/* * Unix SMB/CIFS implementation. * client auto-generated by pidl. DO NOT MODIFY! */ #include "includes.h" #include "librpc/gen_ndr/cli_lsa.h" NTSTATUS rpccli_lsa_Close(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle) { struct lsa_Close r; NTSTATUS status; /* In parameters */ r.in.handle = handle; if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_Close, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_CLOSE, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_Close, (ndr_push_flags_fn_t)ndr_push_lsa_Close); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_Close, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ *handle = *r.out.handle; /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_Delete(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle) { struct lsa_Delete r; NTSTATUS status; /* In parameters */ r.in.handle = handle; if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_Delete, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_DELETE, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_Delete, (ndr_push_flags_fn_t)ndr_push_lsa_Delete); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_Delete, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_EnumPrivs(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, uint32_t *resume_handle, uint32_t max_count, struct lsa_PrivArray *privs) { struct lsa_EnumPrivs r; NTSTATUS status; /* In parameters */ r.in.handle = handle; r.in.resume_handle = resume_handle; r.in.max_count = max_count; if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_EnumPrivs, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_ENUMPRIVS, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_EnumPrivs, (ndr_push_flags_fn_t)ndr_push_lsa_EnumPrivs); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_EnumPrivs, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ *resume_handle = *r.out.resume_handle; *privs = *r.out.privs; /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_QuerySecurity(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, uint32_t sec_info, struct sec_desc_buf **sdbuf) { struct lsa_QuerySecurity r; NTSTATUS status; /* In parameters */ r.in.handle = handle; r.in.sec_info = sec_info; if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_QuerySecurity, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_QUERYSECURITY, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_QuerySecurity, (ndr_push_flags_fn_t)ndr_push_lsa_QuerySecurity); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_QuerySecurity, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ *sdbuf = r.out.sdbuf; /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_SetSecObj(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx) { struct lsa_SetSecObj r; NTSTATUS status; /* In parameters */ if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_SetSecObj, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_SETSECOBJ, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_SetSecObj, (ndr_push_flags_fn_t)ndr_push_lsa_SetSecObj); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_SetSecObj, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_ChangePassword(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx) { struct lsa_ChangePassword r; NTSTATUS status; /* In parameters */ if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_ChangePassword, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_CHANGEPASSWORD, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_ChangePassword, (ndr_push_flags_fn_t)ndr_push_lsa_ChangePassword); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_ChangePassword, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_OpenPolicy(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, uint16_t *system_name, struct lsa_ObjectAttribute *attr, uint32_t access_mask, struct policy_handle *handle) { struct lsa_OpenPolicy r; NTSTATUS status; /* In parameters */ r.in.system_name = system_name; r.in.attr = attr; r.in.access_mask = access_mask; if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_OpenPolicy, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_OPENPOLICY, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_OpenPolicy, (ndr_push_flags_fn_t)ndr_push_lsa_OpenPolicy); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_OpenPolicy, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ *handle = *r.out.handle; /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_QueryInfoPolicy(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, uint16_t level, union lsa_PolicyInformation **info) { struct lsa_QueryInfoPolicy r; NTSTATUS status; /* In parameters */ r.in.handle = handle; r.in.level = level; if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_QueryInfoPolicy, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_QUERYINFOPOLICY, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_QueryInfoPolicy, (ndr_push_flags_fn_t)ndr_push_lsa_QueryInfoPolicy); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_QueryInfoPolicy, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ *info = r.out.info; /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_SetInfoPolicy(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx) { struct lsa_SetInfoPolicy r; NTSTATUS status; /* In parameters */ if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_SetInfoPolicy, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_SETINFOPOLICY, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_SetInfoPolicy, (ndr_push_flags_fn_t)ndr_push_lsa_SetInfoPolicy); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_SetInfoPolicy, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_ClearAuditLog(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx) { struct lsa_ClearAuditLog r; NTSTATUS status; /* In parameters */ if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_ClearAuditLog, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_CLEARAUDITLOG, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_ClearAuditLog, (ndr_push_flags_fn_t)ndr_push_lsa_ClearAuditLog); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_ClearAuditLog, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_CreateAccount(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct dom_sid2 *sid, uint32_t access_mask, struct policy_handle *acct_handle) { struct lsa_CreateAccount r; NTSTATUS status; /* In parameters */ r.in.handle = handle; r.in.sid = sid; r.in.access_mask = access_mask; if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_CreateAccount, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_CREATEACCOUNT, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_CreateAccount, (ndr_push_flags_fn_t)ndr_push_lsa_CreateAccount); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_CreateAccount, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ *acct_handle = *r.out.acct_handle; /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_EnumAccounts(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, uint32_t *resume_handle, uint32_t num_entries, struct lsa_SidArray *sids) { struct lsa_EnumAccounts r; NTSTATUS status; /* In parameters */ r.in.handle = handle; r.in.resume_handle = resume_handle; r.in.num_entries = num_entries; if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_EnumAccounts, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_ENUMACCOUNTS, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_EnumAccounts, (ndr_push_flags_fn_t)ndr_push_lsa_EnumAccounts); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_EnumAccounts, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ *resume_handle = *r.out.resume_handle; *sids = *r.out.sids; /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_CreateTrustedDomain(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct lsa_DomainInfo *info, uint32_t access_mask, struct policy_handle *trustdom_handle) { struct lsa_CreateTrustedDomain r; NTSTATUS status; /* In parameters */ r.in.handle = handle; r.in.info = info; r.in.access_mask = access_mask; if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_CreateTrustedDomain, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_CREATETRUSTEDDOMAIN, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_CreateTrustedDomain, (ndr_push_flags_fn_t)ndr_push_lsa_CreateTrustedDomain); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_CreateTrustedDomain, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ *trustdom_handle = *r.out.trustdom_handle; /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_EnumTrustDom(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, uint32_t *resume_handle, uint32_t max_size, struct lsa_DomainList *domains) { struct lsa_EnumTrustDom r; NTSTATUS status; /* In parameters */ r.in.handle = handle; r.in.resume_handle = resume_handle; r.in.max_size = max_size; if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_EnumTrustDom, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_ENUMTRUSTDOM, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_EnumTrustDom, (ndr_push_flags_fn_t)ndr_push_lsa_EnumTrustDom); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_EnumTrustDom, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ *resume_handle = *r.out.resume_handle; *domains = *r.out.domains; /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_LookupNames(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, uint32_t num_names, struct lsa_String *names, struct lsa_RefDomainList **domains, struct lsa_TransSidArray *sids, uint16_t level, uint32_t *count) { struct lsa_LookupNames r; NTSTATUS status; /* In parameters */ r.in.handle = handle; r.in.num_names = num_names; r.in.names = names; r.in.sids = sids; r.in.level = level; r.in.count = count; if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_LookupNames, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_LOOKUPNAMES, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_LookupNames, (ndr_push_flags_fn_t)ndr_push_lsa_LookupNames); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_LookupNames, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ *domains = r.out.domains; *sids = *r.out.sids; *count = *r.out.count; /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_LookupSids(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct lsa_SidArray *sids, struct lsa_RefDomainList **domains, struct lsa_TransNameArray *names, uint16_t level, uint32_t *count) { struct lsa_LookupSids r; NTSTATUS status; /* In parameters */ r.in.handle = handle; r.in.sids = sids; r.in.names = names; r.in.level = level; r.in.count = count; if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_LookupSids, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_LOOKUPSIDS, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_LookupSids, (ndr_push_flags_fn_t)ndr_push_lsa_LookupSids); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_LookupSids, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ *domains = r.out.domains; *names = *r.out.names; *count = *r.out.count; /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_CreateSecret(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct lsa_String name, uint32_t access_mask, struct policy_handle *sec_handle) { struct lsa_CreateSecret r; NTSTATUS status; /* In parameters */ r.in.handle = handle; r.in.name = name; r.in.access_mask = access_mask; if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_CreateSecret, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_CREATESECRET, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_CreateSecret, (ndr_push_flags_fn_t)ndr_push_lsa_CreateSecret); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_CreateSecret, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ *sec_handle = *r.out.sec_handle; /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_OpenAccount(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct dom_sid2 *sid, uint32_t access_mask, struct policy_handle *acct_handle) { struct lsa_OpenAccount r; NTSTATUS status; /* In parameters */ r.in.handle = handle; r.in.sid = sid; r.in.access_mask = access_mask; if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_OpenAccount, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_OPENACCOUNT, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_OpenAccount, (ndr_push_flags_fn_t)ndr_push_lsa_OpenAccount); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_OpenAccount, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ *acct_handle = *r.out.acct_handle; /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_EnumPrivsAccount(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct lsa_PrivilegeSet **privs) { struct lsa_EnumPrivsAccount r; NTSTATUS status; /* In parameters */ r.in.handle = handle; if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_EnumPrivsAccount, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_ENUMPRIVSACCOUNT, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_EnumPrivsAccount, (ndr_push_flags_fn_t)ndr_push_lsa_EnumPrivsAccount); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_EnumPrivsAccount, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ *privs = r.out.privs; /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_AddPrivilegesToAccount(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct lsa_PrivilegeSet *privs) { struct lsa_AddPrivilegesToAccount r; NTSTATUS status; /* In parameters */ r.in.handle = handle; r.in.privs = privs; if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_AddPrivilegesToAccount, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_ADDPRIVILEGESTOACCOUNT, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_AddPrivilegesToAccount, (ndr_push_flags_fn_t)ndr_push_lsa_AddPrivilegesToAccount); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_AddPrivilegesToAccount, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_RemovePrivilegesFromAccount(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, uint8_t remove_all, struct lsa_PrivilegeSet *privs) { struct lsa_RemovePrivilegesFromAccount r; NTSTATUS status; /* In parameters */ r.in.handle = handle; r.in.remove_all = remove_all; r.in.privs = privs; if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_RemovePrivilegesFromAccount, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_REMOVEPRIVILEGESFROMACCOUNT, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_RemovePrivilegesFromAccount, (ndr_push_flags_fn_t)ndr_push_lsa_RemovePrivilegesFromAccount); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_RemovePrivilegesFromAccount, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_GetQuotasForAccount(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx) { struct lsa_GetQuotasForAccount r; NTSTATUS status; /* In parameters */ if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_GetQuotasForAccount, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_GETQUOTASFORACCOUNT, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_GetQuotasForAccount, (ndr_push_flags_fn_t)ndr_push_lsa_GetQuotasForAccount); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_GetQuotasForAccount, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_SetQuotasForAccount(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx) { struct lsa_SetQuotasForAccount r; NTSTATUS status; /* In parameters */ if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_SetQuotasForAccount, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_SETQUOTASFORACCOUNT, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_SetQuotasForAccount, (ndr_push_flags_fn_t)ndr_push_lsa_SetQuotasForAccount); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_SetQuotasForAccount, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_GetSystemAccessAccount(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx) { struct lsa_GetSystemAccessAccount r; NTSTATUS status; /* In parameters */ if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_GetSystemAccessAccount, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_GETSYSTEMACCESSACCOUNT, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_GetSystemAccessAccount, (ndr_push_flags_fn_t)ndr_push_lsa_GetSystemAccessAccount); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_GetSystemAccessAccount, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_SetSystemAccessAccount(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx) { struct lsa_SetSystemAccessAccount r; NTSTATUS status; /* In parameters */ if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_SetSystemAccessAccount, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_SETSYSTEMACCESSACCOUNT, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_SetSystemAccessAccount, (ndr_push_flags_fn_t)ndr_push_lsa_SetSystemAccessAccount); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_SetSystemAccessAccount, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_OpenTrustedDomain(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct dom_sid2 *sid, uint32_t access_mask, struct policy_handle *trustdom_handle) { struct lsa_OpenTrustedDomain r; NTSTATUS status; /* In parameters */ r.in.handle = handle; r.in.sid = sid; r.in.access_mask = access_mask; if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_OpenTrustedDomain, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_OPENTRUSTEDDOMAIN, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_OpenTrustedDomain, (ndr_push_flags_fn_t)ndr_push_lsa_OpenTrustedDomain); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_OpenTrustedDomain, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ *trustdom_handle = *r.out.trustdom_handle; /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_QueryTrustedDomainInfo(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *trustdom_handle, enum lsa_TrustDomInfoEnum level, union lsa_TrustedDomainInfo **info) { struct lsa_QueryTrustedDomainInfo r; NTSTATUS status; /* In parameters */ r.in.trustdom_handle = trustdom_handle; r.in.level = level; if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_QueryTrustedDomainInfo, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_QUERYTRUSTEDDOMAININFO, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_QueryTrustedDomainInfo, (ndr_push_flags_fn_t)ndr_push_lsa_QueryTrustedDomainInfo); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_QueryTrustedDomainInfo, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ *info = r.out.info; /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_SetInformationTrustedDomain(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx) { struct lsa_SetInformationTrustedDomain r; NTSTATUS status; /* In parameters */ if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_SetInformationTrustedDomain, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_SETINFORMATIONTRUSTEDDOMAIN, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_SetInformationTrustedDomain, (ndr_push_flags_fn_t)ndr_push_lsa_SetInformationTrustedDomain); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_SetInformationTrustedDomain, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_OpenSecret(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct lsa_String name, uint32_t access_mask, struct policy_handle *sec_handle) { struct lsa_OpenSecret r; NTSTATUS status; /* In parameters */ r.in.handle = handle; r.in.name = name; r.in.access_mask = access_mask; if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_OpenSecret, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_OPENSECRET, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_OpenSecret, (ndr_push_flags_fn_t)ndr_push_lsa_OpenSecret); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_OpenSecret, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ *sec_handle = *r.out.sec_handle; /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_SetSecret(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *sec_handle, struct lsa_DATA_BUF *new_val, struct lsa_DATA_BUF *old_val) { struct lsa_SetSecret r; NTSTATUS status; /* In parameters */ r.in.sec_handle = sec_handle; r.in.new_val = new_val; r.in.old_val = old_val; if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_SetSecret, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_SETSECRET, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_SetSecret, (ndr_push_flags_fn_t)ndr_push_lsa_SetSecret); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_SetSecret, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_QuerySecret(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *sec_handle, struct lsa_DATA_BUF_PTR **new_val, NTTIME **new_mtime, struct lsa_DATA_BUF_PTR **old_val, NTTIME **old_mtime) { struct lsa_QuerySecret r; NTSTATUS status; /* In parameters */ r.in.sec_handle = sec_handle; r.in.new_val = *new_val; r.in.new_mtime = *new_mtime; r.in.old_val = *old_val; r.in.old_mtime = *old_mtime; if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_QuerySecret, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_QUERYSECRET, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_QuerySecret, (ndr_push_flags_fn_t)ndr_push_lsa_QuerySecret); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_QuerySecret, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ *new_val = r.out.new_val; *new_mtime = r.out.new_mtime; *old_val = r.out.old_val; *old_mtime = r.out.old_mtime; /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_LookupPrivValue(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct lsa_String *name, struct lsa_LUID *luid) { struct lsa_LookupPrivValue r; NTSTATUS status; /* In parameters */ r.in.handle = handle; r.in.name = name; if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_LookupPrivValue, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_LOOKUPPRIVVALUE, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_LookupPrivValue, (ndr_push_flags_fn_t)ndr_push_lsa_LookupPrivValue); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_LookupPrivValue, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ *luid = *r.out.luid; /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_LookupPrivName(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct lsa_LUID *luid, struct lsa_StringLarge **name) { struct lsa_LookupPrivName r; NTSTATUS status; /* In parameters */ r.in.handle = handle; r.in.luid = luid; if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_LookupPrivName, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_LOOKUPPRIVNAME, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_LookupPrivName, (ndr_push_flags_fn_t)ndr_push_lsa_LookupPrivName); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_LookupPrivName, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ *name = r.out.name; /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_LookupPrivDisplayName(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct lsa_String *name, struct lsa_StringLarge **disp_name, uint16_t *language_id, uint16_t unknown) { struct lsa_LookupPrivDisplayName r; NTSTATUS status; /* In parameters */ r.in.handle = handle; r.in.name = name; r.in.language_id = language_id; r.in.unknown = unknown; if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_LookupPrivDisplayName, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_LOOKUPPRIVDISPLAYNAME, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_LookupPrivDisplayName, (ndr_push_flags_fn_t)ndr_push_lsa_LookupPrivDisplayName); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_LookupPrivDisplayName, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ *disp_name = r.out.disp_name; *language_id = *r.out.language_id; /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_DeleteObject(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx) { struct lsa_DeleteObject r; NTSTATUS status; /* In parameters */ if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_DeleteObject, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_DELETEOBJECT, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_DeleteObject, (ndr_push_flags_fn_t)ndr_push_lsa_DeleteObject); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_DeleteObject, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_EnumAccountsWithUserRight(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct lsa_String *name, struct lsa_SidArray *sids) { struct lsa_EnumAccountsWithUserRight r; NTSTATUS status; /* In parameters */ r.in.handle = handle; r.in.name = name; if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_EnumAccountsWithUserRight, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_ENUMACCOUNTSWITHUSERRIGHT, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_EnumAccountsWithUserRight, (ndr_push_flags_fn_t)ndr_push_lsa_EnumAccountsWithUserRight); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_EnumAccountsWithUserRight, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ *sids = *r.out.sids; /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_EnumAccountRights(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct dom_sid2 *sid, struct lsa_RightSet *rights) { struct lsa_EnumAccountRights r; NTSTATUS status; /* In parameters */ r.in.handle = handle; r.in.sid = sid; if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_EnumAccountRights, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_ENUMACCOUNTRIGHTS, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_EnumAccountRights, (ndr_push_flags_fn_t)ndr_push_lsa_EnumAccountRights); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_EnumAccountRights, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ *rights = *r.out.rights; /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_AddAccountRights(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct dom_sid2 *sid, struct lsa_RightSet *rights) { struct lsa_AddAccountRights r; NTSTATUS status; /* In parameters */ r.in.handle = handle; r.in.sid = sid; r.in.rights = rights; if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_AddAccountRights, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_ADDACCOUNTRIGHTS, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_AddAccountRights, (ndr_push_flags_fn_t)ndr_push_lsa_AddAccountRights); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_AddAccountRights, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_RemoveAccountRights(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct dom_sid2 *sid, uint32_t unknown, struct lsa_RightSet *rights) { struct lsa_RemoveAccountRights r; NTSTATUS status; /* In parameters */ r.in.handle = handle; r.in.sid = sid; r.in.unknown = unknown; r.in.rights = rights; if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_RemoveAccountRights, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_REMOVEACCOUNTRIGHTS, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_RemoveAccountRights, (ndr_push_flags_fn_t)ndr_push_lsa_RemoveAccountRights); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_RemoveAccountRights, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_QueryTrustedDomainInfoBySid(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct dom_sid2 *dom_sid, enum lsa_TrustDomInfoEnum level, union lsa_TrustedDomainInfo **info) { struct lsa_QueryTrustedDomainInfoBySid r; NTSTATUS status; /* In parameters */ r.in.handle = handle; r.in.dom_sid = dom_sid; r.in.level = level; if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_QueryTrustedDomainInfoBySid, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_QUERYTRUSTEDDOMAININFOBYSID, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_QueryTrustedDomainInfoBySid, (ndr_push_flags_fn_t)ndr_push_lsa_QueryTrustedDomainInfoBySid); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_QueryTrustedDomainInfoBySid, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ *info = r.out.info; /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_SetTrustedDomainInfo(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx) { struct lsa_SetTrustedDomainInfo r; NTSTATUS status; /* In parameters */ if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_SetTrustedDomainInfo, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_SETTRUSTEDDOMAININFO, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_SetTrustedDomainInfo, (ndr_push_flags_fn_t)ndr_push_lsa_SetTrustedDomainInfo); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_SetTrustedDomainInfo, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_DeleteTrustedDomain(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct dom_sid2 *dom_sid) { struct lsa_DeleteTrustedDomain r; NTSTATUS status; /* In parameters */ r.in.handle = handle; r.in.dom_sid = dom_sid; if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_DeleteTrustedDomain, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_DELETETRUSTEDDOMAIN, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_DeleteTrustedDomain, (ndr_push_flags_fn_t)ndr_push_lsa_DeleteTrustedDomain); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_DeleteTrustedDomain, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_StorePrivateData(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx) { struct lsa_StorePrivateData r; NTSTATUS status; /* In parameters */ if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_StorePrivateData, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_STOREPRIVATEDATA, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_StorePrivateData, (ndr_push_flags_fn_t)ndr_push_lsa_StorePrivateData); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_StorePrivateData, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_RetrievePrivateData(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx) { struct lsa_RetrievePrivateData r; NTSTATUS status; /* In parameters */ if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_RetrievePrivateData, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_RETRIEVEPRIVATEDATA, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_RetrievePrivateData, (ndr_push_flags_fn_t)ndr_push_lsa_RetrievePrivateData); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_RetrievePrivateData, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_OpenPolicy2(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, const char *system_name, struct lsa_ObjectAttribute *attr, uint32_t access_mask, struct policy_handle *handle) { struct lsa_OpenPolicy2 r; NTSTATUS status; /* In parameters */ r.in.system_name = system_name; r.in.attr = attr; r.in.access_mask = access_mask; if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_OpenPolicy2, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_OPENPOLICY2, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_OpenPolicy2, (ndr_push_flags_fn_t)ndr_push_lsa_OpenPolicy2); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_OpenPolicy2, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ *handle = *r.out.handle; /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_GetUserName(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, const char *system_name, struct lsa_String **account_name, struct lsa_StringPointer **authority_name) { struct lsa_GetUserName r; NTSTATUS status; /* In parameters */ r.in.system_name = system_name; r.in.account_name = *account_name; r.in.authority_name = *authority_name; if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_GetUserName, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_GETUSERNAME, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_GetUserName, (ndr_push_flags_fn_t)ndr_push_lsa_GetUserName); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_GetUserName, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ *account_name = r.out.account_name; *authority_name = r.out.authority_name; /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_QueryInfoPolicy2(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, uint16_t level, union lsa_PolicyInformation **info) { struct lsa_QueryInfoPolicy2 r; NTSTATUS status; /* In parameters */ r.in.handle = handle; r.in.level = level; if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_QueryInfoPolicy2, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_QUERYINFOPOLICY2, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_QueryInfoPolicy2, (ndr_push_flags_fn_t)ndr_push_lsa_QueryInfoPolicy2); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_QueryInfoPolicy2, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ *info = r.out.info; /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_SetInfoPolicy2(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx) { struct lsa_SetInfoPolicy2 r; NTSTATUS status; /* In parameters */ if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_SetInfoPolicy2, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_SETINFOPOLICY2, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_SetInfoPolicy2, (ndr_push_flags_fn_t)ndr_push_lsa_SetInfoPolicy2); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_SetInfoPolicy2, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_QueryTrustedDomainInfoByName(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct lsa_String trusted_domain, enum lsa_TrustDomInfoEnum level, union lsa_TrustedDomainInfo **info) { struct lsa_QueryTrustedDomainInfoByName r; NTSTATUS status; /* In parameters */ r.in.handle = handle; r.in.trusted_domain = trusted_domain; r.in.level = level; if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_QueryTrustedDomainInfoByName, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_QUERYTRUSTEDDOMAININFOBYNAME, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_QueryTrustedDomainInfoByName, (ndr_push_flags_fn_t)ndr_push_lsa_QueryTrustedDomainInfoByName); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_QueryTrustedDomainInfoByName, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ *info = r.out.info; /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_SetTrustedDomainInfoByName(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct lsa_String trusted_domain, enum lsa_TrustDomInfoEnum level, union lsa_TrustedDomainInfo *info) { struct lsa_SetTrustedDomainInfoByName r; NTSTATUS status; /* In parameters */ r.in.handle = handle; r.in.trusted_domain = trusted_domain; r.in.level = level; r.in.info = info; if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_SetTrustedDomainInfoByName, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_SETTRUSTEDDOMAININFOBYNAME, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_SetTrustedDomainInfoByName, (ndr_push_flags_fn_t)ndr_push_lsa_SetTrustedDomainInfoByName); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_SetTrustedDomainInfoByName, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_EnumTrustedDomainsEx(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, uint32_t *resume_handle, struct lsa_DomainListEx *domains, uint32_t max_size) { struct lsa_EnumTrustedDomainsEx r; NTSTATUS status; /* In parameters */ r.in.handle = handle; r.in.resume_handle = resume_handle; r.in.max_size = max_size; if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_EnumTrustedDomainsEx, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_ENUMTRUSTEDDOMAINSEX, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_EnumTrustedDomainsEx, (ndr_push_flags_fn_t)ndr_push_lsa_EnumTrustedDomainsEx); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_EnumTrustedDomainsEx, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ *resume_handle = *r.out.resume_handle; *domains = *r.out.domains; /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_CreateTrustedDomainEx(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx) { struct lsa_CreateTrustedDomainEx r; NTSTATUS status; /* In parameters */ if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_CreateTrustedDomainEx, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_CREATETRUSTEDDOMAINEX, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_CreateTrustedDomainEx, (ndr_push_flags_fn_t)ndr_push_lsa_CreateTrustedDomainEx); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_CreateTrustedDomainEx, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_CloseTrustedDomainEx(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle) { struct lsa_CloseTrustedDomainEx r; NTSTATUS status; /* In parameters */ r.in.handle = handle; if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_CloseTrustedDomainEx, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_CLOSETRUSTEDDOMAINEX, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_CloseTrustedDomainEx, (ndr_push_flags_fn_t)ndr_push_lsa_CloseTrustedDomainEx); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_CloseTrustedDomainEx, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ *handle = *r.out.handle; /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_QueryDomainInformationPolicy(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, uint16_t level, union lsa_DomainInformationPolicy **info) { struct lsa_QueryDomainInformationPolicy r; NTSTATUS status; /* In parameters */ r.in.handle = handle; r.in.level = level; if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_QueryDomainInformationPolicy, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_QUERYDOMAININFORMATIONPOLICY, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_QueryDomainInformationPolicy, (ndr_push_flags_fn_t)ndr_push_lsa_QueryDomainInformationPolicy); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_QueryDomainInformationPolicy, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ *info = r.out.info; /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_SetDomainInformationPolicy(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, uint16_t level, union lsa_DomainInformationPolicy *info) { struct lsa_SetDomainInformationPolicy r; NTSTATUS status; /* In parameters */ r.in.handle = handle; r.in.level = level; r.in.info = info; if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_SetDomainInformationPolicy, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_SETDOMAININFORMATIONPOLICY, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_SetDomainInformationPolicy, (ndr_push_flags_fn_t)ndr_push_lsa_SetDomainInformationPolicy); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_SetDomainInformationPolicy, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_OpenTrustedDomainByName(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct lsa_String name, uint32_t access_mask, struct policy_handle *trustdom_handle) { struct lsa_OpenTrustedDomainByName r; NTSTATUS status; /* In parameters */ r.in.handle = handle; r.in.name = name; r.in.access_mask = access_mask; if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_OpenTrustedDomainByName, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_OPENTRUSTEDDOMAINBYNAME, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_OpenTrustedDomainByName, (ndr_push_flags_fn_t)ndr_push_lsa_OpenTrustedDomainByName); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_OpenTrustedDomainByName, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ *trustdom_handle = *r.out.trustdom_handle; /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_TestCall(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx) { struct lsa_TestCall r; NTSTATUS status; /* In parameters */ if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_TestCall, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_TESTCALL, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_TestCall, (ndr_push_flags_fn_t)ndr_push_lsa_TestCall); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_TestCall, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_LookupSids2(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, struct lsa_SidArray *sids, struct lsa_RefDomainList **domains, struct lsa_TransNameArray2 *names, uint16_t level, uint32_t *count, uint32_t unknown1, uint32_t unknown2) { struct lsa_LookupSids2 r; NTSTATUS status; /* In parameters */ r.in.handle = handle; r.in.sids = sids; r.in.names = names; r.in.level = level; r.in.count = count; r.in.unknown1 = unknown1; r.in.unknown2 = unknown2; if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_LookupSids2, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_LOOKUPSIDS2, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_LookupSids2, (ndr_push_flags_fn_t)ndr_push_lsa_LookupSids2); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_LookupSids2, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ *domains = r.out.domains; *names = *r.out.names; *count = *r.out.count; /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_LookupNames2(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, uint32_t num_names, struct lsa_String *names, struct lsa_RefDomainList **domains, struct lsa_TransSidArray2 *sids, uint16_t level, uint32_t *count, uint32_t unknown1, uint32_t unknown2) { struct lsa_LookupNames2 r; NTSTATUS status; /* In parameters */ r.in.handle = handle; r.in.num_names = num_names; r.in.names = names; r.in.sids = sids; r.in.level = level; r.in.count = count; r.in.unknown1 = unknown1; r.in.unknown2 = unknown2; if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_LookupNames2, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_LOOKUPNAMES2, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_LookupNames2, (ndr_push_flags_fn_t)ndr_push_lsa_LookupNames2); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_LookupNames2, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ *domains = r.out.domains; *sids = *r.out.sids; *count = *r.out.count; /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_CreateTrustedDomainEx2(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx) { struct lsa_CreateTrustedDomainEx2 r; NTSTATUS status; /* In parameters */ if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_CreateTrustedDomainEx2, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_CREATETRUSTEDDOMAINEX2, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_CreateTrustedDomainEx2, (ndr_push_flags_fn_t)ndr_push_lsa_CreateTrustedDomainEx2); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_CreateTrustedDomainEx2, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_CREDRWRITE(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx) { struct lsa_CREDRWRITE r; NTSTATUS status; /* In parameters */ if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_CREDRWRITE, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_CREDRWRITE, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_CREDRWRITE, (ndr_push_flags_fn_t)ndr_push_lsa_CREDRWRITE); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_CREDRWRITE, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_CREDRREAD(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx) { struct lsa_CREDRREAD r; NTSTATUS status; /* In parameters */ if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_CREDRREAD, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_CREDRREAD, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_CREDRREAD, (ndr_push_flags_fn_t)ndr_push_lsa_CREDRREAD); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_CREDRREAD, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_CREDRENUMERATE(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx) { struct lsa_CREDRENUMERATE r; NTSTATUS status; /* In parameters */ if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_CREDRENUMERATE, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_CREDRENUMERATE, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_CREDRENUMERATE, (ndr_push_flags_fn_t)ndr_push_lsa_CREDRENUMERATE); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_CREDRENUMERATE, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_CREDRWRITEDOMAINCREDENTIALS(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx) { struct lsa_CREDRWRITEDOMAINCREDENTIALS r; NTSTATUS status; /* In parameters */ if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_CREDRWRITEDOMAINCREDENTIALS, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_CREDRWRITEDOMAINCREDENTIALS, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_CREDRWRITEDOMAINCREDENTIALS, (ndr_push_flags_fn_t)ndr_push_lsa_CREDRWRITEDOMAINCREDENTIALS); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_CREDRWRITEDOMAINCREDENTIALS, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_CREDRREADDOMAINCREDENTIALS(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx) { struct lsa_CREDRREADDOMAINCREDENTIALS r; NTSTATUS status; /* In parameters */ if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_CREDRREADDOMAINCREDENTIALS, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_CREDRREADDOMAINCREDENTIALS, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_CREDRREADDOMAINCREDENTIALS, (ndr_push_flags_fn_t)ndr_push_lsa_CREDRREADDOMAINCREDENTIALS); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_CREDRREADDOMAINCREDENTIALS, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_CREDRDELETE(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx) { struct lsa_CREDRDELETE r; NTSTATUS status; /* In parameters */ if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_CREDRDELETE, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_CREDRDELETE, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_CREDRDELETE, (ndr_push_flags_fn_t)ndr_push_lsa_CREDRDELETE); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_CREDRDELETE, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_CREDRGETTARGETINFO(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx) { struct lsa_CREDRGETTARGETINFO r; NTSTATUS status; /* In parameters */ if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_CREDRGETTARGETINFO, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_CREDRGETTARGETINFO, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_CREDRGETTARGETINFO, (ndr_push_flags_fn_t)ndr_push_lsa_CREDRGETTARGETINFO); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_CREDRGETTARGETINFO, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_CREDRPROFILELOADED(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx) { struct lsa_CREDRPROFILELOADED r; NTSTATUS status; /* In parameters */ if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_CREDRPROFILELOADED, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_CREDRPROFILELOADED, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_CREDRPROFILELOADED, (ndr_push_flags_fn_t)ndr_push_lsa_CREDRPROFILELOADED); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_CREDRPROFILELOADED, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_LookupNames3(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct policy_handle *handle, uint32_t num_names, struct lsa_String *names, struct lsa_RefDomainList **domains, struct lsa_TransSidArray3 *sids, uint16_t level, uint32_t *count, uint32_t unknown1, uint32_t unknown2) { struct lsa_LookupNames3 r; NTSTATUS status; /* In parameters */ r.in.handle = handle; r.in.num_names = num_names; r.in.names = names; r.in.sids = sids; r.in.level = level; r.in.count = count; r.in.unknown1 = unknown1; r.in.unknown2 = unknown2; if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_LookupNames3, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_LOOKUPNAMES3, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_LookupNames3, (ndr_push_flags_fn_t)ndr_push_lsa_LookupNames3); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_LookupNames3, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ *domains = r.out.domains; *sids = *r.out.sids; *count = *r.out.count; /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_CREDRGETSESSIONTYPES(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx) { struct lsa_CREDRGETSESSIONTYPES r; NTSTATUS status; /* In parameters */ if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_CREDRGETSESSIONTYPES, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_CREDRGETSESSIONTYPES, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_CREDRGETSESSIONTYPES, (ndr_push_flags_fn_t)ndr_push_lsa_CREDRGETSESSIONTYPES); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_CREDRGETSESSIONTYPES, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_LSARREGISTERAUDITEVENT(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx) { struct lsa_LSARREGISTERAUDITEVENT r; NTSTATUS status; /* In parameters */ if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_LSARREGISTERAUDITEVENT, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_LSARREGISTERAUDITEVENT, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_LSARREGISTERAUDITEVENT, (ndr_push_flags_fn_t)ndr_push_lsa_LSARREGISTERAUDITEVENT); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_LSARREGISTERAUDITEVENT, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_LSARGENAUDITEVENT(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx) { struct lsa_LSARGENAUDITEVENT r; NTSTATUS status; /* In parameters */ if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_LSARGENAUDITEVENT, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_LSARGENAUDITEVENT, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_LSARGENAUDITEVENT, (ndr_push_flags_fn_t)ndr_push_lsa_LSARGENAUDITEVENT); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_LSARGENAUDITEVENT, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_LSARUNREGISTERAUDITEVENT(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx) { struct lsa_LSARUNREGISTERAUDITEVENT r; NTSTATUS status; /* In parameters */ if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_LSARUNREGISTERAUDITEVENT, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_LSARUNREGISTERAUDITEVENT, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_LSARUNREGISTERAUDITEVENT, (ndr_push_flags_fn_t)ndr_push_lsa_LSARUNREGISTERAUDITEVENT); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_LSARUNREGISTERAUDITEVENT, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_LSARQUERYFORESTTRUSTINFORMATION(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx) { struct lsa_LSARQUERYFORESTTRUSTINFORMATION r; NTSTATUS status; /* In parameters */ if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_LSARQUERYFORESTTRUSTINFORMATION, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_LSARQUERYFORESTTRUSTINFORMATION, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_LSARQUERYFORESTTRUSTINFORMATION, (ndr_push_flags_fn_t)ndr_push_lsa_LSARQUERYFORESTTRUSTINFORMATION); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_LSARQUERYFORESTTRUSTINFORMATION, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_LSARSETFORESTTRUSTINFORMATION(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx) { struct lsa_LSARSETFORESTTRUSTINFORMATION r; NTSTATUS status; /* In parameters */ if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_LSARSETFORESTTRUSTINFORMATION, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_LSARSETFORESTTRUSTINFORMATION, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_LSARSETFORESTTRUSTINFORMATION, (ndr_push_flags_fn_t)ndr_push_lsa_LSARSETFORESTTRUSTINFORMATION); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_LSARSETFORESTTRUSTINFORMATION, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_CREDRRENAME(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx) { struct lsa_CREDRRENAME r; NTSTATUS status; /* In parameters */ if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_CREDRRENAME, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_CREDRRENAME, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_CREDRRENAME, (ndr_push_flags_fn_t)ndr_push_lsa_CREDRRENAME); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_CREDRRENAME, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_LookupSids3(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, struct lsa_SidArray *sids, struct lsa_RefDomainList **domains, struct lsa_TransNameArray2 *names, uint16_t level, uint32_t *count, uint32_t unknown1, uint32_t unknown2) { struct lsa_LookupSids3 r; NTSTATUS status; /* In parameters */ r.in.sids = sids; r.in.names = names; r.in.level = level; r.in.count = count; r.in.unknown1 = unknown1; r.in.unknown2 = unknown2; if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_LookupSids3, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_LOOKUPSIDS3, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_LookupSids3, (ndr_push_flags_fn_t)ndr_push_lsa_LookupSids3); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_LookupSids3, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ *domains = r.out.domains; *names = *r.out.names; *count = *r.out.count; /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_LookupNames4(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, uint32_t num_names, struct lsa_String *names, struct lsa_RefDomainList **domains, struct lsa_TransSidArray3 *sids, uint16_t level, uint32_t *count, uint32_t unknown1, uint32_t unknown2) { struct lsa_LookupNames4 r; NTSTATUS status; /* In parameters */ r.in.num_names = num_names; r.in.names = names; r.in.sids = sids; r.in.level = level; r.in.count = count; r.in.unknown1 = unknown1; r.in.unknown2 = unknown2; if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_LookupNames4, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_LOOKUPNAMES4, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_LookupNames4, (ndr_push_flags_fn_t)ndr_push_lsa_LookupNames4); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_LookupNames4, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ *domains = r.out.domains; *sids = *r.out.sids; *count = *r.out.count; /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_LSAROPENPOLICYSCE(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx) { struct lsa_LSAROPENPOLICYSCE r; NTSTATUS status; /* In parameters */ if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_LSAROPENPOLICYSCE, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_LSAROPENPOLICYSCE, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_LSAROPENPOLICYSCE, (ndr_push_flags_fn_t)ndr_push_lsa_LSAROPENPOLICYSCE); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_LSAROPENPOLICYSCE, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_LSARADTREGISTERSECURITYEVENTSOURCE(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx) { struct lsa_LSARADTREGISTERSECURITYEVENTSOURCE r; NTSTATUS status; /* In parameters */ if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_LSARADTREGISTERSECURITYEVENTSOURCE, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_LSARADTREGISTERSECURITYEVENTSOURCE, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_LSARADTREGISTERSECURITYEVENTSOURCE, (ndr_push_flags_fn_t)ndr_push_lsa_LSARADTREGISTERSECURITYEVENTSOURCE); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_LSARADTREGISTERSECURITYEVENTSOURCE, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_LSARADTUNREGISTERSECURITYEVENTSOURCE(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx) { struct lsa_LSARADTUNREGISTERSECURITYEVENTSOURCE r; NTSTATUS status; /* In parameters */ if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_LSARADTUNREGISTERSECURITYEVENTSOURCE, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_LSARADTUNREGISTERSECURITYEVENTSOURCE, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_LSARADTUNREGISTERSECURITYEVENTSOURCE, (ndr_push_flags_fn_t)ndr_push_lsa_LSARADTUNREGISTERSECURITYEVENTSOURCE); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_LSARADTUNREGISTERSECURITYEVENTSOURCE, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ /* Return result */ return r.out.result; } NTSTATUS rpccli_lsa_LSARADTREPORTSECURITYEVENT(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx) { struct lsa_LSARADTREPORTSECURITYEVENT r; NTSTATUS status; /* In parameters */ if (DEBUGLEVEL >= 10) NDR_PRINT_IN_DEBUG(lsa_LSARADTREPORTSECURITYEVENT, &r); status = cli_do_rpc_ndr(cli, mem_ctx, PI_LSARPC, DCERPC_LSA_LSARADTREPORTSECURITYEVENT, &r, (ndr_pull_flags_fn_t)ndr_pull_lsa_LSARADTREPORTSECURITYEVENT, (ndr_push_flags_fn_t)ndr_push_lsa_LSARADTREPORTSECURITYEVENT); if ( !NT_STATUS_IS_OK(status) ) { return status; } if (DEBUGLEVEL >= 10) NDR_PRINT_OUT_DEBUG(lsa_LSARADTREPORTSECURITYEVENT, &r); if (NT_STATUS_IS_ERR(status)) { return status; } /* Return variables */ /* Return result */ return r.out.result; }