From 791fe3119ef1756fc476b17b8c590241bee5de2e Mon Sep 17 00:00:00 2001 From: Günther Deschner Date: Tue, 8 Jan 2008 18:07:55 +0100 Subject: Pedantic cosmetics: rerun make idl. Guenther (This used to be commit d1fa8049b1c0a3cebbc2c64e245e8055c8d3e84b) --- source3/librpc/gen_ndr/cli_lsa.c | 1312 +++++++++++++++++++------------------- 1 file changed, 656 insertions(+), 656 deletions(-) (limited to 'source3/librpc/gen_ndr/cli_lsa.c') diff --git a/source3/librpc/gen_ndr/cli_lsa.c b/source3/librpc/gen_ndr/cli_lsa.c index 50186360f6..49bb44880a 100644 --- a/source3/librpc/gen_ndr/cli_lsa.c +++ b/source3/librpc/gen_ndr/cli_lsa.c @@ -10,29 +10,29 @@ NTSTATUS rpccli_lsa_Close(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, stru { struct lsa_Close r; NTSTATUS status; - + /* In parameters */ r.in.handle = handle; - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_Close, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_CLOSE, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_Close, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ *handle = *r.out.handle; - + /* Return result */ return r.out.result; } @@ -41,28 +41,28 @@ NTSTATUS rpccli_lsa_Delete(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, str { struct lsa_Delete r; NTSTATUS status; - + /* In parameters */ r.in.handle = handle; - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_Delete, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_DELETE, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_Delete, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ - + /* Return result */ return r.out.result; } @@ -71,32 +71,32 @@ NTSTATUS rpccli_lsa_EnumPrivs(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, { struct lsa_EnumPrivs r; NTSTATUS status; - + /* In parameters */ r.in.handle = handle; r.in.resume_handle = resume_handle; r.in.max_count = max_count; - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_EnumPrivs, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_ENUMPRIVS, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_EnumPrivs, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ *resume_handle = *r.out.resume_handle; *privs = *r.out.privs; - + /* Return result */ return r.out.result; } @@ -105,32 +105,32 @@ NTSTATUS rpccli_lsa_QuerySecurity(struct rpc_pipe_client *cli, TALLOC_CTX *mem_c { struct lsa_QuerySecurity r; NTSTATUS status; - + /* In parameters */ r.in.handle = handle; r.in.sec_info = sec_info; - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_QuerySecurity, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_QUERYSECURITY, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_QuerySecurity, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ if (sdbuf && r.out.sdbuf) { *sdbuf = *r.out.sdbuf; } - + /* Return result */ return r.out.result; } @@ -139,27 +139,27 @@ NTSTATUS rpccli_lsa_SetSecObj(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx) { struct lsa_SetSecObj r; NTSTATUS status; - + /* In parameters */ - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_SetSecObj, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_SETSECOBJ, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_SetSecObj, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ - + /* Return result */ return r.out.result; } @@ -168,27 +168,27 @@ NTSTATUS rpccli_lsa_ChangePassword(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ { struct lsa_ChangePassword r; NTSTATUS status; - + /* In parameters */ - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_ChangePassword, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_CHANGEPASSWORD, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_ChangePassword, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ - + /* Return result */ return r.out.result; } @@ -197,31 +197,31 @@ NTSTATUS rpccli_lsa_OpenPolicy(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, { struct lsa_OpenPolicy r; NTSTATUS status; - + /* In parameters */ r.in.system_name = system_name; r.in.attr = attr; r.in.access_mask = access_mask; - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_OpenPolicy, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_OPENPOLICY, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_OpenPolicy, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ *handle = *r.out.handle; - + /* Return result */ return r.out.result; } @@ -230,32 +230,32 @@ NTSTATUS rpccli_lsa_QueryInfoPolicy(struct rpc_pipe_client *cli, TALLOC_CTX *mem { struct lsa_QueryInfoPolicy r; NTSTATUS status; - + /* In parameters */ r.in.handle = handle; r.in.level = level; - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_QueryInfoPolicy, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_QUERYINFOPOLICY, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_QueryInfoPolicy, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ if (info && r.out.info) { *info = *r.out.info; } - + /* Return result */ return r.out.result; } @@ -264,27 +264,27 @@ NTSTATUS rpccli_lsa_SetInfoPolicy(struct rpc_pipe_client *cli, TALLOC_CTX *mem_c { struct lsa_SetInfoPolicy r; NTSTATUS status; - + /* In parameters */ - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_SetInfoPolicy, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_SETINFOPOLICY, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_SetInfoPolicy, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ - + /* Return result */ return r.out.result; } @@ -293,27 +293,27 @@ NTSTATUS rpccli_lsa_ClearAuditLog(struct rpc_pipe_client *cli, TALLOC_CTX *mem_c { struct lsa_ClearAuditLog r; NTSTATUS status; - + /* In parameters */ - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_ClearAuditLog, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_CLEARAUDITLOG, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_ClearAuditLog, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ - + /* Return result */ return r.out.result; } @@ -322,31 +322,31 @@ NTSTATUS rpccli_lsa_CreateAccount(struct rpc_pipe_client *cli, TALLOC_CTX *mem_c { struct lsa_CreateAccount r; NTSTATUS status; - + /* In parameters */ r.in.handle = handle; r.in.sid = sid; r.in.access_mask = access_mask; - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_CreateAccount, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_CREATEACCOUNT, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_CreateAccount, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ *acct_handle = *r.out.acct_handle; - + /* Return result */ return r.out.result; } @@ -355,32 +355,32 @@ NTSTATUS rpccli_lsa_EnumAccounts(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ct { struct lsa_EnumAccounts r; NTSTATUS status; - + /* In parameters */ r.in.handle = handle; r.in.resume_handle = resume_handle; r.in.num_entries = num_entries; - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_EnumAccounts, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_ENUMACCOUNTS, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_EnumAccounts, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ *resume_handle = *r.out.resume_handle; *sids = *r.out.sids; - + /* Return result */ return r.out.result; } @@ -389,31 +389,31 @@ NTSTATUS rpccli_lsa_CreateTrustedDomain(struct rpc_pipe_client *cli, TALLOC_CTX { struct lsa_CreateTrustedDomain r; NTSTATUS status; - + /* In parameters */ r.in.handle = handle; r.in.info = info; r.in.access_mask = access_mask; - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_CreateTrustedDomain, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_CREATETRUSTEDDOMAIN, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_CreateTrustedDomain, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ *trustdom_handle = *r.out.trustdom_handle; - + /* Return result */ return r.out.result; } @@ -422,32 +422,32 @@ NTSTATUS rpccli_lsa_EnumTrustDom(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ct { struct lsa_EnumTrustDom r; NTSTATUS status; - + /* In parameters */ r.in.handle = handle; r.in.resume_handle = resume_handle; r.in.max_size = max_size; - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_EnumTrustDom, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_ENUMTRUSTDOM, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_EnumTrustDom, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ *resume_handle = *r.out.resume_handle; *domains = *r.out.domains; - + /* Return result */ return r.out.result; } @@ -456,7 +456,7 @@ NTSTATUS rpccli_lsa_LookupNames(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx { struct lsa_LookupNames r; NTSTATUS status; - + /* In parameters */ r.in.handle = handle; r.in.num_names = num_names; @@ -464,30 +464,30 @@ NTSTATUS rpccli_lsa_LookupNames(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx r.in.sids = sids; r.in.level = level; r.in.count = count; - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_LookupNames, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_LOOKUPNAMES, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_LookupNames, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ if (domains && r.out.domains) { *domains = *r.out.domains; } *sids = *r.out.sids; *count = *r.out.count; - + /* Return result */ return r.out.result; } @@ -496,37 +496,37 @@ NTSTATUS rpccli_lsa_LookupSids(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, { struct lsa_LookupSids r; NTSTATUS status; - + /* In parameters */ r.in.handle = handle; r.in.sids = sids; r.in.names = names; r.in.level = level; r.in.count = count; - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_LookupSids, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_LOOKUPSIDS, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_LookupSids, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ if (domains && r.out.domains) { *domains = *r.out.domains; } *names = *r.out.names; *count = *r.out.count; - + /* Return result */ return r.out.result; } @@ -535,31 +535,31 @@ NTSTATUS rpccli_lsa_CreateSecret(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ct { struct lsa_CreateSecret r; NTSTATUS status; - + /* In parameters */ r.in.handle = handle; r.in.name = name; r.in.access_mask = access_mask; - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_CreateSecret, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_CREATESECRET, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_CreateSecret, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ *sec_handle = *r.out.sec_handle; - + /* Return result */ return r.out.result; } @@ -568,31 +568,31 @@ NTSTATUS rpccli_lsa_OpenAccount(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx { struct lsa_OpenAccount r; NTSTATUS status; - + /* In parameters */ r.in.handle = handle; r.in.sid = sid; r.in.access_mask = access_mask; - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_OpenAccount, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_OPENACCOUNT, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_OpenAccount, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ *acct_handle = *r.out.acct_handle; - + /* Return result */ return r.out.result; } @@ -601,31 +601,31 @@ NTSTATUS rpccli_lsa_EnumPrivsAccount(struct rpc_pipe_client *cli, TALLOC_CTX *me { struct lsa_EnumPrivsAccount r; NTSTATUS status; - + /* In parameters */ r.in.handle = handle; - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_EnumPrivsAccount, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_ENUMPRIVSACCOUNT, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_EnumPrivsAccount, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ if (privs && r.out.privs) { *privs = *r.out.privs; } - + /* Return result */ return r.out.result; } @@ -634,29 +634,29 @@ NTSTATUS rpccli_lsa_AddPrivilegesToAccount(struct rpc_pipe_client *cli, TALLOC_C { struct lsa_AddPrivilegesToAccount r; NTSTATUS status; - + /* In parameters */ r.in.handle = handle; r.in.privs = privs; - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_AddPrivilegesToAccount, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_ADDPRIVILEGESTOACCOUNT, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_AddPrivilegesToAccount, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ - + /* Return result */ return r.out.result; } @@ -665,30 +665,30 @@ NTSTATUS rpccli_lsa_RemovePrivilegesFromAccount(struct rpc_pipe_client *cli, TAL { struct lsa_RemovePrivilegesFromAccount r; NTSTATUS status; - + /* In parameters */ r.in.handle = handle; r.in.remove_all = remove_all; r.in.privs = privs; - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_RemovePrivilegesFromAccount, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_REMOVEPRIVILEGESFROMACCOUNT, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_RemovePrivilegesFromAccount, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ - + /* Return result */ return r.out.result; } @@ -697,27 +697,27 @@ NTSTATUS rpccli_lsa_GetQuotasForAccount(struct rpc_pipe_client *cli, TALLOC_CTX { struct lsa_GetQuotasForAccount r; NTSTATUS status; - + /* In parameters */ - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_GetQuotasForAccount, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_GETQUOTASFORACCOUNT, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_GetQuotasForAccount, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ - + /* Return result */ return r.out.result; } @@ -726,27 +726,27 @@ NTSTATUS rpccli_lsa_SetQuotasForAccount(struct rpc_pipe_client *cli, TALLOC_CTX { struct lsa_SetQuotasForAccount r; NTSTATUS status; - + /* In parameters */ - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_SetQuotasForAccount, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_SETQUOTASFORACCOUNT, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_SetQuotasForAccount, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ - + /* Return result */ return r.out.result; } @@ -755,27 +755,27 @@ NTSTATUS rpccli_lsa_GetSystemAccessAccount(struct rpc_pipe_client *cli, TALLOC_C { struct lsa_GetSystemAccessAccount r; NTSTATUS status; - + /* In parameters */ - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_GetSystemAccessAccount, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_GETSYSTEMACCESSACCOUNT, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_GetSystemAccessAccount, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ - + /* Return result */ return r.out.result; } @@ -784,27 +784,27 @@ NTSTATUS rpccli_lsa_SetSystemAccessAccount(struct rpc_pipe_client *cli, TALLOC_C { struct lsa_SetSystemAccessAccount r; NTSTATUS status; - + /* In parameters */ - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_SetSystemAccessAccount, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_SETSYSTEMACCESSACCOUNT, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_SetSystemAccessAccount, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ - + /* Return result */ return r.out.result; } @@ -813,31 +813,31 @@ NTSTATUS rpccli_lsa_OpenTrustedDomain(struct rpc_pipe_client *cli, TALLOC_CTX *m { struct lsa_OpenTrustedDomain r; NTSTATUS status; - + /* In parameters */ r.in.handle = handle; r.in.sid = sid; r.in.access_mask = access_mask; - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_OpenTrustedDomain, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_OPENTRUSTEDDOMAIN, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_OpenTrustedDomain, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ *trustdom_handle = *r.out.trustdom_handle; - + /* Return result */ return r.out.result; } @@ -846,32 +846,32 @@ NTSTATUS rpccli_lsa_QueryTrustedDomainInfo(struct rpc_pipe_client *cli, TALLOC_C { struct lsa_QueryTrustedDomainInfo r; NTSTATUS status; - + /* In parameters */ r.in.trustdom_handle = trustdom_handle; r.in.level = level; - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_QueryTrustedDomainInfo, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_QUERYTRUSTEDDOMAININFO, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_QueryTrustedDomainInfo, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ if (info && r.out.info) { *info = *r.out.info; } - + /* Return result */ return r.out.result; } @@ -880,27 +880,27 @@ NTSTATUS rpccli_lsa_SetInformationTrustedDomain(struct rpc_pipe_client *cli, TAL { struct lsa_SetInformationTrustedDomain r; NTSTATUS status; - + /* In parameters */ - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_SetInformationTrustedDomain, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_SETINFORMATIONTRUSTEDDOMAIN, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_SetInformationTrustedDomain, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ - + /* Return result */ return r.out.result; } @@ -909,31 +909,31 @@ NTSTATUS rpccli_lsa_OpenSecret(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, { struct lsa_OpenSecret r; NTSTATUS status; - + /* In parameters */ r.in.handle = handle; r.in.name = name; r.in.access_mask = access_mask; - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_OpenSecret, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_OPENSECRET, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_OpenSecret, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ *sec_handle = *r.out.sec_handle; - + /* Return result */ return r.out.result; } @@ -942,30 +942,30 @@ NTSTATUS rpccli_lsa_SetSecret(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, { struct lsa_SetSecret r; NTSTATUS status; - + /* In parameters */ r.in.sec_handle = sec_handle; r.in.new_val = new_val; r.in.old_val = old_val; - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_SetSecret, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_SETSECRET, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_SetSecret, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ - + /* Return result */ return r.out.result; } @@ -974,30 +974,30 @@ NTSTATUS rpccli_lsa_QuerySecret(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx { struct lsa_QuerySecret r; NTSTATUS status; - + /* In parameters */ r.in.sec_handle = sec_handle; r.in.new_val = new_val; r.in.new_mtime = new_mtime; r.in.old_val = old_val; r.in.old_mtime = old_mtime; - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_QuerySecret, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_QUERYSECRET, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_QuerySecret, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ if (new_val && r.out.new_val) { *new_val = *r.out.new_val; @@ -1011,7 +1011,7 @@ NTSTATUS rpccli_lsa_QuerySecret(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx if (old_mtime && r.out.old_mtime) { *old_mtime = *r.out.old_mtime; } - + /* Return result */ return r.out.result; } @@ -1020,30 +1020,30 @@ NTSTATUS rpccli_lsa_LookupPrivValue(struct rpc_pipe_client *cli, TALLOC_CTX *mem { struct lsa_LookupPrivValue r; NTSTATUS status; - + /* In parameters */ r.in.handle = handle; r.in.name = name; - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_LookupPrivValue, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_LOOKUPPRIVVALUE, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_LookupPrivValue, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ *luid = *r.out.luid; - + /* Return result */ return r.out.result; } @@ -1052,32 +1052,32 @@ NTSTATUS rpccli_lsa_LookupPrivName(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ { struct lsa_LookupPrivName r; NTSTATUS status; - + /* In parameters */ r.in.handle = handle; r.in.luid = luid; - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_LookupPrivName, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_LOOKUPPRIVNAME, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_LookupPrivName, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ if (name && r.out.name) { *name = *r.out.name; } - + /* Return result */ return r.out.result; } @@ -1086,35 +1086,35 @@ NTSTATUS rpccli_lsa_LookupPrivDisplayName(struct rpc_pipe_client *cli, TALLOC_CT { struct lsa_LookupPrivDisplayName r; NTSTATUS status; - + /* In parameters */ r.in.handle = handle; r.in.name = name; r.in.language_id = language_id; r.in.unknown = unknown; - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_LookupPrivDisplayName, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_LOOKUPPRIVDISPLAYNAME, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_LookupPrivDisplayName, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ if (disp_name && r.out.disp_name) { *disp_name = *r.out.disp_name; } *language_id = *r.out.language_id; - + /* Return result */ return r.out.result; } @@ -1123,27 +1123,27 @@ NTSTATUS rpccli_lsa_DeleteObject(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ct { struct lsa_DeleteObject r; NTSTATUS status; - + /* In parameters */ - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_DeleteObject, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_DELETEOBJECT, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_DeleteObject, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ - + /* Return result */ return r.out.result; } @@ -1152,30 +1152,30 @@ NTSTATUS rpccli_lsa_EnumAccountsWithUserRight(struct rpc_pipe_client *cli, TALLO { struct lsa_EnumAccountsWithUserRight r; NTSTATUS status; - + /* In parameters */ r.in.handle = handle; r.in.name = name; - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_EnumAccountsWithUserRight, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_ENUMACCOUNTSWITHUSERRIGHT, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_EnumAccountsWithUserRight, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ *sids = *r.out.sids; - + /* Return result */ return r.out.result; } @@ -1184,30 +1184,30 @@ NTSTATUS rpccli_lsa_EnumAccountRights(struct rpc_pipe_client *cli, TALLOC_CTX *m { struct lsa_EnumAccountRights r; NTSTATUS status; - + /* In parameters */ r.in.handle = handle; r.in.sid = sid; - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_EnumAccountRights, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_ENUMACCOUNTRIGHTS, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_EnumAccountRights, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ *rights = *r.out.rights; - + /* Return result */ return r.out.result; } @@ -1216,30 +1216,30 @@ NTSTATUS rpccli_lsa_AddAccountRights(struct rpc_pipe_client *cli, TALLOC_CTX *me { struct lsa_AddAccountRights r; NTSTATUS status; - + /* In parameters */ r.in.handle = handle; r.in.sid = sid; r.in.rights = rights; - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_AddAccountRights, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_ADDACCOUNTRIGHTS, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_AddAccountRights, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ - + /* Return result */ return r.out.result; } @@ -1248,31 +1248,31 @@ NTSTATUS rpccli_lsa_RemoveAccountRights(struct rpc_pipe_client *cli, TALLOC_CTX { struct lsa_RemoveAccountRights r; NTSTATUS status; - + /* In parameters */ r.in.handle = handle; r.in.sid = sid; r.in.unknown = unknown; r.in.rights = rights; - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_RemoveAccountRights, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_REMOVEACCOUNTRIGHTS, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_RemoveAccountRights, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ - + /* Return result */ return r.out.result; } @@ -1281,33 +1281,33 @@ NTSTATUS rpccli_lsa_QueryTrustedDomainInfoBySid(struct rpc_pipe_client *cli, TAL { struct lsa_QueryTrustedDomainInfoBySid r; NTSTATUS status; - + /* In parameters */ r.in.handle = handle; r.in.dom_sid = dom_sid; r.in.level = level; - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_QueryTrustedDomainInfoBySid, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_QUERYTRUSTEDDOMAININFOBYSID, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_QueryTrustedDomainInfoBySid, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ if (info && r.out.info) { *info = *r.out.info; } - + /* Return result */ return r.out.result; } @@ -1316,27 +1316,27 @@ NTSTATUS rpccli_lsa_SetTrustedDomainInfo(struct rpc_pipe_client *cli, TALLOC_CTX { struct lsa_SetTrustedDomainInfo r; NTSTATUS status; - + /* In parameters */ - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_SetTrustedDomainInfo, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_SETTRUSTEDDOMAININFO, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_SetTrustedDomainInfo, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ - + /* Return result */ return r.out.result; } @@ -1345,29 +1345,29 @@ NTSTATUS rpccli_lsa_DeleteTrustedDomain(struct rpc_pipe_client *cli, TALLOC_CTX { struct lsa_DeleteTrustedDomain r; NTSTATUS status; - + /* In parameters */ r.in.handle = handle; r.in.dom_sid = dom_sid; - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_DeleteTrustedDomain, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_DELETETRUSTEDDOMAIN, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_DeleteTrustedDomain, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ - + /* Return result */ return r.out.result; } @@ -1376,27 +1376,27 @@ NTSTATUS rpccli_lsa_StorePrivateData(struct rpc_pipe_client *cli, TALLOC_CTX *me { struct lsa_StorePrivateData r; NTSTATUS status; - + /* In parameters */ - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_StorePrivateData, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_STOREPRIVATEDATA, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_StorePrivateData, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ - + /* Return result */ return r.out.result; } @@ -1405,27 +1405,27 @@ NTSTATUS rpccli_lsa_RetrievePrivateData(struct rpc_pipe_client *cli, TALLOC_CTX { struct lsa_RetrievePrivateData r; NTSTATUS status; - + /* In parameters */ - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_RetrievePrivateData, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_RETRIEVEPRIVATEDATA, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_RetrievePrivateData, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ - + /* Return result */ return r.out.result; } @@ -1434,31 +1434,31 @@ NTSTATUS rpccli_lsa_OpenPolicy2(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx { struct lsa_OpenPolicy2 r; NTSTATUS status; - + /* In parameters */ r.in.system_name = system_name; r.in.attr = attr; r.in.access_mask = access_mask; - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_OpenPolicy2, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_OPENPOLICY2, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_OpenPolicy2, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ *handle = *r.out.handle; - + /* Return result */ return r.out.result; } @@ -1467,28 +1467,28 @@ NTSTATUS rpccli_lsa_GetUserName(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx { struct lsa_GetUserName r; NTSTATUS status; - + /* In parameters */ r.in.system_name = system_name; r.in.account_name = account_name; r.in.authority_name = authority_name; - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_GetUserName, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_GETUSERNAME, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_GetUserName, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ if (account_name && r.out.account_name) { *account_name = *r.out.account_name; @@ -1496,7 +1496,7 @@ NTSTATUS rpccli_lsa_GetUserName(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx if (authority_name && r.out.authority_name) { *authority_name = *r.out.authority_name; } - + /* Return result */ return r.out.result; } @@ -1505,32 +1505,32 @@ NTSTATUS rpccli_lsa_QueryInfoPolicy2(struct rpc_pipe_client *cli, TALLOC_CTX *me { struct lsa_QueryInfoPolicy2 r; NTSTATUS status; - + /* In parameters */ r.in.handle = handle; r.in.level = level; - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_QueryInfoPolicy2, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_QUERYINFOPOLICY2, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_QueryInfoPolicy2, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ if (info && r.out.info) { *info = *r.out.info; } - + /* Return result */ return r.out.result; } @@ -1539,27 +1539,27 @@ NTSTATUS rpccli_lsa_SetInfoPolicy2(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ { struct lsa_SetInfoPolicy2 r; NTSTATUS status; - + /* In parameters */ - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_SetInfoPolicy2, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_SETINFOPOLICY2, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_SetInfoPolicy2, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ - + /* Return result */ return r.out.result; } @@ -1568,33 +1568,33 @@ NTSTATUS rpccli_lsa_QueryTrustedDomainInfoByName(struct rpc_pipe_client *cli, TA { struct lsa_QueryTrustedDomainInfoByName r; NTSTATUS status; - + /* In parameters */ r.in.handle = handle; r.in.trusted_domain = trusted_domain; r.in.level = level; - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_QueryTrustedDomainInfoByName, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_QUERYTRUSTEDDOMAININFOBYNAME, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_QueryTrustedDomainInfoByName, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ if (info && r.out.info) { *info = *r.out.info; } - + /* Return result */ return r.out.result; } @@ -1603,31 +1603,31 @@ NTSTATUS rpccli_lsa_SetTrustedDomainInfoByName(struct rpc_pipe_client *cli, TALL { struct lsa_SetTrustedDomainInfoByName r; NTSTATUS status; - + /* In parameters */ r.in.handle = handle; r.in.trusted_domain = trusted_domain; r.in.level = level; r.in.info = info; - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_SetTrustedDomainInfoByName, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_SETTRUSTEDDOMAININFOBYNAME, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_SetTrustedDomainInfoByName, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ - + /* Return result */ return r.out.result; } @@ -1636,32 +1636,32 @@ NTSTATUS rpccli_lsa_EnumTrustedDomainsEx(struct rpc_pipe_client *cli, TALLOC_CTX { struct lsa_EnumTrustedDomainsEx r; NTSTATUS status; - + /* In parameters */ r.in.handle = handle; r.in.resume_handle = resume_handle; r.in.max_size = max_size; - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_EnumTrustedDomainsEx, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_ENUMTRUSTEDDOMAINSEX, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_EnumTrustedDomainsEx, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ *resume_handle = *r.out.resume_handle; *domains = *r.out.domains; - + /* Return result */ return r.out.result; } @@ -1670,27 +1670,27 @@ NTSTATUS rpccli_lsa_CreateTrustedDomainEx(struct rpc_pipe_client *cli, TALLOC_CT { struct lsa_CreateTrustedDomainEx r; NTSTATUS status; - + /* In parameters */ - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_CreateTrustedDomainEx, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_CREATETRUSTEDDOMAINEX, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_CreateTrustedDomainEx, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ - + /* Return result */ return r.out.result; } @@ -1699,29 +1699,29 @@ NTSTATUS rpccli_lsa_CloseTrustedDomainEx(struct rpc_pipe_client *cli, TALLOC_CTX { struct lsa_CloseTrustedDomainEx r; NTSTATUS status; - + /* In parameters */ r.in.handle = handle; - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_CloseTrustedDomainEx, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_CLOSETRUSTEDDOMAINEX, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_CloseTrustedDomainEx, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ *handle = *r.out.handle; - + /* Return result */ return r.out.result; } @@ -1730,32 +1730,32 @@ NTSTATUS rpccli_lsa_QueryDomainInformationPolicy(struct rpc_pipe_client *cli, TA { struct lsa_QueryDomainInformationPolicy r; NTSTATUS status; - + /* In parameters */ r.in.handle = handle; r.in.level = level; - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_QueryDomainInformationPolicy, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_QUERYDOMAININFORMATIONPOLICY, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_QueryDomainInformationPolicy, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ if (info && r.out.info) { *info = *r.out.info; } - + /* Return result */ return r.out.result; } @@ -1764,30 +1764,30 @@ NTSTATUS rpccli_lsa_SetDomainInformationPolicy(struct rpc_pipe_client *cli, TALL { struct lsa_SetDomainInformationPolicy r; NTSTATUS status; - + /* In parameters */ r.in.handle = handle; r.in.level = level; r.in.info = info; - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_SetDomainInformationPolicy, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_SETDOMAININFORMATIONPOLICY, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_SetDomainInformationPolicy, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ - + /* Return result */ return r.out.result; } @@ -1796,31 +1796,31 @@ NTSTATUS rpccli_lsa_OpenTrustedDomainByName(struct rpc_pipe_client *cli, TALLOC_ { struct lsa_OpenTrustedDomainByName r; NTSTATUS status; - + /* In parameters */ r.in.handle = handle; r.in.name = name; r.in.access_mask = access_mask; - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_OpenTrustedDomainByName, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_OPENTRUSTEDDOMAINBYNAME, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_OpenTrustedDomainByName, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ *trustdom_handle = *r.out.trustdom_handle; - + /* Return result */ return r.out.result; } @@ -1829,27 +1829,27 @@ NTSTATUS rpccli_lsa_TestCall(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx) { struct lsa_TestCall r; NTSTATUS status; - + /* In parameters */ - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_TestCall, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_TESTCALL, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_TestCall, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ - + /* Return result */ return r.out.result; } @@ -1858,7 +1858,7 @@ NTSTATUS rpccli_lsa_LookupSids2(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx { struct lsa_LookupSids2 r; NTSTATUS status; - + /* In parameters */ r.in.handle = handle; r.in.sids = sids; @@ -1867,30 +1867,30 @@ NTSTATUS rpccli_lsa_LookupSids2(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx r.in.count = count; r.in.unknown1 = unknown1; r.in.unknown2 = unknown2; - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_LookupSids2, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_LOOKUPSIDS2, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_LookupSids2, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ if (domains && r.out.domains) { *domains = *r.out.domains; } *names = *r.out.names; *count = *r.out.count; - + /* Return result */ return r.out.result; } @@ -1899,7 +1899,7 @@ NTSTATUS rpccli_lsa_LookupNames2(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ct { struct lsa_LookupNames2 r; NTSTATUS status; - + /* In parameters */ r.in.handle = handle; r.in.num_names = num_names; @@ -1909,30 +1909,30 @@ NTSTATUS rpccli_lsa_LookupNames2(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ct r.in.count = count; r.in.unknown1 = unknown1; r.in.unknown2 = unknown2; - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_LookupNames2, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_LOOKUPNAMES2, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_LookupNames2, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ if (domains && r.out.domains) { *domains = *r.out.domains; } *sids = *r.out.sids; *count = *r.out.count; - + /* Return result */ return r.out.result; } @@ -1941,27 +1941,27 @@ NTSTATUS rpccli_lsa_CreateTrustedDomainEx2(struct rpc_pipe_client *cli, TALLOC_C { struct lsa_CreateTrustedDomainEx2 r; NTSTATUS status; - + /* In parameters */ - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_CreateTrustedDomainEx2, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_CREATETRUSTEDDOMAINEX2, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_CreateTrustedDomainEx2, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ - + /* Return result */ return r.out.result; } @@ -1970,27 +1970,27 @@ NTSTATUS rpccli_lsa_CREDRWRITE(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx) { struct lsa_CREDRWRITE r; NTSTATUS status; - + /* In parameters */ - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_CREDRWRITE, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_CREDRWRITE, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_CREDRWRITE, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ - + /* Return result */ return r.out.result; } @@ -1999,27 +1999,27 @@ NTSTATUS rpccli_lsa_CREDRREAD(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx) { struct lsa_CREDRREAD r; NTSTATUS status; - + /* In parameters */ - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_CREDRREAD, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_CREDRREAD, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_CREDRREAD, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ - + /* Return result */ return r.out.result; } @@ -2028,27 +2028,27 @@ NTSTATUS rpccli_lsa_CREDRENUMERATE(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ { struct lsa_CREDRENUMERATE r; NTSTATUS status; - + /* In parameters */ - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_CREDRENUMERATE, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_CREDRENUMERATE, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_CREDRENUMERATE, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ - + /* Return result */ return r.out.result; } @@ -2057,27 +2057,27 @@ NTSTATUS rpccli_lsa_CREDRWRITEDOMAINCREDENTIALS(struct rpc_pipe_client *cli, TAL { struct lsa_CREDRWRITEDOMAINCREDENTIALS r; NTSTATUS status; - + /* In parameters */ - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_CREDRWRITEDOMAINCREDENTIALS, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_CREDRWRITEDOMAINCREDENTIALS, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_CREDRWRITEDOMAINCREDENTIALS, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ - + /* Return result */ return r.out.result; } @@ -2086,27 +2086,27 @@ NTSTATUS rpccli_lsa_CREDRREADDOMAINCREDENTIALS(struct rpc_pipe_client *cli, TALL { struct lsa_CREDRREADDOMAINCREDENTIALS r; NTSTATUS status; - + /* In parameters */ - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_CREDRREADDOMAINCREDENTIALS, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_CREDRREADDOMAINCREDENTIALS, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_CREDRREADDOMAINCREDENTIALS, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ - + /* Return result */ return r.out.result; } @@ -2115,27 +2115,27 @@ NTSTATUS rpccli_lsa_CREDRDELETE(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx { struct lsa_CREDRDELETE r; NTSTATUS status; - + /* In parameters */ - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_CREDRDELETE, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_CREDRDELETE, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_CREDRDELETE, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ - + /* Return result */ return r.out.result; } @@ -2144,27 +2144,27 @@ NTSTATUS rpccli_lsa_CREDRGETTARGETINFO(struct rpc_pipe_client *cli, TALLOC_CTX * { struct lsa_CREDRGETTARGETINFO r; NTSTATUS status; - + /* In parameters */ - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_CREDRGETTARGETINFO, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_CREDRGETTARGETINFO, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_CREDRGETTARGETINFO, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ - + /* Return result */ return r.out.result; } @@ -2173,27 +2173,27 @@ NTSTATUS rpccli_lsa_CREDRPROFILELOADED(struct rpc_pipe_client *cli, TALLOC_CTX * { struct lsa_CREDRPROFILELOADED r; NTSTATUS status; - + /* In parameters */ - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_CREDRPROFILELOADED, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_CREDRPROFILELOADED, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_CREDRPROFILELOADED, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ - + /* Return result */ return r.out.result; } @@ -2202,7 +2202,7 @@ NTSTATUS rpccli_lsa_LookupNames3(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ct { struct lsa_LookupNames3 r; NTSTATUS status; - + /* In parameters */ r.in.handle = handle; r.in.num_names = num_names; @@ -2212,30 +2212,30 @@ NTSTATUS rpccli_lsa_LookupNames3(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ct r.in.count = count; r.in.unknown1 = unknown1; r.in.unknown2 = unknown2; - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_LookupNames3, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_LOOKUPNAMES3, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_LookupNames3, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ if (domains && r.out.domains) { *domains = *r.out.domains; } *sids = *r.out.sids; *count = *r.out.count; - + /* Return result */ return r.out.result; } @@ -2244,27 +2244,27 @@ NTSTATUS rpccli_lsa_CREDRGETSESSIONTYPES(struct rpc_pipe_client *cli, TALLOC_CTX { struct lsa_CREDRGETSESSIONTYPES r; NTSTATUS status; - + /* In parameters */ - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_CREDRGETSESSIONTYPES, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_CREDRGETSESSIONTYPES, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_CREDRGETSESSIONTYPES, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ - + /* Return result */ return r.out.result; } @@ -2273,27 +2273,27 @@ NTSTATUS rpccli_lsa_LSARREGISTERAUDITEVENT(struct rpc_pipe_client *cli, TALLOC_C { struct lsa_LSARREGISTERAUDITEVENT r; NTSTATUS status; - + /* In parameters */ - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_LSARREGISTERAUDITEVENT, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_LSARREGISTERAUDITEVENT, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_LSARREGISTERAUDITEVENT, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ - + /* Return result */ return r.out.result; } @@ -2302,27 +2302,27 @@ NTSTATUS rpccli_lsa_LSARGENAUDITEVENT(struct rpc_pipe_client *cli, TALLOC_CTX *m { struct lsa_LSARGENAUDITEVENT r; NTSTATUS status; - + /* In parameters */ - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_LSARGENAUDITEVENT, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_LSARGENAUDITEVENT, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_LSARGENAUDITEVENT, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ - + /* Return result */ return r.out.result; } @@ -2331,27 +2331,27 @@ NTSTATUS rpccli_lsa_LSARUNREGISTERAUDITEVENT(struct rpc_pipe_client *cli, TALLOC { struct lsa_LSARUNREGISTERAUDITEVENT r; NTSTATUS status; - + /* In parameters */ - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_LSARUNREGISTERAUDITEVENT, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_LSARUNREGISTERAUDITEVENT, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_LSARUNREGISTERAUDITEVENT, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ - + /* Return result */ return r.out.result; } @@ -2360,27 +2360,27 @@ NTSTATUS rpccli_lsa_LSARQUERYFORESTTRUSTINFORMATION(struct rpc_pipe_client *cli, { struct lsa_LSARQUERYFORESTTRUSTINFORMATION r; NTSTATUS status; - + /* In parameters */ - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_LSARQUERYFORESTTRUSTINFORMATION, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_LSARQUERYFORESTTRUSTINFORMATION, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_LSARQUERYFORESTTRUSTINFORMATION, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ - + /* Return result */ return r.out.result; } @@ -2389,27 +2389,27 @@ NTSTATUS rpccli_lsa_LSARSETFORESTTRUSTINFORMATION(struct rpc_pipe_client *cli, T { struct lsa_LSARSETFORESTTRUSTINFORMATION r; NTSTATUS status; - + /* In parameters */ - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_LSARSETFORESTTRUSTINFORMATION, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_LSARSETFORESTTRUSTINFORMATION, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_LSARSETFORESTTRUSTINFORMATION, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ - + /* Return result */ return r.out.result; } @@ -2418,27 +2418,27 @@ NTSTATUS rpccli_lsa_CREDRRENAME(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx { struct lsa_CREDRRENAME r; NTSTATUS status; - + /* In parameters */ - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_CREDRRENAME, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_CREDRRENAME, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_CREDRRENAME, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ - + /* Return result */ return r.out.result; } @@ -2447,7 +2447,7 @@ NTSTATUS rpccli_lsa_LookupSids3(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx { struct lsa_LookupSids3 r; NTSTATUS status; - + /* In parameters */ r.in.sids = sids; r.in.names = names; @@ -2455,30 +2455,30 @@ NTSTATUS rpccli_lsa_LookupSids3(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx r.in.count = count; r.in.unknown1 = unknown1; r.in.unknown2 = unknown2; - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_LookupSids3, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_LOOKUPSIDS3, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_LookupSids3, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ if (domains && r.out.domains) { *domains = *r.out.domains; } *names = *r.out.names; *count = *r.out.count; - + /* Return result */ return r.out.result; } @@ -2487,7 +2487,7 @@ NTSTATUS rpccli_lsa_LookupNames4(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ct { struct lsa_LookupNames4 r; NTSTATUS status; - + /* In parameters */ r.in.num_names = num_names; r.in.names = names; @@ -2496,30 +2496,30 @@ NTSTATUS rpccli_lsa_LookupNames4(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ct r.in.count = count; r.in.unknown1 = unknown1; r.in.unknown2 = unknown2; - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_LookupNames4, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_LOOKUPNAMES4, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_LookupNames4, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ if (domains && r.out.domains) { *domains = *r.out.domains; } *sids = *r.out.sids; *count = *r.out.count; - + /* Return result */ return r.out.result; } @@ -2528,27 +2528,27 @@ NTSTATUS rpccli_lsa_LSAROPENPOLICYSCE(struct rpc_pipe_client *cli, TALLOC_CTX *m { struct lsa_LSAROPENPOLICYSCE r; NTSTATUS status; - + /* In parameters */ - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_LSAROPENPOLICYSCE, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_LSAROPENPOLICYSCE, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_LSAROPENPOLICYSCE, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ - + /* Return result */ return r.out.result; } @@ -2557,27 +2557,27 @@ NTSTATUS rpccli_lsa_LSARADTREGISTERSECURITYEVENTSOURCE(struct rpc_pipe_client *c { struct lsa_LSARADTREGISTERSECURITYEVENTSOURCE r; NTSTATUS status; - + /* In parameters */ - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_LSARADTREGISTERSECURITYEVENTSOURCE, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_LSARADTREGISTERSECURITYEVENTSOURCE, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_LSARADTREGISTERSECURITYEVENTSOURCE, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ - + /* Return result */ return r.out.result; } @@ -2586,27 +2586,27 @@ NTSTATUS rpccli_lsa_LSARADTUNREGISTERSECURITYEVENTSOURCE(struct rpc_pipe_client { struct lsa_LSARADTUNREGISTERSECURITYEVENTSOURCE r; NTSTATUS status; - + /* In parameters */ - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_LSARADTUNREGISTERSECURITYEVENTSOURCE, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_LSARADTUNREGISTERSECURITYEVENTSOURCE, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_LSARADTUNREGISTERSECURITYEVENTSOURCE, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ - + /* Return result */ return r.out.result; } @@ -2615,27 +2615,27 @@ NTSTATUS rpccli_lsa_LSARADTREPORTSECURITYEVENT(struct rpc_pipe_client *cli, TALL { struct lsa_LSARADTREPORTSECURITYEVENT r; NTSTATUS status; - + /* In parameters */ - + if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_LSARADTREPORTSECURITYEVENT, &r); - + status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, &ndr_table_lsarpc, NDR_LSA_LSARADTREPORTSECURITYEVENT, &r); - + if (!NT_STATUS_IS_OK(status)) { return status; } - + if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_LSARADTREPORTSECURITYEVENT, &r); - + if (NT_STATUS_IS_ERR(status)) { return status; } - + /* Return variables */ - + /* Return result */ return r.out.result; } -- cgit