#include "idl_types.h" /* samr interface definition */ import "misc.idl", "lsa.idl", "security.idl"; /* Thanks to Todd Sabin for some information from his samr.idl in acltools */ [ uuid("12345778-1234-abcd-ef00-0123456789ac"), version(1.0), endpoint("ncacn_np:[\\pipe\\samr]","ncacn_ip_tcp:", "ncalrpc:"), pointer_default(unique) ] interface samr { typedef bitmap security_secinfo security_secinfo; /* SAM database types */ typedef [public,v1_enum] enum { SAM_DATABASE_DOMAIN = 0, /* Domain users and groups */ SAM_DATABASE_BUILTIN = 1, /* BUILTIN users and groups */ SAM_DATABASE_PRIVS = 2 /* Privileges */ } netr_SamDatabaseID; typedef [public,v1_enum] enum { SAMR_REJECT_OTHER = 0, SAMR_REJECT_TOO_SHORT = 1, SAMR_REJECT_IN_HISTORY = 2, SAMR_REJECT_COMPLEXITY = 5 } samr_RejectReason; /* account control (acct_flags) bits */ typedef [public,bitmap32bit] bitmap { ACB_DISABLED = 0x00000001, /* 1 = User account disabled */ ACB_HOMDIRREQ = 0x00000002, /* 1 = Home directory required */ ACB_PWNOTREQ = 0x00000004, /* 1 = User password not required */ ACB_TEMPDUP = 0x00000008, /* 1 = Temporary duplicate account */ ACB_NORMAL = 0x00000010, /* 1 = Normal user account */ ACB_MNS = 0x00000020, /* 1 = MNS logon user account */ ACB_DOMTRUST = 0x00000040, /* 1 = Interdomain trust account */ ACB_WSTRUST = 0x00000080, /* 1 = Workstation trust account */ ACB_SVRTRUST = 0x00000100, /* 1 = Server trust account */ ACB_PWNOEXP = 0x00000200, /* 1 = User password does not expire */ ACB_AUTOLOCK = 0x00000400, /* 1 = Account auto locked */ ACB_ENC_TXT_PWD_ALLOWED = 0x00000800, /* 1 = Encryped text password is allowed */ ACB_SMARTCARD_REQUIRED = 0x00001000, /* 1 = Smart Card required */ ACB_TRUSTED_FOR_DELEGATION = 0x00002000, /* 1 = Trusted for Delegation */ ACB_NOT_DELEGATED = 0x00004000, /* 1 = Not delegated */ ACB_USE_DES_KEY_ONLY = 0x00008000, /* 1 = Use DES key only */ ACB_DONT_REQUIRE_PREAUTH = 0x00010000, /* 1 = Preauth not required */ ACB_PW_EXPIRED = 0x00020000, /* 1 = Password Expired */ ACB_NO_AUTH_DATA_REQD = 0x00080000 /* 1 = No authorization data required */ } samr_AcctFlags; /* SAM server specific access rights */ typedef [bitmap32bit] bitmap { SAMR_ACCESS_CONNECT_TO_SERVER = 0x00000001, SAMR_ACCESS_SHUTDOWN_SERVER = 0x00000002, SAMR_ACCESS_INITIALIZE_SERVER = 0x00000004, SAMR_ACCESS_CREATE_DOMAIN = 0x00000008, SAMR_ACCESS_ENUM_DOMAINS = 0x00000010, SAMR_ACCESS_OPEN_DOMAIN = 0x00000020 } samr_ConnectAccessMask; const int SAMR_ACCESS_ALL_ACCESS = 0x0000003F; const int GENERIC_RIGHTS_SAM_ALL_ACCESS = (STANDARD_RIGHTS_REQUIRED_ACCESS | SAMR_ACCESS_ALL_ACCESS); const int GENERIC_RIGHTS_SAM_READ = (STANDARD_RIGHTS_READ_ACCESS | SAMR_ACCESS_ENUM_DOMAINS); const int GENERIC_RIGHTS_SAM_WRITE = (STANDARD_RIGHTS_WRITE_ACCESS | SAMR_ACCESS_CREATE_DOMAIN | SAMR_ACCESS_INITIALIZE_SERVER | SAMR_ACCESS_SHUTDOWN_SERVER); const int GENERIC_RIGHTS_SAM_EXECUTE = (STANDARD_RIGHTS_EXECUTE_ACCESS | SAMR_ACCESS_OPEN_DOMAIN | SAMR_ACCESS_CONNECT_TO_SERVER); /* User Object specific access rights */ typedef [bitmap32bit] bitmap { SAMR_USER_ACCESS_GET_NAME_ETC = 0x00000001, SAMR_USER_ACCESS_GET_LOCALE = 0x00000002, SAMR_USER_ACCESS_SET_LOC_COM = 0x00000004, SAMR_USER_ACCESS_GET_LOGONINFO = 0x00000008, SAMR_USER_ACCESS_GET_ATTRIBUTES = 0x00000010, SAMR_USER_ACCESS_SET_ATTRIBUTES = 0x00000020, SAMR_USER_ACCESS_CHANGE_PASSWORD = 0x00000040, SAMR_USER_ACCESS_SET_PASSWORD = 0x00000080, SAMR_USER_ACCESS_GET_GROUPS = 0x00000100, SAMR_USER_ACCESS_GET_GROUP_MEMBERSHIP = 0x00000200, SAMR_USER_ACCESS_CHANGE_GROUP_MEMBERSHIP = 0x00000400 } samr_UserAccessMask; const int SAMR_USER_ACCESS_ALL_ACCESS = 0x000007FF; const int GENERIC_RIGHTS_USER_ALL_ACCESS = (STANDARD_RIGHTS_REQUIRED_ACCESS | SAMR_USER_ACCESS_ALL_ACCESS); /* 0x000f07ff */ const int GENERIC_RIGHTS_USER_READ = (STANDARD_RIGHTS_READ_ACCESS | SAMR_USER_ACCESS_GET_GROUP_MEMBERSHIP | SAMR_USER_ACCESS_GET_GROUPS | SAMR_USER_ACCESS_GET_ATTRIBUTES | SAMR_USER_ACCESS_GET_LOGONINFO | SAMR_USER_ACCESS_GET_LOCALE); /* 0x0002031a */ const int GENERIC_RIGHTS_USER_WRITE = (STANDARD_RIGHTS_WRITE_ACCESS | SAMR_USER_ACCESS_CHANGE_PASSWORD | SAMR_USER_ACCESS_SET_LOC_COM | SAMR_USER_ACCESS_SET_ATTRIBUTES | SAMR_USER_ACCESS_SET_PASSWORD | SAMR_USER_ACCESS_CHANGE_GROUP_MEMBERSHIP); /* 0x000204e4 */ const int GENERIC_RIGHTS_USER_EXECUTE = (STANDARD_RIGHTS_EXECUTE_ACCESS | SAMR_USER_ACCESS_CHANGE_PASSWORD | SAMR_USER_ACCESS_GET_NAME_ETC); /* 0x00020041 */ /* Domain Object specific access rights */ typedef [bitmap32bit] bitmap { SAMR_DOMAIN_ACCESS_LOOKUP_INFO_1 = 0x00000001, SAMR_DOMAIN_ACCESS_SET_INFO_1 = 0x00000002, SAMR_DOMAIN_ACCESS_LOOKUP_INFO_2 = 0x00000004, SAMR_DOMAIN_ACCESS_SET_INFO_2 = 0x00000008, SAMR_DOMAIN_ACCESS_CREATE_USER = 0x00000010, SAMR_DOMAIN_ACCESS_CREATE_GROUP = 0x00000020, SAMR_DOMAIN_ACCESS_CREATE_ALIAS = 0x00000040, SAMR_DOMAIN_ACCESS_LOOKUP_ALIAS = 0x00000080, SAMR_DOMAIN_ACCESS_ENUM_ACCOUNTS = 0x00000100, SAMR_DOMAIN_ACCESS_OPEN_ACCOUNT = 0x00000200, SAMR_DOMAIN_ACCESS_SET_INFO_3 = 0x00000400 } samr_DomainAccessMask; const int SAMR_DOMAIN_ACCESS_ALL_ACCESS = 0x000007FF; const int GENERIC_RIGHTS_DOMAIN_ALL_ACCESS = (STANDARD_RIGHTS_REQUIRED_ACCESS | SAMR_DOMAIN_ACCESS_ALL_ACCESS); const int GENERIC_RIGHTS_DOMAIN_READ = (STANDARD_RIGHTS_READ_ACCESS | SAMR_DOMAIN_ACCESS_LOOKUP_ALIAS | SAMR_DOMAIN_ACCESS_LOOKUP_INFO_2); const int GENERIC_RIGHTS_DOMAIN_WRITE = (STANDARD_RIGHTS_WRITE_ACCESS | SAMR_DOMAIN_ACCESS_SET_INFO_3 | SAMR_DOMAIN_ACCESS_CREATE_ALIAS | SAMR_DOMAIN_ACCESS_CREATE_GROUP | SAMR_DOMAIN_ACCESS_CREATE_USER | SAMR_DOMAIN_ACCESS_SET_INFO_2 | SAMR_DOMAIN_ACCESS_SET_INFO_1); const int GENERIC_RIGHTS_DOMAIN_EXECUTE = (STANDARD_RIGHTS_EXECUTE_ACCESS | SAMR_DOMAIN_ACCESS_OPEN_ACCOUNT | SAMR_DOMAIN_ACCESS_ENUM_ACCOUNTS | SAMR_DOMAIN_ACCESS_LOOKUP_INFO_1); /* Group Object specific access rights */ typedef [bitmap32bit] bitmap { SAMR_GROUP_ACCESS_LOOKUP_INFO = 0x00000001, SAMR_GROUP_ACCESS_SET_INFO = 0x00000002, SAMR_GROUP_ACCESS_ADD_MEMBER = 0x00000004, SAMR_GROUP_ACCESS_REMOVE_MEMBER = 0x00000008, SAMR_GROUP_ACCESS_GET_MEMBERS = 0x00000010 } samr_GroupAccessMask; const int SAMR_GROUP_ACCESS_ALL_ACCESS = 0x0000001F; const int GENERIC_RIGHTS_GROUP_ALL_ACCESS = (STANDARD_RIGHTS_REQUIRED_ACCESS | SAMR_GROUP_ACCESS_ALL_ACCESS); /* 0x000f001f */ const int GENERIC_RIGHTS_GROUP_READ = (STANDARD_RIGHTS_READ_ACCESS | SAMR_GROUP_ACCESS_GET_MEMBERS); /* 0x00020010 */ const int GENERIC_RIGHTS_GROUP_WRITE = (STANDARD_RIGHTS_WRITE_ACCESS | SAMR_GROUP_ACCESS_REMOVE_MEMBER | SAMR_GROUP_ACCESS_ADD_MEMBER | SAMR_GROUP_ACCESS_SET_INFO); /* 0x0002000e */ const int GENERIC_RIGHTS_GROUP_EXECUTE = (STANDARD_RIGHTS_EXECUTE_ACCESS | SAMR_GROUP_ACCESS_LOOKUP_INFO); /* 0x00020001 */ /* Alias Object specific access rights */ typedef [bitmap32bit] bitmap { SAMR_ALIAS_ACCESS_ADD_MEMBER = 0x00000001, SAMR_ALIAS_ACCESS_REMOVE_MEMBER = 0x00000002, SAMR_ALIAS_ACCESS_GET_MEMBERS = 0x00000004, SAMR_ALIAS_ACCESS_LOOKUP_INFO = 0x00000008, SAMR_ALIAS_ACCESS_SET_INFO = 0x00000010 } samr_AliasAccessMask; const int SAMR_ALIAS_ACCESS_ALL_ACCESS = 0x0000001F; const int GENERIC_RIGHTS_ALIAS_ALL_ACCESS = (STANDARD_RIGHTS_REQUIRED_ACCESS | SAMR_ALIAS_ACCESS_ALL_ACCESS); /* 0x000f001f */ const int GENERIC_RIGHTS_ALIAS_READ = (STANDARD_RIGHTS_READ_ACCESS | SAMR_ALIAS_ACCESS_GET_MEMBERS); /* 0x00020004 */ const int GENERIC_RIGHTS_ALIAS_WRITE = (STANDARD_RIGHTS_WRITE_ACCESS | SAMR_ALIAS_ACCESS_REMOVE_MEMBER | SAMR_ALIAS_ACCESS_ADD_MEMBER | SAMR_ALIAS_ACCESS_SET_INFO); /* 0x00020013 */ const int GENERIC_RIGHTS_ALIAS_EXECUTE = (STANDARD_RIGHTS_EXECUTE_ACCESS | SAMR_ALIAS_ACCESS_LOOKUP_INFO); /* 0x00020008 */ /******************/ /* Function: 0x00 */ NTSTATUS samr_Connect ( /* notice the lack of [string] */ [in,unique] uint16 *system_name, [in] samr_ConnectAccessMask access_mask, [out,ref] policy_handle *connect_handle ); /******************/ /* Function: 0x01 */ [public] NTSTATUS samr_Close ( [in,out,ref] policy_handle *handle ); /******************/ /* Function: 0x02 */ NTSTATUS samr_SetSecurity ( [in,ref] policy_handle *handle, [in] security_secinfo sec_info, [in,ref] sec_desc_buf *sdbuf ); /******************/ /* Function: 0x03 */ NTSTATUS samr_QuerySecurity ( [in,ref] policy_handle *handle, [in] security_secinfo sec_info, [out,ref] sec_desc_buf **sdbuf ); /******************/ /* Function: 0x04 */ /* shutdown the SAM - once you call this the SAM will be dead */ NTSTATUS samr_Shutdown ( [in,ref] policy_handle *connect_handle ); /******************/ /* Function: 0x05 */ NTSTATUS samr_LookupDomain ( [in,ref] policy_handle *connect_handle, [in,ref] lsa_String *domain_name, [out,ref] dom_sid2 **sid ); /******************/ /* Function: 0x06 */ typedef struct { uint32 idx; lsa_String name; } samr_SamEntry; typedef struct { uint32 count; [size_is(count)] samr_SamEntry *entries; } samr_SamArray; NTSTATUS samr_EnumDomains ( [in] policy_handle *connect_handle, [in,out,ref] uint32 *resume_handle, [out,ref] samr_SamArray **sam, [in] uint32 buf_size, [out,ref] uint32 *num_entries ); /************************/ /* Function 0x07 */ [public] NTSTATUS samr_OpenDomain( [in,ref] policy_handle *connect_handle, [in] samr_DomainAccessMask access_mask, [in,ref] dom_sid2 *sid, [out,ref] policy_handle *domain_handle ); /************************/ /* Function 0x08 */ /* server roles */ typedef [v1_enum] enum { SAMR_ROLE_STANDALONE = 0, SAMR_ROLE_DOMAIN_MEMBER = 1, SAMR_ROLE_DOMAIN_BDC = 2, SAMR_ROLE_DOMAIN_PDC = 3 } samr_Role; /* password properties flags */ typedef [public,bitmap32bit] bitmap { DOMAIN_PASSWORD_COMPLEX = 0x00000001, DOMAIN_PASSWORD_NO_ANON_CHANGE = 0x00000002, DOMAIN_PASSWORD_NO_CLEAR_CHANGE = 0x00000004, DOMAIN_PASSWORD_LOCKOUT_ADMINS = 0x00000008, DOMAIN_PASSWORD_STORE_CLEARTEXT = 0x00000010, DOMAIN_REFUSE_PASSWORD_CHANGE = 0x00000020 } samr_PasswordProperties; typedef [v1_enum] enum { DOMAIN_SERVER_ENABLED = 1, DOMAIN_SERVER_DISABLED = 2 } samr_DomainServerState; typedef struct { uint16 min_password_length; uint16 password_history_length; samr_PasswordProperties password_properties; /* yes, these are signed. They are in negative 100ns */ dlong max_password_age; dlong min_password_age; } samr_DomInfo1; typedef struct { NTTIME force_logoff_time; lsa_String oem_information; /* comment */ lsa_String domain_name; lsa_String primary; /* PDC name if this is a BDC */ udlong sequence_num; samr_DomainServerState domain_server_state; samr_Role role; uint32 unknown3; uint32 num_users; uint32 num_groups; uint32 num_aliases; } samr_DomGeneralInformation; typedef struct { NTTIME force_logoff_time; } samr_DomInfo3; typedef struct { lsa_String oem_information; /* comment */ } samr_DomOEMInformation; typedef struct { lsa_String domain_name; } samr_DomInfo5; typedef struct { lsa_String primary; } samr_DomInfo6; typedef struct { samr_Role role; } samr_DomInfo7; typedef struct { hyper sequence_num; NTTIME domain_create_time; } samr_DomInfo8; typedef struct { samr_DomainServerState domain_server_state; } samr_DomInfo9; typedef struct { samr_DomGeneralInformation general; hyper lockout_duration; hyper lockout_window; uint16 lockout_threshold; } samr_DomGeneralInformation2; typedef struct { hyper lockout_duration; hyper lockout_window; uint16 lockout_threshold; } samr_DomInfo12; typedef struct { hyper sequence_num; NTTIME domain_create_time; hyper modified_count_at_last_promotion; } samr_DomInfo13; typedef [switch_type(uint16)] union { [case(1)] samr_DomInfo1 info1; [case(2)] samr_DomGeneralInformation general; [case(3)] samr_DomInfo3 info3; [case(4)] samr_DomOEMInformation oem; [case(5)] samr_DomInfo5 info5; [case(6)] samr_DomInfo6 info6; [case(7)] samr_DomInfo7 info7; [case(8)] samr_DomInfo8 info8; [case(9)] samr_DomInfo9 info9; [case(11)] samr_DomGeneralInformation2 general2; [case(12)] samr_DomInfo12 info12; [case(13)] samr_DomInfo13 info13; } samr_DomainInfo; NTSTATUS samr_QueryDomainInfo( [in,ref] policy_handle *domain_handle, [in] uint16 level, [out,ref,switch_is(level)] samr_DomainInfo **info ); /************************/ /* Function 0x09 */ /* only levels 1, 3, 4, 6, 7, 9, 12 are valid for this call in w2k3 */ NTSTATUS samr_SetDomainInfo( [in,ref] policy_handle *domain_handle, [in] uint16 level, [in,switch_is(level),ref] samr_DomainInfo *info ); /************************/ /* Function 0x0a */ NTSTATUS samr_CreateDomainGroup( [in,ref] policy_handle *domain_handle, [in,ref] lsa_String *name, [in] samr_GroupAccessMask access_mask, [out,ref] policy_handle *group_handle, [out,ref] uint32 *rid ); /************************/ /* Function 0x0b */ NTSTATUS samr_EnumDomainGroups( [in] policy_handle *domain_handle, [in,out,ref] uint32 *resume_handle, [out,ref] samr_SamArray **sam, [in] uint32 max_size, [out,ref] uint32 *num_entries ); /************************/ /* Function 0x0c */ NTSTATUS samr_CreateUser( [in,ref] policy_handle *domain_handle, [in,ref] lsa_String *account_name, [in] samr_UserAccessMask access_mask, [out,ref] policy_handle *user_handle, [out,ref] uint32 *rid ); /************************/ /* Function 0x0d */ /* w2k3 treats max_size as max_users*54 and sets the resume_handle as the rid of the last user sent */ const int SAMR_ENUM_USERS_MULTIPLIER = 54; NTSTATUS samr_EnumDomainUsers( [in] policy_handle *domain_handle, [in,out,ref] uint32 *resume_handle, [in] samr_AcctFlags acct_flags, [out,ref] samr_SamArray **sam, [in] uint32 max_size, [out,ref] uint32 *num_entries ); /************************/ /* Function 0x0e */ NTSTATUS samr_CreateDomAlias( [in,ref] policy_handle *domain_handle, [in,ref] lsa_String *alias_name, [in] samr_AliasAccessMask access_mask, [out,ref] policy_handle *alias_handle, [out,ref] uint32 *rid ); /************************/ /* Function 0x0f */ NTSTATUS samr_EnumDomainAliases( [in] policy_handle *domain_handle, [in,out,ref] uint32 *resume_handle, [out,ref] samr_SamArray **sam, [in] uint32 max_size, [out,ref] uint32 *num_entries ); /************************/ /* Function 0x10 */ typedef struct { [range(0,1024)] uint32 count; [size_is(count)] uint32 *ids; } samr_Ids; NTSTATUS samr_GetAliasMembership( [in,ref] policy_handle *domain_handle, [in,ref] lsa_SidArray *sids, [out,ref] samr_Ids *rids ); /************************/ /* Function 0x11 */ [public] NTSTATUS samr_LookupNames( [in,ref] policy_handle *domain_handle, [in,range(0,1000)] uint32 num_names, [in,size_is(1000),length_is(num_names)] lsa_String names[], [out,ref] samr_Ids *rids, [out,ref] samr_Ids *types ); /************************/ /* Function 0x12 */ NTSTATUS samr_LookupRids( [in,ref] policy_handle *domain_handle, [in,range(0,1000)] uint32 num_rids, [in,size_is(1000),length_is(num_rids)] uint32 rids[], [out,ref] lsa_Strings *names, [out,ref] samr_Ids *types ); /************************/ /* Function 0x13 */ NTSTATUS samr_OpenGroup( [in,ref] policy_handle *domain_handle, [in] samr_GroupAccessMask access_mask, [in] uint32 rid, [out,ref] policy_handle *group_handle ); /* Group attributes */ typedef [public,bitmap32bit] bitmap { SE_GROUP_MANDATORY = 0x00000001, SE_GROUP_ENABLED_BY_DEFAULT = 0x00000002, SE_GROUP_ENABLED = 0x00000004, SE_GROUP_OWNER = 0x00000008, SE_GROUP_USE_FOR_DENY_ONLY = 0x00000010, SE_GROUP_RESOURCE = 0x20000000, SE_GROUP_LOGON_ID = 0xC0000000 } samr_GroupAttrs; /************************/ /* Function 0x14 */ typedef struct { lsa_String name; samr_GroupAttrs attributes; uint32 num_members; lsa_String description; } samr_GroupInfoAll; typedef struct { samr_GroupAttrs attributes; } samr_GroupInfoAttributes; typedef struct { lsa_String description; } samr_GroupInfoDescription; typedef enum { GROUPINFOALL = 1, GROUPINFONAME = 2, GROUPINFOATTRIBUTES = 3, GROUPINFODESCRIPTION = 4, GROUPINFOALL2 = 5 } samr_GroupInfoEnum; typedef [switch_type(samr_GroupInfoEnum)] union { [case(GROUPINFOALL)] samr_GroupInfoAll all; [case(GROUPINFONAME)] lsa_String name; [case(GROUPINFOATTRIBUTES)] samr_GroupInfoAttributes attributes; [case(GROUPINFODESCRIPTION)] lsa_String description; [case(GROUPINFOALL2)] samr_GroupInfoAll all2; } samr_GroupInfo; NTSTATUS samr_QueryGroupInfo( [in,ref] policy_handle *group_handle, [in] samr_GroupInfoEnum level, [out,ref,switch_is(level)] samr_GroupInfo **info ); /************************/ /* Function 0x15 */ NTSTATUS samr_SetGroupInfo( [in,ref] policy_handle *group_handle, [in] samr_GroupInfoEnum level, [in,switch_is(level),ref] samr_GroupInfo *info ); /************************/ /* Function 0x16 */ NTSTATUS samr_AddGroupMember( [in,ref] policy_handle *group_handle, [in] uint32 rid, [in] uint32 flags ); /************************/ /* Function 0x17 */ NTSTATUS samr_DeleteDomainGroup( [in,out,ref] policy_handle *group_handle ); /************************/ /* Function 0x18 */ NTSTATUS samr_DeleteGroupMember( [in,ref] policy_handle *group_handle, [in] uint32 rid ); /************************/ /* Function 0x19 */ typedef struct { uint32 count; [size_is(count)] uint32 *rids; [size_is(count)] uint32 *types; } samr_RidTypeArray; NTSTATUS samr_QueryGroupMember( [in,ref] policy_handle *group_handle, [out,ref] samr_RidTypeArray **rids ); /************************/ /* Function 0x1a */ /* win2003 seems to accept any data at all for the two integers below, and doesn't seem to do anything with them that I can see. Weird. I really expected the first integer to be a rid and the second to be the attributes for that rid member. */ NTSTATUS samr_SetMemberAttributesOfGroup( [in,ref] policy_handle *group_handle, [in] uint32 unknown1, [in] uint32 unknown2 ); /************************/ /* Function 0x1b */ NTSTATUS samr_OpenAlias ( [in,ref] policy_handle *domain_handle, [in] samr_AliasAccessMask access_mask, [in] uint32 rid, [out,ref] policy_handle *alias_handle ); /************************/ /* Function 0x1c */ typedef struct { lsa_String name; uint32 num_members; lsa_String description; } samr_AliasInfoAll; typedef enum { ALIASINFOALL = 1, ALIASINFONAME = 2, ALIASINFODESCRIPTION = 3 } samr_AliasInfoEnum; typedef [switch_type(samr_AliasInfoEnum)] union { [case(ALIASINFOALL)] samr_AliasInfoAll all; [case(ALIASINFONAME)] lsa_String name; [case(ALIASINFODESCRIPTION)] lsa_String description; } samr_AliasInfo; NTSTATUS samr_QueryAliasInfo( [in,ref] policy_handle *alias_handle, [in] samr_AliasInfoEnum level, [out,ref,switch_is(level)] samr_AliasInfo **info ); /************************/ /* Function 0x1d */ NTSTATUS samr_SetAliasInfo( [in,ref] policy_handle *alias_handle, [in] samr_AliasInfoEnum level, [in,switch_is(level),ref] samr_AliasInfo *info ); /************************/ /* Function 0x1e */ NTSTATUS samr_DeleteDomAlias( [in,out,ref] policy_handle *alias_handle ); /************************/ /* Function 0x1f */ NTSTATUS samr_AddAliasMember( [in,ref] policy_handle *alias_handle, [in,ref] dom_sid2 *sid ); /************************/ /* Function 0x20 */ NTSTATUS samr_DeleteAliasMember( [in,ref] policy_handle *alias_handle, [in,ref] dom_sid2 *sid ); /************************/ /* Function 0x21 */ NTSTATUS samr_GetMembersInAlias( [in,ref] policy_handle *alias_handle, [out,ref] lsa_SidArray *sids ); /************************/ /* Function 0x22 */ [public] NTSTATUS samr_OpenUser( [in,ref] policy_handle *domain_handle, [in] samr_UserAccessMask access_mask, [in] uint32 rid, [out,ref] policy_handle *user_handle ); /************************/ /* Function 0x23 */ NTSTATUS samr_DeleteUser( [in,out,ref] policy_handle *user_handle ); /************************/ /* Function 0x24 */ typedef struct { lsa_String account_name; lsa_String full_name; uint32 primary_gid; lsa_String description; lsa_String comment; } samr_UserInfo1; typedef struct { lsa_String comment; lsa_String unknown; /* settable, but doesn't stick. probably obsolete */ uint16 country_code; uint16 code_page; } samr_UserInfo2; /* this is also used in samr and netlogon */ typedef [public, flag(NDR_PAHEX)] struct { uint16 units_per_week; [size_is(1260), length_is(units_per_week/8)] uint8 *bits; } samr_LogonHours; typedef struct { lsa_String account_name; lsa_String full_name; uint32 rid; uint32 primary_gid; lsa_String home_directory; lsa_String home_drive; lsa_String logon_script; lsa_String profile_path; lsa_String workstations; NTTIME last_logon; NTTIME last_logoff; NTTIME last_password_change; NTTIME allow_password_change; NTTIME force_password_change; samr_LogonHours logon_hours; uint16 bad_password_count; uint16 logon_count; samr_AcctFlags acct_flags; } samr_UserInfo3; typedef struct { samr_LogonHours logon_hours; } samr_UserInfo4; typedef struct { lsa_String account_name; lsa_String full_name; uint32 rid; uint32 primary_gid; lsa_String home_directory; lsa_String home_drive; lsa_String logon_script; lsa_String profile_path; lsa_String description; lsa_String workstations; NTTIME last_logon; NTTIME last_logoff; samr_LogonHours logon_hours; uint16 bad_password_count; uint16 logon_count; NTTIME last_password_change; NTTIME acct_expiry; samr_AcctFlags acct_flags; } samr_UserInfo5; typedef struct { lsa_String account_name; lsa_String full_name; } samr_UserInfo6; typedef struct { lsa_String account_name; } samr_UserInfo7; typedef struct { lsa_String full_name; } samr_UserInfo8; typedef struct { uint32 primary_gid; } samr_UserInfo9; typedef struct { lsa_String home_directory; lsa_String home_drive; } samr_UserInfo10; typedef struct { lsa_String logon_script; } samr_UserInfo11; typedef struct { lsa_String profile_path; } samr_UserInfo12; typedef struct { lsa_String description; } samr_UserInfo13; typedef struct { lsa_String workstations; } samr_UserInfo14; typedef struct { samr_AcctFlags acct_flags; } samr_UserInfo16; typedef struct { NTTIME acct_expiry; } samr_UserInfo17; typedef [public, flag(NDR_PAHEX)] struct { uint8 hash[16]; } samr_Password; typedef struct { samr_Password lm_pwd; samr_Password nt_pwd; boolean8 lm_pwd_active; boolean8 nt_pwd_active; } samr_UserInfo18; typedef struct { lsa_BinaryString parameters; } samr_UserInfo20; /* this defines the bits used for fields_present in info21 */ typedef [bitmap32bit] bitmap { SAMR_FIELD_ACCOUNT_NAME = 0x00000001, SAMR_FIELD_FULL_NAME = 0x00000002, SAMR_FIELD_RID = 0x00000004, SAMR_FIELD_PRIMARY_GID = 0x00000008, SAMR_FIELD_DESCRIPTION = 0x00000010, SAMR_FIELD_COMMENT = 0x00000020, SAMR_FIELD_HOME_DIRECTORY = 0x00000040, SAMR_FIELD_HOME_DRIVE = 0x00000080, SAMR_FIELD_LOGON_SCRIPT = 0x00000100, SAMR_FIELD_PROFILE_PATH = 0x00000200, SAMR_FIELD_WORKSTATIONS = 0x00000400, SAMR_FIELD_LAST_LOGON = 0x00000800, SAMR_FIELD_LAST_LOGOFF = 0x00001000, SAMR_FIELD_LOGON_HOURS = 0x00002000, SAMR_FIELD_BAD_PWD_COUNT = 0x00004000, SAMR_FIELD_NUM_LOGONS = 0x00008000, SAMR_FIELD_ALLOW_PWD_CHANGE = 0x00010000, SAMR_FIELD_FORCE_PWD_CHANGE = 0x00020000, SAMR_FIELD_LAST_PWD_CHANGE = 0x00040000, SAMR_FIELD_ACCT_EXPIRY = 0x00080000, SAMR_FIELD_ACCT_FLAGS = 0x00100000, SAMR_FIELD_PARAMETERS = 0x00200000, SAMR_FIELD_COUNTRY_CODE = 0x00400000, SAMR_FIELD_CODE_PAGE = 0x00800000, SAMR_FIELD_NT_PASSWORD_PRESENT = 0x01000000, /* either of these */ SAMR_FIELD_LM_PASSWORD_PRESENT = 0x02000000, /* two bits seems to work */ SAMR_FIELD_PRIVATE_DATA = 0x04000000, SAMR_FIELD_EXPIRED_FLAG = 0x08000000, SAMR_FIELD_SEC_DESC = 0x10000000, SAMR_FIELD_OWF_PWD = 0x20000000 } samr_FieldsPresent; /* used for 'password_expired' in samr_UserInfo21 */ const int PASS_MUST_CHANGE_AT_NEXT_LOGON = 0x01; const int PASS_DONT_CHANGE_AT_NEXT_LOGON = 0x00; typedef struct { NTTIME last_logon; NTTIME last_logoff; NTTIME last_password_change; NTTIME acct_expiry; NTTIME allow_password_change; NTTIME force_password_change; lsa_String account_name; lsa_String full_name; lsa_String home_directory; lsa_String home_drive; lsa_String logon_script; lsa_String profile_path; lsa_String description; lsa_String workstations; lsa_String comment; lsa_BinaryString parameters; lsa_BinaryString lm_owf_password; lsa_BinaryString nt_owf_password; lsa_String unknown3; uint32 buf_count; [size_is(buf_count)] uint8 *buffer; uint32 rid; uint32 primary_gid; samr_AcctFlags acct_flags; samr_FieldsPresent fields_present; samr_LogonHours logon_hours; uint16 bad_password_count; uint16 logon_count; uint16 country_code; uint16 code_page; uint8 lm_password_set; uint8 nt_password_set; uint8 password_expired; uint8 unknown4; } samr_UserInfo21; typedef [public, flag(NDR_PAHEX)] struct { uint8 data[516]; } samr_CryptPassword; typedef struct { samr_UserInfo21 info; samr_CryptPassword password; } samr_UserInfo23; typedef struct { samr_CryptPassword password; uint8 password_expired; } samr_UserInfo24; typedef [flag(NDR_PAHEX)] struct { uint8 data[532]; } samr_CryptPasswordEx; typedef struct { samr_UserInfo21 info; samr_CryptPasswordEx password; } samr_UserInfo25; typedef struct { samr_CryptPasswordEx password; uint8 password_expired; } samr_UserInfo26; typedef [switch_type(uint16)] union { [case(1)] samr_UserInfo1 info1; [case(2)] samr_UserInfo2 info2; [case(3)] samr_UserInfo3 info3; [case(4)] samr_UserInfo4 info4; [case(5)] samr_UserInfo5 info5; [case(6)] samr_UserInfo6 info6; [case(7)] samr_UserInfo7 info7; [case(8)] samr_UserInfo8 info8; [case(9)] samr_UserInfo9 info9; [case(10)] samr_UserInfo10 info10; [case(11)] samr_UserInfo11 info11; [case(12)] samr_UserInfo12 info12; [case(13)] samr_UserInfo13 info13; [case(14)] samr_UserInfo14 info14; [case(16)] samr_UserInfo16 info16; [case(17)] samr_UserInfo17 info17; [case(18)] samr_UserInfo18 info18; [case(20)] samr_UserInfo20 info20; [case(21)] samr_UserInfo21 info21; [case(23)] samr_UserInfo23 info23; [case(24)] samr_UserInfo24 info24; [case(25)] samr_UserInfo25 info25; [case(26)] samr_UserInfo26 info26; } samr_UserInfo; [public] NTSTATUS samr_QueryUserInfo( [in,ref] policy_handle *user_handle, [in] uint16 level, [out,ref,switch_is(level)] samr_UserInfo **info ); /************************/ /* Function 0x25 */ [public] NTSTATUS samr_SetUserInfo( [in,ref] policy_handle *user_handle, [in] uint16 level, [in,ref,switch_is(level)] samr_UserInfo *info ); /************************/ /* Function 0x26 */ /* this is a password change interface that doesn't give the server the plaintext password. Depricated. */ NTSTATUS samr_ChangePasswordUser( [in,ref] policy_handle *user_handle, [in] boolean8 lm_present, [in,unique] samr_Password *old_lm_crypted, [in,unique] samr_Password *new_lm_crypted, [in] boolean8 nt_present, [in,unique] samr_Password *old_nt_crypted, [in,unique] samr_Password *new_nt_crypted, [in] boolean8 cross1_present, [in,unique] samr_Password *nt_cross, [in] boolean8 cross2_present, [in,unique] samr_Password *lm_cross ); /************************/ /* Function 0x27 */ typedef [public] struct { uint32 rid; samr_GroupAttrs attributes; } samr_RidWithAttribute; typedef [public] struct { uint32 count; [size_is(count)] samr_RidWithAttribute *rids; } samr_RidWithAttributeArray; NTSTATUS samr_GetGroupsForUser( [in,ref] policy_handle *user_handle, [out,ref] samr_RidWithAttributeArray **rids ); /************************/ /* Function 0x28 */ typedef struct { uint32 idx; uint32 rid; samr_AcctFlags acct_flags; lsa_String account_name; lsa_String description; lsa_String full_name; } samr_DispEntryGeneral; typedef struct { uint32 count; [size_is(count)] samr_DispEntryGeneral *entries; } samr_DispInfoGeneral; typedef struct { uint32 idx; uint32 rid; samr_AcctFlags acct_flags; lsa_String account_name; lsa_String description; } samr_DispEntryFull; typedef struct { uint32 count; [size_is(count)] samr_DispEntryFull *entries; } samr_DispInfoFull; typedef struct { uint32 idx; uint32 rid; samr_GroupAttrs acct_flags; lsa_String account_name; lsa_String description; } samr_DispEntryFullGroup; typedef struct { uint32 count; [size_is(count)] samr_DispEntryFullGroup *entries; } samr_DispInfoFullGroups; typedef struct { uint32 idx; lsa_AsciiStringLarge account_name; } samr_DispEntryAscii; typedef struct { uint32 count; [size_is(count)] samr_DispEntryAscii *entries; } samr_DispInfoAscii; typedef [switch_type(uint16)] union { [case(1)] samr_DispInfoGeneral info1;/* users */ [case(2)] samr_DispInfoFull info2; /* trust accounts? */ [case(3)] samr_DispInfoFullGroups info3; /* groups */ [case(4)] samr_DispInfoAscii info4; /* users */ [case(5)] samr_DispInfoAscii info5; /* groups */ } samr_DispInfo; NTSTATUS samr_QueryDisplayInfo( [in,ref] policy_handle *domain_handle, [in] uint16 level, [in] uint32 start_idx, [in] uint32 max_entries, [in] uint32 buf_size, [out,ref] uint32 *total_size, [out,ref] uint32 *returned_size, [out,ref,switch_is(level)] samr_DispInfo *info ); /************************/ /* Function 0x29 */ /* this seems to be an alphabetic search function. The returned index is the index for samr_QueryDisplayInfo needed to get names occurring after the specified name. The supplied name does not need to exist in the database (for example you can supply just a first letter for searching starting at that letter) The level corresponds to the samr_QueryDisplayInfo level */ NTSTATUS samr_GetDisplayEnumerationIndex( [in,ref] policy_handle *domain_handle, [in] uint16 level, [in,ref] lsa_String *name, [out,ref] uint32 *idx ); /************************/ /* Function 0x2a */ /* w2k3 returns NT_STATUS_NOT_IMPLEMENTED for this */ NTSTATUS samr_TestPrivateFunctionsDomain( [in,ref] policy_handle *domain_handle ); /************************/ /* Function 0x2b */ /* w2k3 returns NT_STATUS_NOT_IMPLEMENTED for this */ NTSTATUS samr_TestPrivateFunctionsUser( [in,ref] policy_handle *user_handle ); /************************/ /* Function 0x2c */ typedef struct { uint16 min_password_length; samr_PasswordProperties password_properties; } samr_PwInfo; [public] NTSTATUS samr_GetUserPwInfo( [in,ref] policy_handle *user_handle, [out,ref] samr_PwInfo *info ); /************************/ /* Function 0x2d */ NTSTATUS samr_RemoveMemberFromForeignDomain( [in,ref] policy_handle *domain_handle, [in,ref] dom_sid2 *sid ); /************************/ /* Function 0x2e */ /* how is this different from QueryDomainInfo ?? */ NTSTATUS samr_QueryDomainInfo2( [in,ref] policy_handle *domain_handle, [in] uint16 level, [out,ref,switch_is(level)] samr_DomainInfo **info ); /************************/ /* Function 0x2f */ /* how is this different from QueryUserInfo ?? */ NTSTATUS samr_QueryUserInfo2( [in,ref] policy_handle *user_handle, [in] uint16 level, [out,ref,switch_is(level)] samr_UserInfo **info ); /************************/ /* Function 0x30 */ /* how is this different from QueryDisplayInfo?? */ NTSTATUS samr_QueryDisplayInfo2( [in,ref] policy_handle *domain_handle, [in] uint16 level, [in] uint32 start_idx, [in] uint32 max_entries, [in] uint32 buf_size, [out,ref] uint32 *total_size, [out,ref] uint32 *returned_size, [out,ref,switch_is(level)] samr_DispInfo *info ); /************************/ /* Function 0x31 */ /* how is this different from GetDisplayEnumerationIndex ?? */ NTSTATUS samr_GetDisplayEnumerationIndex2( [in,ref] policy_handle *domain_handle, [in] uint16 level, [in,ref] lsa_String *name, [out,ref] uint32 *idx ); /************************/ /* Function 0x32 */ NTSTATUS samr_CreateUser2( [in,ref] policy_handle *domain_handle, [in,ref] lsa_String *account_name, [in] samr_AcctFlags acct_flags, [in] samr_UserAccessMask access_mask, [out,ref] policy_handle *user_handle, [out,ref] uint32 *access_granted, [out,ref] uint32 *rid ); /************************/ /* Function 0x33 */ /* another duplicate. There must be a reason .... */ NTSTATUS samr_QueryDisplayInfo3( [in,ref] policy_handle *domain_handle, [in] uint16 level, [in] uint32 start_idx, [in] uint32 max_entries, [in] uint32 buf_size, [out,ref] uint32 *total_size, [out,ref] uint32 *returned_size, [out,ref,switch_is(level)] samr_DispInfo *info ); /************************/ /* Function 0x34 */ NTSTATUS samr_AddMultipleMembersToAlias( [in,ref] policy_handle *alias_handle, [in,ref] lsa_SidArray *sids ); /************************/ /* Function 0x35 */ NTSTATUS samr_RemoveMultipleMembersFromAlias( [in,ref] policy_handle *alias_handle, [in,ref] lsa_SidArray *sids ); /************************/ /* Function 0x36 */ NTSTATUS samr_OemChangePasswordUser2( [in,unique] lsa_AsciiString *server, [in,ref] lsa_AsciiString *account, [in,unique] samr_CryptPassword *password, [in,unique] samr_Password *hash ); /************************/ /* Function 0x37 */ NTSTATUS samr_ChangePasswordUser2( [in,unique] lsa_String *server, [in,ref] lsa_String *account, [in,unique] samr_CryptPassword *nt_password, [in,unique] samr_Password *nt_verifier, [in] boolean8 lm_change, [in,unique] samr_CryptPassword *lm_password, [in,unique] samr_Password *lm_verifier ); /************************/ /* Function 0x38 */ NTSTATUS samr_GetDomPwInfo( [in,unique] lsa_String *domain_name, [out,ref] samr_PwInfo *info ); /************************/ /* Function 0x39 */ NTSTATUS samr_Connect2( [in,unique,string,charset(UTF16)] uint16 *system_name, [in] samr_ConnectAccessMask access_mask, [out,ref] policy_handle *connect_handle ); /************************/ /* Function 0x3a */ /* seems to be an exact alias for samr_SetUserInfo() */ [public] NTSTATUS samr_SetUserInfo2( [in,ref] policy_handle *user_handle, [in] uint16 level, [in,ref,switch_is(level)] samr_UserInfo *info ); /************************/ /* Function 0x3b */ /* this one is mysterious. I have a few guesses, but nothing working yet */ NTSTATUS samr_SetBootKeyInformation( [in,ref] policy_handle *connect_handle, [in] uint32 unknown1, [in] uint32 unknown2, [in] uint32 unknown3 ); /************************/ /* Function 0x3c */ NTSTATUS samr_GetBootKeyInformation( [in,ref] policy_handle *domain_handle, [out,ref] uint32 *unknown ); /************************/ /* Function 0x3d */ NTSTATUS samr_Connect3( [in,unique,string,charset(UTF16)] uint16 *system_name, /* this unknown value seems to be completely ignored by w2k3 */ [in] uint32 unknown, [in] samr_ConnectAccessMask access_mask, [out,ref] policy_handle *connect_handle ); /************************/ /* Function 0x3e */ typedef enum { SAMR_CONNECT_PRE_W2K = 1, SAMR_CONNECT_W2K = 2, SAMR_CONNECT_AFTER_W2K = 3 } samr_ConnectVersion; NTSTATUS samr_Connect4( [in,unique,string,charset(UTF16)] uint16 *system_name, [in] samr_ConnectVersion client_version, [in] samr_ConnectAccessMask access_mask, [out,ref] policy_handle *connect_handle ); /************************/ /* Function 0x3f */ typedef enum samr_RejectReason samr_RejectReason; typedef struct { samr_RejectReason reason; uint32 unknown1; uint32 unknown2; } samr_ChangeReject; NTSTATUS samr_ChangePasswordUser3( [in,unique] lsa_String *server, [in,ref] lsa_String *account, [in,unique] samr_CryptPassword *nt_password, [in,unique] samr_Password *nt_verifier, [in] boolean8 lm_change, [in,unique] samr_CryptPassword *lm_password, [in,unique] samr_Password *lm_verifier, [in,unique] samr_CryptPassword *password3, [out,ref] samr_DomInfo1 **dominfo, [out,ref] samr_ChangeReject **reject ); /************************/ /* Function 0x40 */ typedef struct { samr_ConnectVersion client_version; /* w2k3 gives 3 */ uint32 unknown2; /* w2k3 gives 0 */ } samr_ConnectInfo1; typedef union { [case(1)] samr_ConnectInfo1 info1; } samr_ConnectInfo; [public] NTSTATUS samr_Connect5( [in,unique,string,charset(UTF16)] uint16 *system_name, [in] samr_ConnectAccessMask access_mask, [in] uint32 level_in, [in,ref,switch_is(level_in)] samr_ConnectInfo *info_in, [out,ref] uint32 *level_out, [out,ref,switch_is(*level_out)] samr_ConnectInfo *info_out, [out,ref] policy_handle *connect_handle ); /************************/ /* Function 0x41 */ NTSTATUS samr_RidToSid( [in,ref] policy_handle *domain_handle, [in] uint32 rid, [out,ref] dom_sid2 **sid ); /************************/ /* Function 0x42 */ /* this should set the DSRM password for the server, which is used when booting into Directory Services Recovery Mode on a DC. Win2003 gives me NT_STATUS_NOT_SUPPORTED */ NTSTATUS samr_SetDsrmPassword( [in,unique] lsa_String *name, [in] uint32 unknown, [in,unique] samr_Password *hash ); /************************/ /* Function 0x43 */ /************************/ typedef [bitmap32bit] bitmap { SAMR_VALIDATE_FIELD_PASSWORD_LAST_SET = 0x00000001, SAMR_VALIDATE_FIELD_BAD_PASSWORD_TIME = 0x00000002, SAMR_VALIDATE_FIELD_LOCKOUT_TIME = 0x00000004, SAMR_VALIDATE_FIELD_BAD_PASSWORD_COUNT = 0x00000008, SAMR_VALIDATE_FIELD_PASSWORD_HISTORY_LENGTH = 0x00000010, SAMR_VALIDATE_FIELD_PASSWORD_HISTORY = 0x00000020 } samr_ValidateFieldsPresent; typedef enum { NetValidateAuthentication = 1, NetValidatePasswordChange= 2, NetValidatePasswordReset = 3 } samr_ValidatePasswordLevel; /* NetApi maps samr_ValidationStatus errors to WERRORs. Haven't * identified the mapping of * - NERR_PasswordFilterError * - NERR_PasswordExpired and * - NERR_PasswordCantChange * yet - Guenther */ typedef enum { SAMR_VALIDATION_STATUS_SUCCESS = 0, SAMR_VALIDATION_STATUS_PASSWORD_MUST_CHANGE = 1, SAMR_VALIDATION_STATUS_ACCOUNT_LOCKED_OUT = 2, SAMR_VALIDATION_STATUS_BAD_PASSWORD = 4, SAMR_VALIDATION_STATUS_PWD_HISTORY_CONFLICT = 5, SAMR_VALIDATION_STATUS_PWD_TOO_SHORT = 6, SAMR_VALIDATION_STATUS_PWD_TOO_LONG = 7, SAMR_VALIDATION_STATUS_NOT_COMPLEX_ENOUGH = 8, SAMR_VALIDATION_STATUS_PASSWORD_TOO_RECENT = 9 } samr_ValidationStatus; typedef struct { uint32 length; [size_is(length)] uint8 *data; } samr_ValidationBlob; typedef struct { samr_ValidateFieldsPresent fields_present; NTTIME_hyper last_password_change; NTTIME_hyper bad_password_time; NTTIME_hyper lockout_time; uint32 bad_pwd_count; uint32 pwd_history_len; [size_is(pwd_history_len)] samr_ValidationBlob *pwd_history; } samr_ValidatePasswordInfo; typedef struct { samr_ValidatePasswordInfo info; samr_ValidationStatus status; } samr_ValidatePasswordRepCtr; typedef [switch_type(uint16)] union { [case(1)] samr_ValidatePasswordRepCtr ctr1; [case(2)] samr_ValidatePasswordRepCtr ctr2; [case(3)] samr_ValidatePasswordRepCtr ctr3; } samr_ValidatePasswordRep; typedef struct { samr_ValidatePasswordInfo info; lsa_StringLarge password; lsa_StringLarge account; samr_ValidationBlob hash; boolean8 pwd_must_change_at_next_logon; boolean8 clear_lockout; } samr_ValidatePasswordReq3; typedef struct { samr_ValidatePasswordInfo info; lsa_StringLarge password; lsa_StringLarge account; samr_ValidationBlob hash; boolean8 password_matched; } samr_ValidatePasswordReq2; typedef struct { samr_ValidatePasswordInfo info; boolean8 password_matched; } samr_ValidatePasswordReq1; typedef [switch_type(uint16)] union { [case(1)] samr_ValidatePasswordReq1 req1; [case(2)] samr_ValidatePasswordReq2 req2; [case(3)] samr_ValidatePasswordReq3 req3; } samr_ValidatePasswordReq; NTSTATUS samr_ValidatePassword( [in] samr_ValidatePasswordLevel level, [in,switch_is(level)] samr_ValidatePasswordReq *req, [out,ref,switch_is(level)] samr_ValidatePasswordRep **rep ); }