pipe_client *cli,
1058
TALLOC_CTX *mem_ctx,
1059
struct policy_handle *handle /* [in] [ref] */,
1060
struct dom_sid2 *sid /* [in] [ref] */,
1061
uint32_t access_mask /* [in] */,
1062
struct policy_handle *trustdom_handle /* [out] [ref] */)
1064
struct lsa_OpenTrustedDomain r;
1068
r.in.handle = handle;
1070
r.in.access_mask = access_mask;
1072
if (DEBUGLEVEL >= 10) {
1073
NDR_PRINT_IN_DEBUG(lsa_OpenTrustedDomain, &r);
1076
status = cli->dispatch(cli,
1079
NDR_LSA_OPENTRUSTEDDOMAIN,
1082
if (!NT_STATUS_IS_OK(status)) {
1086
if (DEBUGLEVEL >= 10) {
1087
NDR_PRINT_OUT_DEBUG(lsa_OpenTrustedDomain, &r);
1090
if (NT_STATUS_IS_ERR(status)) {
1094
/* Return variables */
1095
*trustdom_handle = *r.out.trustdom_handle;
1098
return r.out.result;
1101
NTSTATUS rpccli_lsa_QueryTrustedDomainInfo(struct rpc_pipe_client *cli,
1102
TALLOC_CTX *mem_ctx,
1103
struct policy_handle *trustdom_handle /* [in] [ref] */,
1104
enum lsa_TrustDomInfoEnum level /* [in] */,
1105
union lsa_TrustedDomainInfo **info /* [out] [ref,switch_is(level)] */)
1107
struct lsa_QueryTrustedDomainInfo r;
1111
r.in.trustdom_handle = trustdom_handle;
1114
if (DEBUGLEVEL >= 10) {
1115
NDR_PRINT_IN_DEBUG(lsa_QueryTrustedDomainInfo, &r);
1118
status = cli->dispatch(cli,
1121
NDR_LSA_QUERYTRUSTEDDOMAININFO,
1124
if (!NT_STATUS_IS_OK(status)) {
1128
if (DEBUGLEVEL >= 10) {
1129
NDR_PRINT_OUT_DEBUG(lsa_QueryTrustedDomainInfo, &r);
1132
if (NT_STATUS_IS_ERR(status)) {
1136
/* Return variables */
1137
*info = *r.out.info;
1140
return r.out.result;
1143
NTSTATUS rpccli_lsa_SetInformationTrustedDomain(struct rpc_pipe_client *cli,
1144
TALLOC_CTX *mem_ctx,
1145
struct policy_handle *trustdom_handle /* [in] [ref] */,
1146
enum lsa_TrustDomInfoEnum level /* [in] */,
1147
union lsa_TrustedDomainInfo *info /* [in] [ref,switch_is(level)] */)
1149
struct lsa_SetInformationTrustedDomain r;
1153
r.in.trustdom_handle = trustdom_handle;
1157
if (DEBUGLEVEL >= 10) {
1158
NDR_PRINT_IN_DEBUG(lsa_SetInformationTrustedDomain, &r);
1161
status = cli->dispatch(cli,
1164
NDR_LSA_SETINFORMATIONTRUSTEDDOMAIN,
1167
if (!NT_STATUS_IS_OK(status)) {
1171
if (DEBUGLEVEL >= 10) {
1172
NDR_PRINT_OUT_DEBUG(lsa_SetInformationTrustedDomain, &r);
1175
if (NT_STATUS_IS_ERR(status)) {
1179
/* Return variables */
1182
return r.out.result;
1185
NTSTATUS rpccli_lsa_OpenSecret(struct rpc_pipe_client *cli,
1186
TALLOC_CTX *mem_ctx,
1187
struct policy_handle *handle /* [in] [ref] */,
1188
struct lsa_String name /* [in] */,
1189
uint32_t access_mask /* [in] */,
1190
struct policy_handle *sec_handle /* [out] [ref] */)
1192
struct lsa_OpenSecret r;
1196
r.in.handle = handle;
1198
r.in.access_mask = access_mask;
1200
if (DEBUGLEVEL >= 10) {
1201
NDR_PRINT_IN_DEBUG(lsa_OpenSecret, &r);
1204
status = cli->dispatch(cli,
1210
if (!NT_STATUS_IS_OK(status)) {
1214
if (DEBUGLEVEL >= 10) {
1215
NDR_PRINT_OUT_DEBUG(lsa_OpenSecret, &r);
1218
if (NT_STATUS_IS_ERR(status)) {
1222
/* Return variables */
1223
*sec_handle = *r.out.sec_handle;
1226
return r.out.result;
1229
NTSTATUS rpccli_lsa_SetSecret(struct rpc_pipe_client *cli,
1230
TALLOC_CTX *mem_ctx,
1231
struct policy_handle *sec_handle /* [in] [ref] */,
1232
struct lsa_DATA_BUF *new_val /* [in] [unique] */,
1233
struct lsa_DATA_BUF *old_val /* [in] [unique] */)
1235
struct lsa_SetSecret r;
1239
r.in.sec_handle = sec_handle;
1240
r.in.new_val = new_val;
1241
r.in.old_val = old_val;
1243
if (DEBUGLEVEL >= 10) {
1244
NDR_PRINT_IN_DEBUG(lsa_SetSecret, &r);
1247
status = cli->dispatch(cli,
1253
if (!NT_STATUS_IS_OK(status)) {
1257
if (DEBUGLEVEL >= 10) {
1258
NDR_PRINT_OUT_DEBUG(lsa_SetSecret, &r);
1261
if (NT_STATUS_IS_ERR(status)) {
1265
/* Return variables */
1268
return r.out.result;
1271
NTSTATUS rpccli_lsa_QuerySecret(struct rpc_pipe_client *cli,
1272
TALLOC_CTX *mem_ctx,
1273
struct policy_handle *sec_handle /* [in] [ref] */,
1274
struct lsa_DATA_BUF_PTR *new_val /* [in,out] [unique] */,
1275
NTTIME *new_mtime /* [in,out] [unique] */,
1276
struct lsa_DATA_BUF_PTR *old_val /* [in,out] [unique] */,
1277
NTTIME *old_mtime /* [in,out] [unique] */)
1279
struct lsa_QuerySecret r;
1283
r.in.sec_handle = sec_handle;
1284
r.in.new_val = new_val;
1285
r.in.new_mtime = new_mtime;
1286
r.in.old_val = old_val;
1287
r.in.old_mtime = old_mtime;
1289
if (DEBUGLEVEL >= 10) {
1290
NDR_PRINT_IN_DEBUG(lsa_QuerySecret, &r);
1293
status = cli->dispatch(cli,
1296
NDR_LSA_QUERYSECRET,
1299
if (!NT_STATUS_IS_OK(status)) {
1303
if (DEBUGLEVEL >= 10) {
1304
NDR_PRINT_OUT_DEBUG(lsa_QuerySecret, &r);
1307
if (NT_STATUS_IS_ERR(status)) {
1311
/* Return variables */
1312
if (new_val && r.out.new_val) {
1313
*new_val = *r.out.new_val;
1315
if (new_mtime && r.out.new_mtime) {
1316
*new_mtime = *r.out.new_mtime;
1318
if (old_val && r.out.old_val) {
1319
*old_val = *r.out.old_val;
1321
if (old_mtime && r.out.old_mtime) {
1322
*old_mtime = *r.out.old_mtime;
1326
return r.out.result;
1329
NTSTATUS rpccli_lsa_LookupPrivValue(struct rpc_pipe_client *cli,
1330
TALLOC_CTX *mem_ctx,
1331
struct policy_handle *handle /* [in] [ref] */,
1332
struct lsa_String *name /* [in] [ref] */,
1333
struct lsa_LUID *luid /* [out] [ref] */)
1335
struct lsa_LookupPrivValue r;
1339
r.in.handle = handle;
1342
if (DEBUGLEVEL >= 10) {
1343
NDR_PRINT_IN_DEBUG(lsa_LookupPrivValue, &r);
1346
status = cli->dispatch(cli,
1349
NDR_LSA_LOOKUPPRIVVALUE,
1352
if (!NT_STATUS_IS_OK(status)) {
1356
if (DEBUGLEVEL >= 10) {
1357
NDR_PRINT_OUT_DEBUG(lsa_LookupPrivValue, &r);
1360
if (NT_STATUS_IS_ERR(status)) {
1364
/* Return variables */
1365
*luid = *r.out.luid;
1368
return r.out.result;
1371
NTSTATUS rpccli_lsa_LookupPrivName(struct rpc_pipe_client *cli,
1372
TALLOC_CTX *mem_ctx,
1373
struct policy_handle *handle /* [in] [ref] */,
1374
struct lsa_LUID *luid /* [in] [ref] */,
1375
struct lsa_StringLarge **name /* [out] [ref] */)
1377
struct lsa_LookupPrivName r;
1381
r.in.handle = handle;
1384
if (DEBUGLEVEL >= 10) {
1385
NDR_PRINT_IN_DEBUG(lsa_LookupPrivName, &r);
1388
status = cli->dispatch(cli,
1391
NDR_LSA_LOOKUPPRIVNAME,
1394
if (!NT_STATUS_IS_OK(status)) {
1398
if (DEBUGLEVEL >= 10) {
1399
NDR_PRINT_OUT_DEBUG(lsa_LookupPrivName, &r);
1402
if (NT_STATUS_IS_ERR(status)) {
1406
/* Return variables */
1407
*name = *r.out.name;
1410
return r.out.result;
1413
NTSTATUS rpccli_lsa_LookupPrivDisplayName(struct rpc_pipe_client *cli,
1414
TALLOC_CTX *mem_ctx,
1415
struct policy_handle *handle /* [in] [ref] */,
1416
struct lsa_String *name /* [in] [ref] */,
1417
uint16_t language_id /* [in] */,
1418
uint16_t language_id_sys /* [in] */,
1419
struct lsa_StringLarge **disp_name /* [out] [ref] */,
1420
uint16_t *returned_language_id /* [out] [ref] */)
1422
struct lsa_LookupPrivDisplayName r;
1426
r.in.handle = handle;
1428
r.in.language_id = language_id;
1429
r.in.language_id_sys = language_id_sys;
1431
if (DEBUGLEVEL >= 10) {
1432
NDR_PRINT_IN_DEBUG(lsa_LookupPrivDisplayName, &r);
1435
status = cli->dispatch(cli,
1438
NDR_LSA_LOOKUPPRIVDISPLAYNAME,
1441
if (!NT_STATUS_IS_OK(status)) {
1445
if (DEBUGLEVEL >= 10) {
1446
NDR_PRINT_OUT_DEBUG(lsa_LookupPrivDisplayName, &r);
1449
if (NT_STATUS_IS_ERR(status)) {
1453
/* Return variables */
1454
*disp_name = *r.out.disp_name;
1455
*returned_language_id = *r.out.returned_language_id;
1458
return r.out.result;
1461
NTSTATUS rpccli_lsa_DeleteObject(struct rpc_pipe_client *cli,
1462
TALLOC_CTX *mem_ctx,
1463
struct policy_handle *handle /* [in,out] [ref] */)
1465
struct lsa_DeleteObject r;
1469
r.in.handle = handle;
1471
if (DEBUGLEVEL >= 10) {
1472
NDR_PRINT_IN_DEBUG(lsa_DeleteObject, &r);
1475
status = cli->dispatch(cli,
1478
NDR_LSA_DELETEOBJECT,
1481
if (!NT_STATUS_IS_OK(status)) {
1485
if (DEBUGLEVEL >= 10) {
1486
NDR_PRINT_OUT_DEBUG(lsa_DeleteObject, &r);
1489
if (NT_STATUS_IS_ERR(status)) {
1493
/* Return variables */
1494
*handle = *r.out.handle;
1497
return r.out.result;
1500
NTSTATUS rpccli_lsa_EnumAccountsWithUserRight(struct rpc_pipe_client *cli,
1501
TALLOC_CTX *mem_ctx,
1502
struct policy_handle *handle /* [in] [ref] */,
1503
struct lsa_String *name /* [in] [unique] */,
1504
struct lsa_SidArray *sids /* [out] [ref] */)
1506
struct lsa_EnumAccountsWithUserRight r;
1510
r.in.handle = handle;
1513
if (DEBUGLEVEL >= 10) {
1514
NDR_PRINT_IN_DEBUG(lsa_EnumAccountsWithUserRight, &r);
1517
status = cli->dispatch(cli,
1520
NDR_LSA_ENUMACCOUNTSWITHUSERRIGHT,
1523
if (!NT_STATUS_IS_OK(status)) {
1527
if (DEBUGLEVEL >= 10) {
1528
NDR_PRINT_OUT_DEBUG(lsa_EnumAccountsWithUserRight, &r);
1531
if (NT_STATUS_IS_ERR(status)) {
1535
/* Return variables */
1536
*sids = *r.out.sids;
1539
return r.out.result;
1542
NTSTATUS rpccli_lsa_EnumAccountRights(struct rpc_pipe_client *cli,
1543
TALLOC_CTX *mem_ctx,
1544
struct policy_handle *handle /* [in] [ref] */,
1545
struct dom_sid2 *sid /* [in] [ref] */,
1546
struct lsa_RightSet *rights /* [out] [ref] */)
1548
struct lsa_EnumAccountRights r;
1552
r.in.handle = handle;
1555
if (DEBUGLEVEL >= 10) {
1556
NDR_PRINT_IN_DEBUG(lsa_EnumAccountRights, &r);
1559
status = cli->dispatch(cli,
1562
NDR_LSA_ENUMACCOUNTRIGHTS,
1565
if (!NT_STATUS_IS_OK(status)) {
1569
if (DEBUGLEVEL >= 10) {
1570
NDR_PRINT_OUT_DEBUG(lsa_EnumAccountRights, &r);
1573
if (NT_STATUS_IS_ERR(status)) {
1577
/* Return variables */
1578
*rights = *r.out.rights;
1581
return r.out.result;
1584
NTSTATUS rpccli_lsa_AddAccountRights(struct rpc_pipe_client *cli,
1585
TALLOC_CTX *mem_ctx,
1586
struct policy_handle *handle /* [in] [ref] */,
1587
struct dom_sid2 *sid /* [in] [ref] */,
1588
struct lsa_RightSet *rights /* [in] [ref] */)
1590
struct lsa_AddAccountRights r;
1594
r.in.handle = handle;
1596
r.in.rights = rights;
1598
if (DEBUGLEVEL >= 10) {
1599
NDR_PRINT_IN_DEBUG(lsa_AddAccountRights, &r);
1602
status = cli->dispatch(cli,
1605
NDR_LSA_ADDACCOUNTRIGHTS,
1608
if (!NT_STATUS_IS_OK(status)) {
1612
if (DEBUGLEVEL >= 10) {
1613
NDR_PRINT_OUT_DEBUG(lsa_AddAccountRights, &r);
1616
if (NT_STATUS_IS_ERR(status)) {
1620
/* Return variables */
1623
return r.out.result;
1626
NTSTATUS rpccli_lsa_RemoveAccountRights(struct rpc_pipe_client *cli,
1627
TALLOC_CTX *mem_ctx,
1628
struct policy_handle *handle /* [in] [ref] */,
1629
struct dom_sid2 *sid /* [in] [ref] */,
1630
uint8_t remove_all /* [in] */,
1631
struct lsa_RightSet *rights /* [in] [ref] */)
1633
struct lsa_RemoveAccountRights r;
1637
r.in.handle = handle;
1639
r.in.remove_all = remove_all;
1640
r.in.rights = rights;
1642
if (DEBUGLEVEL >= 10) {
1643
NDR_PRINT_IN_DEBUG(lsa_RemoveAccountRights, &r);
1646
status = cli->dispatch(cli,
1649
NDR_LSA_REMOVEACCOUNTRIGHTS,
1652
if (!NT_STATUS_IS_OK(status)) {
1656
if (DEBUGLEVEL >= 10) {
1657
NDR_PRINT_OUT_DEBUG(lsa_RemoveAccountRights, &r);
1660
if (NT_STATUS_IS_ERR(status)) {
1664
/* Return variables */
1667
return r.out.result;
1670
NTSTATUS rpccli_lsa_QueryTrustedDomainInfoBySid(struct rpc_pipe_client *cli,
1671
TALLOC_CTX *mem_ctx,
1672
struct policy_handle *handle /* [in] [ref] */,
1673
struct dom_sid2 *dom_sid /* [in] [ref] */,
1674
enum lsa_TrustDomInfoEnum level /* [in] */,
1675
union lsa_TrustedDomainInfo **info /* [out] [ref,switch_is(level)] */)
1677
struct lsa_QueryTrustedDomainInfoBySid r;
1681
r.in.handle = handle;
1682
r.in.dom_sid = dom_sid;
1685
if (DEBUGLEVEL >= 10) {
1686
NDR_PRINT_IN_DEBUG(lsa_QueryTrustedDomainInfoBySid, &r);
1689
status = cli->dispatch(cli,
1692
NDR_LSA_QUERYTRUSTEDDOMAININFOBYSID,
1695
if (!NT_STATUS_IS_OK(status)) {
1699
if (DEBUGLEVEL >= 10) {
1700
NDR_PRINT_OUT_DEBUG(lsa_QueryTrustedDomainInfoBySid, &r);
1703
if (NT_STATUS_IS_ERR(status)) {
1707
/* Return variables */
1708
*info = *r.out.info;
1711
return r.out.result;
1714
NTSTATUS rpccli_lsa_SetTrustedDomainInfo(struct rpc_pipe_client *cli,
1715
TALLOC_CTX *mem_ctx,
1716
struct policy_handle *handle /* [in] [ref] */,
1717
struct dom_sid2 *dom_sid /* [in] [ref] */,
1718
enum lsa_TrustDomInfoEnum level /* [in] */,
1719
union lsa_TrustedDomainInfo *info /* [in] [ref,switch_is(level)] */)
1721
struct lsa_SetTrustedDomainInfo r;
1725
r.in.handle = handle;
1726
r.in.dom_sid = dom_sid;
1730
if (DEBUGLEVEL >= 10) {
1731
NDR_PRINT_IN_DEBUG(lsa_SetTrustedDomainInfo, &r);
1734
status = cli->dispatch(cli,
1737
NDR_LSA_SETTRUSTEDDOMAININFO,
1740
if (!NT_STATUS_IS_OK(status)) {
1744
if (DEBUGLEVEL >= 10) {
1745
NDR_PRINT_OUT_DEBUG(lsa_SetTrustedDomainInfo, &r);
1748
if (NT_STATUS_IS_ERR(status)) {
1752
/* Return variables */
1755
return r.out.result;
1758
NTSTATUS rpccli_lsa_DeleteTrustedDomain(struct rpc_pipe_client *cli,
1759
TALLOC_CTX *mem_ctx,
1760
struct policy_handle *handle /* [in] [ref] */,
1761
struct dom_sid2 *dom_sid /* [in] [ref] */)
1763
struct lsa_DeleteTrustedDomain r;
1767
r.in.handle = handle;
1768
r.in.dom_sid = dom_sid;
1770
if (DEBUGLEVEL >= 10) {
1771
NDR_PRINT_IN_DEBUG(lsa_DeleteTrustedDomain, &r);
1774
status = cli->dispatch(cli,
1777
NDR_LSA_DELETETRUSTEDDOMAIN,
1780
if (!NT_STATUS_IS_OK(status)) {
1784
if (DEBUGLEVEL >= 10) {
1785
NDR_PRINT_OUT_DEBUG(lsa_DeleteTrustedDomain, &r);
1788
if (NT_STATUS_IS_ERR(status)) {
1792
/* Return variables */
1795
return r.out.result;
1798
NTSTATUS rpccli_lsa_StorePrivateData(struct rpc_pipe_client *cli,
1799
TALLOC_CTX *mem_ctx)
1801
struct lsa_StorePrivateData r;
1806
if (DEBUGLEVEL >= 10) {
1807
NDR_PRINT_IN_DEBUG(lsa_StorePrivateData, &r);
1810
status = cli->dispatch(cli,
1813
NDR_LSA_STOREPRIVATEDATA,
1816
if (!NT_STATUS_IS_OK(status)) {
1820
if (DEBUGLEVEL >= 10) {
1821
NDR_PRINT_OUT_DEBUG(lsa_StorePrivateData, &r);
1824
if (NT_STATUS_IS_ERR(status)) {
1828
/* Return variables */
1831
return r.out.result;
1834
NTSTATUS rpccli_lsa_RetrievePrivateData(struct rpc_pipe_client *cli,
1835
TALLOC_CTX *mem_ctx)
1837
struct lsa_RetrievePrivateData r;
1842
if (DEBUGLEVEL >= 10) {
1843
NDR_PRINT_IN_DEBUG(lsa_RetrievePrivateData, &r);
1846
status = cli->dispatch(cli,
1849
NDR_LSA_RETRIEVEPRIVATEDATA,
1852
if (!NT_STATUS_IS_OK(status)) {
1856
if (DEBUGLEVEL >= 10) {
1857
NDR_PRINT_OUT_DEBUG(lsa_RetrievePrivateData, &r);
1860
if (NT_STATUS_IS_ERR(status)) {
1864
/* Return variables */
1867
return r.out.result;
1870
NTSTATUS rpccli_lsa_OpenPolicy2(struct rpc_pipe_client *cli,
1871
TALLOC_CTX *mem_ctx,
1872
const char *system_name /* [in] [unique,charset(UTF16)] */,
1873
struct lsa_ObjectAttribute *attr /* [in] [ref] */,
1874
uint32_t access_mask /* [in] */,
1875
struct policy_handle *handle /* [out] [ref] */)
1877
struct lsa_OpenPolicy2 r;
1881
r.in.system_name = system_name;
1883
r.in.access_mask = access_mask;
1885
if (DEBUGLEVEL >= 10) {
1886
NDR_PRINT_IN_DEBUG(lsa_OpenPolicy2, &r);
1889
status = cli->dispatch(cli,
1892
NDR_LSA_OPENPOLICY2,
1895
if (!NT_STATUS_IS_OK(status)) {
1899
if (DEBUGLEVEL >= 10) {
1900
NDR_PRINT_OUT_DEBUG(lsa_OpenPolicy2, &r);
1903
if (NT_STATUS_IS_ERR(status)) {
1907
/* Return variables */
1908
*handle = *r.out.handle;
1911
return r.out.result;
1914
NTSTATUS rpccli_lsa_GetUserName(struct rpc_pipe_client *cli,
1915
TALLOC_CTX *mem_ctx,
1916
const char *system_name /* [in] [unique,charset(UTF16)] */,
1917
struct lsa_String **account_name /* [in,out] [ref] */,
1918
struct lsa_String **authority_name /* [in,out] [unique] */)
1920
struct lsa_GetUserName r;
1924
r.in.system_name = system_name;
1925
r.in.account_name = account_name;
1926
r.in.authority_name = authority_name;
1928
if (DEBUGLEVEL >= 10) {
1929
NDR_PRINT_IN_DEBUG(lsa_GetUserName, &r);
1932
status = cli->dispatch(cli,
1935
NDR_LSA_GETUSERNAME,
1938
if (!NT_STATUS_IS_OK(status)) {
1942
if (DEBUGLEVEL >= 10) {
1943
NDR_PRINT_OUT_DEBUG(lsa_GetUserName, &r);
1946
if (NT_STATUS_IS_ERR(status)) {
1950
/* Return variables */
1951
*account_name = *r.out.account_name;
1952
if (authority_name && r.out.authority_name) {
1953
*authority_name = *r.out.authority_name;
1957
return r.out.result;
1960
NTSTATUS rpccli_lsa_QueryInfoPolicy2(struct rpc_pipe_client *cli,
1961
TALLOC_CTX *mem_ctx,
1962
struct policy_handle *handle /* [in] [ref] */,
1963
enum lsa_PolicyInfo level /* [in] */,
1964
union lsa_PolicyInformation **info /* [out] [ref,switch_is(level)] */)
1966
struct lsa_QueryInfoPolicy2 r;
1970
r.in.handle = handle;
1973
if (DEBUGLEVEL >= 10) {
1974
NDR_PRINT_IN_DEBUG(lsa_QueryInfoPolicy2, &r);
1977
status = cli->dispatch(cli,
1980
NDR_LSA_QUERYINFOPOLICY2,
1983
if (!NT_STATUS_IS_OK(status)) {
1987
if (DEBUGLEVEL >= 10) {
1988
NDR_PRINT_OUT_DEBUG(lsa_QueryInfoPolicy2, &r);
1991
if (NT_STATUS_IS_ERR(status)) {
1995
/* Return variables */
1996
*info = *r.out.info;
1999
return r.out.result;
2002
NTSTATUS rpccli_lsa_SetInfoPolicy2(struct rpc_pipe_client *cli,
2003
TALLOC_CTX *mem_ctx,
2004
struct policy_handle *handle /* [in] [ref] */,
2005
enum lsa_PolicyInfo level /* [in] */,
2006
union lsa_PolicyInformation *info /* [in] [ref,switch_is(level)] */)
2008
struct lsa_SetInfoPolicy2 r;
2012
r.in.handle = handle;
2016
if (DEBUGLEVEL >= 10) {
2017
NDR_PRINT_IN_DEBUG(lsa_SetInfoPolicy2, &r);
2020
status = cli->dispatch(cli,
2023
NDR_LSA_SETINFOPOLICY2,
2026
if (!NT_STATUS_IS_OK(status)) {
2030
if (DEBUGLEVEL >= 10) {
2031
NDR_PRINT_OUT_DEBUG(lsa_SetInfoPolicy2, &r);
2034
if (NT_STATUS_IS_ERR(status)) {
2038
/* Return variables */
2041
return r.out.result;
2044
NTSTATUS rpccli_lsa_QueryTrustedDomainInfoByName(struct rpc_pipe_client *cli,
2045
TALLOC_CTX *mem_ctx,
2046
struct policy_handle *handle /* [in] [ref] */,
2047
struct lsa_String *trusted_domain /* [in] [ref] */,
2048
enum lsa_TrustDomInfoEnum level /* [in] */,
2049
union lsa_TrustedDomainInfo **info /* [out] [ref,switch_is(level)] */)
2051
struct lsa_QueryTrustedDomainInfoByName r;
2055
r.in.handle = handle;
2056
r.in.trusted_domain = trusted_domain;
2059
if (DEBUGLEVEL >= 10) {
2060
NDR_PRINT_IN_DEBUG(lsa_QueryTrustedDomainInfoByName, &r);
2063
status = cli->dispatch(cli,
2066
NDR_LSA_QUERYTRUSTEDDOMAININFOBYNAME,
2069
if (!NT_STATUS_IS_OK(status)) {
2073
if (DEBUGLEVEL >= 10) {
2074
NDR_PRINT_OUT_DEBUG(lsa_QueryTrustedDomainInfoByName, &r);
2077
if (NT_STATUS_IS_ERR(status)) {
2081
/* Return variables */
2082
*info = *r.out.info;
2085
return r.out.result;
2088
NTSTATUS rpccli_lsa_SetTrustedDomainInfoByName(struct rpc_pipe_client *cli,
2089
TALLOC_CTX *mem_ctx,
2090
struct policy_handle *handle /* [in] [ref] */,
2091
struct lsa_String trusted_domain /* [in] */,
2092
enum lsa_TrustDomInfoEnum level /* [in] */,
2093
union lsa_TrustedDomainInfo *info /* [in] [unique,switch_is(level)] */)
2095
struct lsa_SetTrustedDomainInfoByName r;
2099
r.in.handle = handle;
2100
r.in.trusted_domain = trusted_domain;
2104
if (DEBUGLEVEL >= 10) {
2105
NDR_PRINT_IN_DEBUG(lsa_SetTrustedDomainInfoByName, &r);
2108
status = cli->dispatch(cli,
2111
NDR_LSA_SETTRUSTEDDOMAININFOBYNAME,
2114
if (!NT_STATUS_IS_OK(status)) {
2118
if (DEBUGLEVEL >= 10) {
2119
NDR_PRINT_OUT_DEBUG(lsa_SetTrustedDomainInfoByName, &r);
2122
if (NT_STATUS_IS_ERR(status)) {
2126
/* Return variables */
2129
return r.out.result;
2132
NTSTATUS rpccli_lsa_EnumTrustedDomainsEx(struct rpc_pipe_client *cli,
2133
TALLOC_CTX *mem_ctx,
2134
struct policy_handle *handle /* [in] [ref] */,
2135
uint32_t *resume_handle /* [in,out] [ref] */,
2136
struct lsa_DomainListEx *domains /* [out] [ref] */,
2137
uint32_t max_size /* [in] */)
2139
struct lsa_EnumTrustedDomainsEx r;
2143
r.in.handle = handle;
2144
r.in.resume_handle = resume_handle;
2145
r.in.max_size = max_size;
2147
if (DEBUGLEVEL >= 10) {
2148
NDR_PRINT_IN_DEBUG(lsa_EnumTrustedDomainsEx, &r);
2151
status = cli->dispatch(cli,
2154
NDR_LSA_ENUMTRUSTEDDOMAINSEX,
2157
if (!NT_STATUS_IS_OK(status)) {
2161
if (DEBUGLEVEL >= 10) {
2162
NDR_PRINT_OUT_DEBUG(lsa_EnumTrustedDomainsEx, &r);
2165
if (NT_STATUS_IS_ERR(status)) {
2169
/* Return variables */
2170
*resume_handle = *r.out.resume_handle;
2171
*domains = *r.out.domains;
2174
return r.out.result;
2177
NTSTATUS rpccli_lsa_CreateTrustedDomainEx(struct rpc_pipe_client *cli,
2178
TALLOC_CTX *mem_ctx,
2179
struct policy_handle *policy_handle /* [in] [ref] */,
2180
struct lsa_TrustDomainInfoInfoEx *info /* [in] [ref] */,
2181
struct lsa_TrustDomainInfoAuthInfoInternal *auth_info /* [in] [ref] */,
2182
uint32_t access_mask /* [in] */,
2183
struct policy_handle *trustdom_handle /* [out] [ref] */)
2185
struct lsa_CreateTrustedDomainEx r;
2189
r.in.policy_handle = policy_handle;
2191
r.in.auth_info = auth_info;
2192
r.in.access_mask = access_mask;
2194
if (DEBUGLEVEL >= 10) {
2195
NDR_PRINT_IN_DEBUG(lsa_CreateTrustedDomainEx, &r);
2198
status = cli->dispatch(cli,
2201
NDR_LSA_CREATETRUSTEDDOMAINEX,
2204
if (!NT_STATUS_IS_OK(status)) {
2208
if (DEBUGLEVEL >= 10) {
2209
NDR_PRINT_OUT_DEBUG(lsa_CreateTrustedDomainEx, &r);
2212
if (NT_STATUS_IS_ERR(status)) {
2216
/* Return variables */
2217
*trustdom_handle = *r.out.trustdom_handle;
2220
return r.out.result;
2223
NTSTATUS rpccli_lsa_CloseTrustedDomainEx(struct rpc_pipe_client *cli,
2224
TALLOC_CTX *mem_ctx,
2225
struct policy_handle *handle /* [in,out] [ref] */)
2227
struct lsa_CloseTrustedDomainEx r;
2231
r.in.handle = handle;
2233
if (DEBUGLEVEL >= 10) {
2234
NDR_PRINT_IN_DEBUG(lsa_CloseTrustedDomainEx, &r);
2237
status = cli->dispatch(cli,
2240
NDR_LSA_CLOSETRUSTEDDOMAINEX,
2243
if (!NT_STATUS_IS_OK(status)) {
2247
if (DEBUGLEVEL >= 10) {
2248
NDR_PRINT_OUT_DEBUG(lsa_CloseTrustedDomainEx, &r);
2251
if (NT_STATUS_IS_ERR(status)) {
2255
/* Return variables */
2256
*handle = *r.out.handle;
2259
return r.out.result;
2262
NTSTATUS rpccli_lsa_QueryDomainInformationPolicy(struct rpc_pipe_client *cli,
2263
TALLOC_CTX *mem_ctx,
2264
struct policy_handle *handle /* [in] [ref] */,
2265
uint16_t level /* [in] */,
2266
union lsa_DomainInformationPolicy **info /* [out] [ref,switch_is(level)] */)
2268
struct lsa_QueryDomainInformationPolicy r;
2272
r.in.handle = handle;
2275
if (DEBUGLEVEL >= 10) {
2276
NDR_PRINT_IN_DEBUG(lsa_QueryDomainInformationPolicy, &r);
2279
status = cli->dispatch(cli,
2282
NDR_LSA_QUERYDOMAININFORMATIONPOLICY,
2285
if (!NT_STATUS_IS_OK(status)) {
2289
if (DEBUGLEVEL >= 10) {
2290
NDR_PRINT_OUT_DEBUG(lsa_QueryDomainInformationPolicy, &r);
2293
if (NT_STATUS_IS_ERR(status)) {
2297
/* Return variables */
2298
*info = *r.out.info;
2301
return r.out.result;
2304
NTSTATUS rpccli_lsa_SetDomainInformationPolicy(struct rpc_pipe_client *cli,
2305
TALLOC_CTX *mem_ctx,
2306
struct policy_handle *handle /* [in] [ref] */,
2307
uint16_t level /* [in] */,
2308
union lsa_DomainInformationPolicy *info /* [in] [unique,switch_is(level)] */)
2310
struct lsa_SetDomainInformationPolicy r;
2314
r.in.handle = handle;
2318
if (DEBUGLEVEL >= 10) {
2319
NDR_PRINT_IN_DEBUG(lsa_SetDomainInformationPolicy, &r);
2322
status = cli->dispatch(cli,
2325
NDR_LSA_SETDOMAININFORMATIONPOLICY,
2328
if (!NT_STATUS_IS_OK(status)) {
2332
if (DEBUGLEVEL >= 10) {
2333
NDR_PRINT_OUT_DEBUG(lsa_SetDomainInformationPolicy, &r);
2336
if (NT_STATUS_IS_ERR(status)) {
2340
/* Return variables */
2343
return r.out.result;
2346
NTSTATUS rpccli_lsa_OpenTrustedDomainByName(struct rpc_pipe_client *cli,
2347
TALLOC_CTX *mem_ctx,
2348
struct policy_handle *handle /* [in] [ref] */,
2349
struct lsa_String name /* [in] */,
2350
uint32_t access_mask /* [in] */,
2351
struct policy_handle *trustdom_handle /* [out] [ref] */)
2353
struct lsa_OpenTrustedDomainByName r;
2357
r.in.handle = handle;
2359
r.in.access_mask = access_mask;
2361
if (DEBUGLEVEL >= 10) {
2362
NDR_PRINT_IN_DEBUG(lsa_OpenTrustedDomainByName, &r);
2365
status = cli->dispatch(cli,
2368
NDR_LSA_OPENTRUSTEDDOMAINBYNAME,
2371
if (!NT_STATUS_IS_OK(status)) {
2375
if (DEBUGLEVEL >= 10) {
2376
NDR_PRINT_OUT_DEBUG(lsa_OpenTrustedDomainByName, &r);
2379
if (NT_STATUS_IS_ERR(status)) {
2383
/* Return variables */
2384
*trustdom_handle = *r.out.trustdom_handle;
2387
return r.out.result;
2390
NTSTATUS rpccli_lsa_TestCall(struct rpc_pipe_client *cli,
2391
TALLOC_CTX *mem_ctx)
2393
struct lsa_TestCall r;
2398
if (DEBUGLEVEL >= 10) {
2399
NDR_PRINT_IN_DEBUG(lsa_TestCall, &r);
2402
status = cli->dispatch(cli,
2408
if (!NT_STATUS_IS_OK(status)) {
2412
if (DEBUGLEVEL >= 10) {
2413
NDR_PRINT_OUT_DEBUG(lsa_TestCall, &r);
2416
if (NT_STATUS_IS_ERR(status)) {
2420
/* Return variables */
2423
return r.out.result;
2426
NTSTATUS rpccli_lsa_LookupSids2(struct rpc_pipe_client *cli,
2427
TALLOC_CTX *mem_ctx,
2428
struct policy_handle *handle /* [in] [ref] */,
2429
struct lsa_SidArray *sids /* [in] [ref] */,
2430
struct lsa_RefDomainList **domains /* [out] [ref] */,
2431
struct lsa_TransNameArray2 *names /* [in,out] [ref] */,
2432
uint16_t level /* [in] */,
2433
uint32_t *count /* [in,out] [ref] */,
2434
uint32_t unknown1 /* [in] */,
2435
uint32_t unknown2 /* [in] */)
2437
struct lsa_LookupSids2 r;
2441
r.in.handle = handle;
2446
r.in.unknown1 = unknown1;
2447
r.in.unknown2 = unknown2;
2449
if (DEBUGLEVEL >= 10) {
2450
NDR_PRINT_IN_DEBUG(lsa_LookupSids2, &r);
2453
status = cli->dispatch(cli,
2456
NDR_LSA_LOOKUPSIDS2,
2459
if (!NT_STATUS_IS_OK(status)) {
2463
if (DEBUGLEVEL >= 10) {
2464
NDR_PRINT_OUT_DEBUG(lsa_LookupSids2, &r);
2467
if (NT_STATUS_IS_ERR(status)) {
2471
/* Return variables */
2472
*domains = *r.out.domains;
2473
*names = *r.out.names;
2474
*count = *r.out.count;
2477
return r.out.result;
2480
NTSTATUS rpccli_lsa_LookupNames2(struct rpc_pipe_client *cli,
2481
TALLOC_CTX *mem_ctx,
2482
struct policy_handle *handle /* [in] [ref] */,
2483
uint32_t num_names /* [in] [range(0,1000)] */,
2484
struct lsa_String *names /* [in] [size_is(num_names)] */,
2485
struct lsa_RefDomainList **domains /* [out] [ref] */,
2486
struct lsa_TransSidArray2 *sids /* [in,out] [ref] */,
2487
enum lsa_LookupNamesLevel level /* [in] */,
2488
uint32_t *count /* [in,out] [ref] */,
2489
uint32_t lookup_options /* [in] */,
2490
uint32_t client_revision /* [in] */)
2492
struct lsa_LookupNames2 r;
2496
r.in.handle = handle;
2497
r.in.num_names = num_names;
2502
r.in.lookup_options = lookup_options;
2503
r.in.client_revision = client_revision;
2505
if (DEBUGLEVEL >= 10) {
2506
NDR_PRINT_IN_DEBUG(lsa_LookupNames2, &r);
2509
status = cli->dispatch(cli,
2512
NDR_LSA_LOOKUPNAMES2,
2515
if (!NT_STATUS_IS_OK(status)) {
2519
if (DEBUGLEVEL >= 10) {
2520
NDR_PRINT_OUT_DEBUG(lsa_LookupNames2, &r);
2523
if (NT_STATUS_IS_ERR(status)) {
2527
/* Return variables */
2528
*domains = *r.out.domains;
2529
*sids = *r.out.sids;
2530
*count = *r.out.count;
2533
return r.out.result;
2536
NTSTATUS rpccli_lsa_CreateTrustedDomainEx2(struct rpc_pipe_client *cli,
2537
TALLOC_CTX *mem_ctx,
2538
struct policy_handle *policy_handle /* [in] [ref] */,
2539
struct lsa_TrustDomainInfoInfoEx *info /* [in] [ref] */,
2540
struct lsa_TrustDomainInfoAuthInfoInternal *auth_info /* [in] [ref] */,
2541
uint32_t access_mask /* [in] */,
2542
struct policy_handle *trustdom_handle /* [out] [ref] */)
2544
struct lsa_CreateTrustedDomainEx2 r;
2548
r.in.policy_handle = policy_handle;
2550
r.in.auth_info = auth_info;
2551
r.in.access_mask = access_mask;
2553
if (DEBUGLEVEL >= 10) {
2554
NDR_PRINT_IN_DEBUG(lsa_CreateTrustedDomainEx2, &r);
2557
status = cli->dispatch(cli,
2560
NDR_LSA_CREATETRUSTEDDOMAINEX2,
2563
if (!NT_STATUS_IS_OK(status)) {
2567
if (DEBUGLEVEL >= 10) {
2568
NDR_PRINT_OUT_DEBUG(lsa_CreateTrustedDomainEx2, &r);
2571
if (NT_STATUS_IS_ERR(status)) {
2575
/* Return variables */
2576
*trustdom_handle = *r.out.trustdom_handle;
2579
return r.out.result;
2582
NTSTATUS rpccli_lsa_CREDRWRITE(struct rpc_pipe_client *cli,
2583
TALLOC_CTX *mem_ctx)
2585
struct lsa_CREDRWRITE r;
2590
if (DEBUGLEVEL >= 10) {
2591
NDR_PRINT_IN_DEBUG(lsa_CREDRWRITE, &r);
2594
status = cli->dispatch(cli,
2600
if (!NT_STATUS_IS_OK(status)) {
2604
if (DEBUGLEVEL >= 10) {
2605
NDR_PRINT_OUT_DEBUG(lsa_CREDRWRITE, &r);
2608
if (NT_STATUS_IS_ERR(status)) {
2612
/* Return variables */
2615
return r.out.result;
2618
NTSTATUS rpccli_lsa_CREDRREAD(struct rpc_pipe_client *cli,
2619
TALLOC_CTX *mem_ctx)
2621
struct lsa_CREDRREAD r;
2626
if (DEBUGLEVEL >= 10) {
2627
NDR_PRINT_IN_DEBUG(lsa_CREDRREAD, &r);
2630
status = cli->dispatch(cli,
2636
if (!NT_STATUS_IS_OK(status)) {
2640
if (DEBUGLEVEL >= 10) {
2641
NDR_PRINT_OUT_DEBUG(lsa_CREDRREAD, &r);
2644
if (NT_STATUS_IS_ERR(status)) {
2648
/* Return variables */
2651
return r.out.result;
2654
NTSTATUS rpccli_lsa_CREDRENUMERATE(struct rpc_pipe_client *cli,
2655
TALLOC_CTX *mem_ctx)
2657
struct lsa_CREDRENUMERATE r;
2662
if (DEBUGLEVEL >= 10) {
2663
NDR_PRINT_IN_DEBUG(lsa_CREDRENUMERATE, &r);
2666
status = cli->dispatch(cli,
2669
NDR_LSA_CREDRENUMERATE,
2672
if (!NT_STATUS_IS_OK(status)) {
2676
if (DEBUGLEVEL >= 10) {
2677
NDR_PRINT_OUT_DEBUG(lsa_CREDRENUMERATE, &r);
2680
if (NT_STATUS_IS_ERR(status)) {
2684
/* Return variables */
2687
return r.out.result;
2690
NTSTATUS rpccli_lsa_CREDRWRITEDOMAINCREDENTIALS(struct rpc_pipe_client *cli,
2691
TALLOC_CTX *mem_ctx)
2693
struct lsa_CREDRWRITEDOMAINCREDENTIALS r;
2698
if (DEBUGLEVEL >= 10) {
2699
NDR_PRINT_IN_DEBUG(lsa_CREDRWRITEDOMAINCREDENTIALS, &r);
2702
status = cli->dispatch(cli,
2705
NDR_LSA_CREDRWRITEDOMAINCREDENTIALS,
2708
if (!NT_STATUS_IS_OK(status)) {
2712
if (DEBUGLEVEL >= 10) {
2713
NDR_PRINT_OUT_DEBUG(lsa_CREDRWRITEDOMAINCREDENTIALS, &r);
2716
if (NT_STATUS_IS_ERR(status)) {
2720
/* Return variables */
2723
return r.out.result;
2726
NTSTATUS rpccli_lsa_CREDRREADDOMAINCREDENTIALS(struct rpc_pipe_client *cli,
2727
TALLOC_CTX *mem_ctx)
2729
struct lsa_CREDRREADDOMAINCREDENTIALS r;
2734
if (DEBUGLEVEL >= 10) {
2735
NDR_PRINT_IN_DEBUG(lsa_CREDRREADDOMAINCREDENTIALS, &r);
2738
status = cli->dispatch(cli,
2741
NDR_LSA_CREDRREADDOMAINCREDENTIALS,
2744
if (!NT_STATUS_IS_OK(status)) {
2748
if (DEBUGLEVEL >= 10) {
2749
NDR_PRINT_OUT_DEBUG(lsa_CREDRREADDOMAINCREDENTIALS, &r);
2752
if (NT_STATUS_IS_ERR(status)) {
2756
/* Return variables */
2759
return r.out.result;
2762
NTSTATUS rpccli_lsa_CREDRDELETE(struct rpc_pipe_client *cli,
2763
TALLOC_CTX *mem_ctx)
2765
struct lsa_CREDRDELETE r;
2770
if (DEBUGLEVEL >= 10) {
2771
NDR_PRINT_IN_DEBUG(lsa_CREDRDELETE, &r);
2774
status = cli->dispatch(cli,
2777
NDR_LSA_CREDRDELETE,
2780
if (!NT_STATUS_IS_OK(status)) {
2784
if (DEBUGLEVEL >= 10) {
2785
NDR_PRINT_OUT_DEBUG(lsa_CREDRDELETE, &r);
2788
if (NT_STATUS_IS_ERR(status)) {
2792
/* Return variables */
2795
return r.out.result;
2798
NTSTATUS rpccli_lsa_CREDRGETTARGETINFO(struct rpc_pipe_client *cli,
2799
TALLOC_CTX *mem_ctx)
2801
struct lsa_CREDRGETTARGETINFO r;
2806
if (DEBUGLEVEL >= 10) {
2807
NDR_PRINT_IN_DEBUG(lsa_CREDRGETTARGETINFO, &r);
2810
status = cli->dispatch(cli,
2813
NDR_LSA_CREDRGETTARGETINFO,
2816
if (!NT_STATUS_IS_OK(status)) {
2820
if (DEBUGLEVEL >= 10) {
2821
NDR_PRINT_OUT_DEBUG(lsa_CREDRGETTARGETINFO, &r);
2824
if (NT_STATUS_IS_ERR(status)) {
2828
/* Return variables */
2831
return r.out.result;
2834
NTSTATUS rpccli_lsa_CREDRPROFILELOADED(struct rpc_pipe_client *cli,
2835
TALLOC_CTX *mem_ctx)
2837
struct lsa_CREDRPROFILELOADED r;
2842
if (DEBUGLEVEL >= 10) {
2843
NDR_PRINT_IN_DEBUG(lsa_CREDRPROFILELOADED, &r);
2846
status = cli->dispatch(cli,
2849
NDR_LSA_CREDRPROFILELOADED,
2852
if (!NT_STATUS_IS_OK(status)) {
2856
if (DEBUGLEVEL >= 10) {
2857
NDR_PRINT_OUT_DEBUG(lsa_CREDRPROFILELOADED, &r);
2860
if (NT_STATUS_IS_ERR(status)) {
2864
/* Return variables */
2867
return r.out.result;
2870
NTSTATUS rpccli_lsa_LookupNames3(struct rpc_pipe_client *cli,
2871
TALLOC_CTX *mem_ctx,
2872
struct policy_handle *handle /* [in] [ref] */,
2873
uint32_t num_names /* [in] [range(0,1000)] */,
2874
struct lsa_String *names /* [in] [size_is(num_names)] */,
2875
struct lsa_RefDomainList **domains /* [out] [ref] */,
2876
struct lsa_TransSidArray3 *sids /* [in,out] [ref] */,
2877
enum lsa_LookupNamesLevel level /* [in] */,
2878
uint32_t *count /* [in,out] [ref] */,
2879
uint32_t lookup_options /* [in] */,
2880
uint32_t client_revision /* [in] */)
2882
struct lsa_LookupNames3 r;
2886
r.in.handle = handle;
2887
r.in.num_names = num_names;
2892
r.in.lookup_options = lookup_options;
2893
r.in.client_revision = client_revision;
2895
if (DEBUGLEVEL >= 10) {
2896
NDR_PRINT_IN_DEBUG(lsa_LookupNames3, &r);
2899
status = cli->dispatch(cli,
2902
NDR_LSA_LOOKUPNAMES3,
2905
if (!NT_STATUS_IS_OK(status)) {
2909
if (DEBUGLEVEL >= 10) {
2910
NDR_PRINT_OUT_DEBUG(lsa_LookupNames3, &r);
2913
if (NT_STATUS_IS_ERR(status)) {
2917
/* Return variables */
2918
*domains = *r.out.domains;
2919
*sids = *r.out.sids;
2920
*count = *r.out.count;
2923
return r.out.result;
2926
NTSTATUS rpccli_lsa_CREDRGETSESSIONTYPES(struct rpc_pipe_client *cli,
2927
TALLOC_CTX *mem_ctx)
2929
struct lsa_CREDRGETSESSIONTYPES r;
2934
if (DEBUGLEVEL >= 10) {
2935
NDR_PRINT_IN_DEBUG(lsa_CREDRGETSESSIONTYPES, &r);
2938
status = cli->dispatch(cli,
2941
NDR_LSA_CREDRGETSESSIONTYPES,
2944
if (!NT_STATUS_IS_OK(status)) {
2948
if (DEBUGLEVEL >= 10) {
2949
NDR_PRINT_OUT_DEBUG(lsa_CREDRGETSESSIONTYPES, &r);
2952
if (NT_STATUS_IS_ERR(status)) {
2956
/* Return variables */
2959
return r.out.result;
2962
NTSTATUS rpccli_lsa_LSARREGISTERAUDITEVENT(struct rpc_pipe_client *cli,
2963
TALLOC_CTX *mem_ctx)
2965
struct lsa_LSARREGISTERAUDITEVENT r;
2970
if (DEBUGLEVEL >= 10) {
2971
NDR_PRINT_IN_DEBUG(lsa_LSARREGISTERAUDITEVENT, &r);
2974
status = cli->dispatch(cli,
2977
NDR_LSA_LSARREGISTERAUDITEVENT,
2980
if (!NT_STATUS_IS_OK(status)) {
2984
if (DEBUGLEVEL >= 10) {
2985
NDR_PRINT_OUT_DEBUG(lsa_LSARREGISTERAUDITEVENT, &r);
2988
if (NT_STATUS_IS_ERR(status)) {
2992
/* Return variables */
2995
return r.out.result;
2998
NTSTATUS rpccli_lsa_LSARGENAUDITEVENT(struct rpc_pipe_client *cli,
2999
TALLOC_CTX *mem_ctx)
3001
struct lsa_LSARGENAUDITEVENT r;
3006
if (DEBUGLEVEL >= 10) {
3007
NDR_PRINT_IN_DEBUG(lsa_LSARGENAUDITEVENT, &r);
3010
status = cli->dispatch(cli,
3013
NDR_LSA_LSARGENAUDITEVENT,
3016
if (!NT_STATUS_IS_OK(status)) {
3020
if (DEBUGLEVEL >= 10) {
3021
NDR_PRINT_OUT_DEBUG(lsa_LSARGENAUDITEVENT, &r);
3024
if (NT_STATUS_IS_ERR(status)) {
3028
/* Return variables */
3031
return r.out.result;
3034
NTSTATUS rpccli_lsa_LSARUNREGISTERAUDITEVENT(struct rpc_pipe_client *cli,
3035
TALLOC_CTX *mem_ctx)
3037
struct lsa_LSARUNREGISTERAUDITEVENT r;
3042
if (DEBUGLEVEL >= 10) {
3043
NDR_PRINT_IN_DEBUG(lsa_LSARUNREGISTERAUDITEVENT, &r);
3046
status = cli->dispatch(cli,
3049
NDR_LSA_LSARUNREGISTERAUDITEVENT,
3052
if (!NT_STATUS_IS_OK(status)) {
3056
if (DEBUGLEVEL >= 10) {
3057
NDR_PRINT_OUT_DEBUG(lsa_LSARUNREGISTERAUDITEVENT, &r);
3060
if (NT_STATUS_IS_ERR(status)) {
3064
/* Return variables */
3067
return r.out.result;
3070
NTSTATUS rpccli_lsa_lsaRQueryForestTrustInformation(struct rpc_pipe_client *cli,
3071
TALLOC_CTX *mem_ctx,
3072
struct policy_handle *handle /* [in] [ref] */,
3073
struct lsa_String *trusted_domain_name /* [in] [ref] */,
3074
uint16_t unknown /* [in] */,
3075
struct lsa_ForestTrustInformation **forest_trust_info /* [out] [ref] */)
3077
struct lsa_lsaRQueryForestTrustInformation r;
3081
r.in.handle = handle;
3082
r.in.trusted_domain_name = trusted_domain_name;
3083
r.in.unknown = unknown;
3085
if (DEBUGLEVEL >= 10) {
3086
NDR_PRINT_IN_DEBUG(lsa_lsaRQueryForestTrustInformation, &r);
3089
status = cli->dispatch(cli,
3092
NDR_LSA_LSARQUERYFORESTTRUSTINFORMATION,
3095
if (!NT_STATUS_IS_OK(status)) {
3099
if (DEBUGLEVEL >= 10) {
3100
NDR_PRINT_OUT_DEBUG(lsa_lsaRQueryForestTrustInformation, &r);
3103
if (NT_STATUS_IS_ERR(status)) {
3107
/* Return variables */
3108
*forest_trust_info = *r.out.forest_trust_info;
3111
return r.out.result;
3114
NTSTATUS rpccli_lsa_LSARSETFORESTTRUSTINFORMATION(struct rpc_pipe_client *cli,
3115
TALLOC_CTX *mem_ctx)
3117
struct lsa_LSARSETFORESTTRUSTINFORMATION r;
3122
if (DEBUGLEVEL >= 10) {
3123
NDR_PRINT_IN_DEBUG(lsa_LSARSETFORESTTRUSTINFORMATION, &r);
3126
status = cli->dispatch(cli,
3129
NDR_LSA_LSARSETFORESTTRUSTINFORMATION,
3132
if (!NT_STATUS_IS_OK(status)) {
3136
if (DEBUGLEVEL >= 10) {
3137
NDR_PRINT_OUT_DEBUG(lsa_LSARSETFORESTTRUSTINFORMATION, &r);
3140
if (NT_STATUS_IS_ERR(status)) {
3144
/* Return variables */
3147
return r.out.result;
3150
NTSTATUS rpccli_lsa_CREDRRENAME(struct rpc_pipe_client *cli,
3151
TALLOC_CTX *mem_ctx)
3153
struct lsa_CREDRRENAME r;
3158
if (DEBUGLEVEL >= 10) {
3159
NDR_PRINT_IN_DEBUG(lsa_CREDRRENAME, &r);
3162
status = cli->dispatch(cli,
3165
NDR_LSA_CREDRRENAME,
3168
if (!NT_STATUS_IS_OK(status)) {
3172
if (DEBUGLEVEL >= 10) {
3173
NDR_PRINT_OUT_DEBUG(lsa_CREDRRENAME, &r);
3176
if (NT_STATUS_IS_ERR(status)) {
3180
/* Return variables */
3183
return r.out.result;
3186
NTSTATUS rpccli_lsa_LookupSids3(struct rpc_pipe_client *cli,
3187
TALLOC_CTX *mem_ctx,
3188
struct lsa_SidArray *sids /* [in] [ref] */,
3189
struct lsa_RefDomainList **domains /* [out] [ref] */,
3190
struct lsa_TransNameArray2 *names /* [in,out] [ref] */,
3191
uint16_t level /* [in] */,
3192
uint32_t *count /* [in,out] [ref] */,
3193
uint32_t unknown1 /* [in] */,
3194
uint32_t unknown2 /* [in] */)
3196
struct lsa_LookupSids3 r;
3204
r.in.unknown1 = unknown1;
3205
r.in.unknown2 = unknown2;
3207
if (DEBUGLEVEL >= 10) {
3208
NDR_PRINT_IN_DEBUG(lsa_LookupSids3, &r);
3211
status = cli->dispatch(cli,
3214
NDR_LSA_LOOKUPSIDS3,
3217
if (!NT_STATUS_IS_OK(status)) {
3221
if (DEBUGLEVEL >= 10) {
3222
NDR_PRINT_OUT_DEBUG(lsa_LookupSids3, &r);
3225
if (NT_STATUS_IS_ERR(status)) {
3229
/* Return variables */
3230
*domains = *r.out.domains;
3231
*names = *r.out.names;
3232
*count = *r.out.count;
3235
return r.out.result;
3238
NTSTATUS rpccli_lsa_LookupNames4(struct rpc_pipe_client *cli,
3239
TALLOC_CTX *mem_ctx,
3240
uint32_t num_names /* [in] [range(0,1000)] */,
3241
struct lsa_String *names /* [in] [size_is(num_names)] */,
3242
struct lsa_RefDomainList **domains /* [out] [ref] */,
3243
struct lsa_TransSidArray3 *sids /* [in,out] [ref] */,
3244
enum lsa_LookupNamesLevel level /* [in] */,
3245
uint32_t *count /* [in,out] [ref] */,
3246
uint32_t lookup_options /* [in] */,
3247
uint32_t client_revision /* [in] */)
3249
struct lsa_LookupNames4 r;
3253
r.in.num_names = num_names;
3258
r.in.lookup_options = lookup_options;
3259
r.in.client_revision = client_revision;
3261
if (DEBUGLEVEL >= 10) {
3262
NDR_PRINT_IN_DEBUG(lsa_LookupNames4, &r);
3265
status = cli->dispatch(cli,
3268
NDR_LSA_LOOKUPNAMES4,
3271
if (!NT_STATUS_IS_OK(status)) {
3275
if (DEBUGLEVEL >= 10) {
3276
NDR_PRINT_OUT_DEBUG(lsa_LookupNames4, &r);
3279
if (NT_STATUS_IS_ERR(status)) {
3283
/* Return variables */
3284
*domains = *r.out.domains;
3285
*sids = *r.out.sids;
3286
*count = *r.out.count;
3289
return r.out.result;
3292
NTSTATUS rpccli_lsa_LSAROPENPOLICYSCE(struct rpc_pipe_client *cli,
3293
TALLOC_CTX *mem_ctx)
3295
struct lsa_LSAROPENPOLICYSCE r;
3300
if (DEBUGLEVEL >= 10) {
3301
NDR_PRINT_IN_DEBUG(lsa_LSAROPENPOLICYSCE, &r);
3304
status = cli->dispatch(cli,
3307
NDR_LSA_LSAROPENPOLICYSCE,
3310
if (!NT_STATUS_IS_OK(status)) {
3314
if (DEBUGLEVEL >= 10) {
3315
NDR_PRINT_OUT_DEBUG(lsa_LSAROPENPOLICYSCE, &r);
3318
if (NT_STATUS_IS_ERR(status)) {
3322
/* Return variables */
3325
return r.out.result;
3328
NTSTATUS rpccli_lsa_LSARADTREGISTERSECURITYEVENTSOURCE(struct rpc_pipe_client *cli,
3329
TALLOC_CTX *mem_ctx)
3331
struct lsa_LSARADTREGISTERSECURITYEVENTSOURCE r;
3336
if (DEBUGLEVEL >= 10) {
3337
NDR_PRINT_IN_DEBUG(lsa_LSARADTREGISTERSECURITYEVENTSOURCE, &r);
3340
status = cli->dispatch(cli,
3343
NDR_LSA_LSARADTREGISTERSECURITYEVENTSOURCE,
3346
if (!NT_STATUS_IS_OK(status)) {
3350
if (DEBUGLEVEL >= 10) {
3351
NDR_PRINT_OUT_DEBUG(lsa_LSARADTREGISTERSECURITYEVENTSOURCE, &r);
3354
if (NT_STATUS_IS_ERR(status)) {
3358
/* Return variables */
3361
return r.out.result;
3364
NTSTATUS rpccli_lsa_LSARADTUNREGISTERSECURITYEVENTSOURCE(struct rpc_pipe_client *cli,
3365
TALLOC_CTX *mem_ctx)
3367
struct lsa_LSARADTUNREGISTERSECURITYEVENTSOURCE r;
3372
if (DEBUGLEVEL >= 10) {
3373
NDR_PRINT_IN_DEBUG(lsa_LSARADTUNREGISTERSECURITYEVENTSOURCE, &r);
3376
status = cli->dispatch(cli,
3379
NDR_LSA_LSARADTUNREGISTERSECURITYEVENTSOURCE,
3382
if (!NT_STATUS_IS_OK(status)) {
3386
if (DEBUGLEVEL >= 10) {
3387
NDR_PRINT_OUT_DEBUG(lsa_LSARADTUNREGISTERSECURITYEVENTSOURCE, &r);
3390
if (NT_STATUS_IS_ERR(status)) {
3394
/* Return variables */
3397
return r.out.result;
3400
NTSTATUS rpccli_lsa_LSARADTREPORTSECURITYEVENT(struct rpc_pipe_client *cli,
3401
TALLOC_CTX *mem_ctx)
3403
struct lsa_LSARADTREPORTSECURITYEVENT r;
3408
if (DEBUGLEVEL >= 10) {
3409
NDR_PRINT_IN_DEBUG(lsa_LSARADTREPORTSECURITYEVENT, &r);
3412
status = cli->dispatch(cli,
3415
NDR_LSA_LSARADTREPORTSECURITYEVENT,
3418
if (!NT_STATUS_IS_OK(status)) {
3422
if (DEBUGLEVEL >= 10) {
3423
NDR_PRINT_OUT_DEBUG(lsa_LSARADTREPORTSECURITYEVENT, &r);
3426
if (NT_STATUS_IS_ERR(status)) {
3430
/* Return variables */
3433
return r.out.result;