49 TRACE(
"PLSAPR_SERVER_NAME_bind() called\n");
59 TRACE(
"RpcStringBindingCompose returned 0x%x\n",
status);
68 TRACE(
"RpcBindingFromStringBinding returned 0x%x\n",
status);
88 TRACE(
"PLSAPR_SERVER_NAME_unbind() called\n");
111 TRACE(
"LsaAddAccountRights(%p %p %p 0x%08x)\n",
112 PolicyHandle, AccountSid, UserRights, CountOfRights);
114 UserRightSet.
Entries = CountOfRights;
144 TRACE(
"LsaAddPrivilegesToAccount(%p %p)\n",
145 AccountHandle, PrivilegeSet);
171 TRACE(
"LsaClearAuditLog(%p)\n", PolicyHandle);
196 TRACE(
"LsaClose(%p) called\n", ObjectHandle);
224 TRACE(
"LsaCreateAccount(%p %p 0x%08lx %p)\n",
256 TRACE(
"LsaCreateSecret(%p %p 0x%08lx %p)\n",
288 TRACE(
"LsaCreateTrustedDomain(%p %p 0x%08lx %p)\n",
289 PolicyHandle, TrustedDomainInformation,
DesiredAccess, TrustedDomainHandle);
322 TRACE(
"LsaCreateTrustedDomainEx(%p %p %p 0x%08lx %p) stub\n",
323 PolicyHandle, TrustedDomainInformation, AuthenticationInformation,
355 TRACE(
"LsaDelete(%p)\n", ObjectHandle);
381 TRACE(
"LsaDeleteTrustedDomain(%p %p)\n",
382 PolicyHandle, TrustedDomainSid);
412 TRACE(
"LsaEnumerateAccountRights(%p %p %p %p)\n",
413 PolicyHandle, AccountSid, UserRights, CountOfRights);
425 *CountOfRights = UserRightsSet.
Entries;
448 IN ULONG PreferedMaximumLength,
454 TRACE(
"LsaEnumerateAccounts(%p %p %p %lu %p)\n",
455 PolicyHandle, EnumerationContext,
Buffer,
456 PreferedMaximumLength, CountReturned);
466 PreferedMaximumLength);
497 TRACE(
"LsaEnumerateAccountsWithUserRight(%p %p %p %p) stub\n",
498 PolicyHandle, UserRight,
Buffer, CountReturned);
533 IN ULONG PreferedMaximumLength,
539 TRACE(
"LsaEnumeratePrivileges(%p %p %p %lu %p)\n",
540 PolicyHandle, EnumerationContext,
Buffer,
541 PreferedMaximumLength, CountReturned);
543 PrivilegeEnumBuffer.
Entries = 0;
550 &PrivilegeEnumBuffer,
551 PreferedMaximumLength);
554 *CountReturned = PrivilegeEnumBuffer.
Entries;
580 TRACE(
"LsaEnumeratePrivilegesOfAccount(%p %p)\n",
606 IN ULONG PreferedMaximumLength,
612 TRACE(
"LsaEnumerateTrustedDomains(%p %p %p %lu %p)\n",
613 PolicyHandle, EnumerationContext,
Buffer,
614 PreferedMaximumLength, CountReturned);
627 PreferedMaximumLength);
654 IN ULONG PreferedMaximumLength,
660 TRACE(
"LsaEnumerateTrustedDomainsEx(%p %p %p %lu %p)\n",
661 PolicyHandle, EnumerationContext,
Buffer,
662 PreferedMaximumLength, CountReturned);
675 PreferedMaximumLength);
716 TRACE(
"LsaGetQuotasForAccount(%p %p)\n",
717 AccountHandle, QuotaLimits);
747 TRACE(
"LsaGetRemoteUserName(%s %p %p)\n",
748 SystemName ?
debugstr_w(SystemName->Buffer) :
"(null)",
749 UserName, DomainName);
755 (DomainName !=
NULL) ? &DomainNameString :
NULL);
759 if (DomainName !=
NULL)
764 if (UserNameString !=
NULL)
767 if (DomainNameString !=
NULL)
788 TRACE(
"LsaGetSystemAccessAccount(%p %p)\n",
789 AccountHandle, SystemAccess);
818 TRACE(
"LsaGetUserName(%p %p)\n",
819 UserName, DomainName);
825 (DomainName !=
NULL) ? &DomainNameString :
NULL);
829 if (DomainName !=
NULL)
834 if (UserNameString !=
NULL)
837 if (DomainNameString !=
NULL)
860 ULONG MappedCount = 0;
863 TRACE(
"LsaLookupNames(%p %lu %p %p %p)\n",
864 PolicyHandle,
Count,
Names, ReferencedDomains, Sids);
866 if (ReferencedDomains ==
NULL || Sids ==
NULL)
871 *ReferencedDomains =
NULL;
912 ULONG MappedCount = 0;
915 TRACE(
"LsaLookupNames2(%p 0x%08x %lu %p %p %p)\n",
918 if (ReferencedDomains ==
NULL || Sids ==
NULL)
923 *ReferencedDomains =
NULL;
966 TRACE(
"LsaLookupPrivilegeDisplayName(%p %p %p %p)\n",
967 PolicyHandle,
Name, DisplayName, LanguageReturned);
982 if (DisplayNameBuffer !=
NULL)
1005 TRACE(
"LsaLookupPrivilegeName(%p %p %p)\n",
1018 if (NameBuffer !=
NULL)
1041 TRACE(
"LsaLookupPrivilegeValue(%p %p %p)\n",
1075 ULONG MappedCount = 0;
1078 TRACE(
"LsaLookupSids(%p %lu %p %p %p)\n",
1079 PolicyHandle,
Count, Sids, ReferencedDomains,
Names);
1089 *ReferencedDomains =
NULL;
1148 TRACE(
"LsaOpenAccount(%p %p 0x%08lx %p)\n",
1188 TRACE(
"LsaOpenPolicy(%s %p 0x%08lx %p)\n",
1189 SystemName ?
debugstr_w(SystemName->Buffer) :
"(null)",
1198 *PolicyHandle =
NULL;
1211 TRACE(
"LsaOpenPolicy() done (Status: 0x%08lx)\n",
Status);
1229 TRACE(
"LsaOpenPolicySce(%s %p 0x%08lx %p)\n",
1230 SystemName ?
debugstr_w(SystemName->Buffer) :
"(null)",
1239 *PolicyHandle =
NULL;
1252 TRACE(
"LsaOpenPolicySce() done (Status: 0x%08lx)\n",
Status);
1270 TRACE(
"LsaOpenSecret(%p %p 0x%08lx %p)\n",
1275 *SecretHandle =
NULL;
1288 TRACE(
"LsaOpenSecret() done (Status: 0x%08lx)\n",
Status);
1300 IN PSID TrustedDomainSid,
1306 TRACE(
"LsaOpenTrustedDomain(%p %p 0x%08lx %p)\n",
1307 PolicyHandle, TrustedDomainSid,
DesiredAccess, TrustedDomainHandle);
1338 TRACE(
"LsaOpenTrustedDomainByName(%p %p 0x%08lx %p)\n",
1339 PolicyHandle, TrustedDomainName,
DesiredAccess, TrustedDomainHandle);
1346 TrustedDomainHandle);
1370 TRACE(
"LsaQueryDomainInformationPolicy(%p %lu %p)\n",
1377 &PolicyInformation);
1379 *
Buffer = PolicyInformation;
1383 if (PolicyInformation !=
NULL)
1405 TRACE(
"LsaQueryForestTrustInformation(%p %p %p)\n",
1406 PolicyHandle, TrustedDomainName, ForestTrustInfo);
1437 TRACE(
"LsaQueryInfoTrustedDomain(%p %d %p) stub\n",
1448 &TrustedDomainInformation);
1449 *
Buffer = TrustedDomainInformation;
1453 if (TrustedDomainInformation !=
NULL)
1478 TRACE(
"LsaQueryInformationPolicy(%p %d %p)\n",
1485 &PolicyInformation);
1486 *
Buffer = PolicyInformation;
1490 if (PolicyInformation !=
NULL)
1521 TRACE(
"LsaQuerySecret(%p %p %p %p %p)\n",
1522 SecretHandle, CurrentValue, CurrentValueSetTime,
1523 OldValue, OldValueSetTime);
1528 &EncryptedCurrentValue,
1529 CurrentValueSetTime,
1543 if (CurrentValue !=
NULL)
1545 if (EncryptedCurrentValue ==
NULL)
1547 *CurrentValue =
NULL;
1554 if (DecryptedCurrentValue ==
NULL)
1562 DecryptedCurrentValue->
Buffer = (
PWSTR)(DecryptedCurrentValue + 1);
1564 EncryptedCurrentValue->
Buffer,
1565 EncryptedCurrentValue->
Length);
1567 *CurrentValue = DecryptedCurrentValue;
1572 if (OldValue !=
NULL)
1574 if (EncryptedOldValue ==
NULL)
1583 if (DecryptedOldValue ==
NULL)
1591 DecryptedOldValue->
Buffer = (
PWSTR)(DecryptedOldValue + 1);
1593 EncryptedOldValue->
Buffer,
1594 EncryptedOldValue->
Length);
1596 *OldValue = DecryptedOldValue;
1603 if (DecryptedCurrentValue !=
NULL)
1606 if (DecryptedOldValue !=
NULL)
1609 if (CurrentValue !=
NULL)
1610 *CurrentValue =
NULL;
1612 if (OldValue !=
NULL)
1616 if (EncryptedCurrentValue !=
NULL)
1619 if (EncryptedOldValue !=
NULL)
1639 TRACE(
"LsaQuerySecurityObject(%p %lx %p)\n",
1645 SdPointer = &SdBuffer;
1677 IN PSID TrustedDomainSid,
1683 TRACE(
"LsaQueryTrustedDomainInfo(%p %p %d %p) stub\n",
1719 TRACE(
"LsaQueryTrustedDomainInfoByName(%p %p %d %p)\n",
1757 TRACE(
"LsaRemoveAccountRights(%p %p %d %p %lu)\n",
1758 PolicyHandle, AccountSid, AllRights, UserRights, CountOfRights);
1760 UserRightSet.
Entries = CountOfRights;
1821 TRACE(
"LsaRetrievePrivateData(%p %p %p)\n",
1822 PolicyHandle,
KeyName, PrivateData);
1836 if (EncryptedData ==
NULL)
1838 *PrivateData =
NULL;
1844 if (DecryptedData ==
NULL)
1852 DecryptedData->
Buffer = (
PWSTR)(DecryptedData + 1);
1857 *PrivateData = DecryptedData;
1863 if (DecryptedData !=
NULL)
1866 *PrivateData =
NULL;
1869 if (EncryptedData !=
NULL)
1887 TRACE(
"LsaSetDomainInformationPolicy(%p %d %p)\n",
1919 TRACE(
"LsaSetForestTrustInformation(%p %p %p %d %p)\n",
1920 PolicyHandle, TrustedDomainName, ForestTrustInfo, CheckOnly, CollisionInfo);
1952 TRACE(
"LsaSetInformationPolicy(%p %d %p)\n",
1980 FIXME(
"LsaSetInformationTrustedDomain(%p %d %p)\n",
1996 TRACE(
"LsaSetQuotasForAccount(%p %p)\n",
1997 AccountHandle, QuotaLimits);
2028 TRACE(
"LsaSetSecret(%p %p %p)\n",
2029 SecretHandle, EncryptedCurrentValue, EncryptedOldValue);
2031 if (CurrentValue !=
NULL)
2035 if (EncryptedCurrentValue ==
NULL)
2041 EncryptedCurrentValue->
Length = CurrentValue->Length;
2042 EncryptedCurrentValue->
MaximumLength = CurrentValue->MaximumLength;
2043 EncryptedCurrentValue->
Buffer = (
BYTE *)(EncryptedCurrentValue + 1);
2045 memcpy(EncryptedCurrentValue->
Buffer, CurrentValue->Buffer, CurrentValue->Length);
2048 if (OldValue !=
NULL)
2052 if (EncryptedOldValue ==
NULL)
2058 EncryptedOldValue->
Length = OldValue->Length;
2060 EncryptedOldValue->
Buffer = (
BYTE*)(EncryptedOldValue + 1);
2062 memcpy(EncryptedOldValue->
Buffer, OldValue->Buffer, OldValue->Length);
2068 EncryptedCurrentValue,
2078 if (EncryptedCurrentValue !=
NULL)
2081 if (EncryptedOldValue !=
NULL)
2101 TRACE(
"LsaSetSecurityObject(%p %lx %p)\n",
2120 SdBuffer.
Length = SdLength;
2152 TRACE(
"LsaSetSystemAccessAccount(%p 0x%lx)\n",
2153 AccountHandle, SystemAccess);
2180 FIXME(
"LsaSetTrustedDomainInfoByName(%p %p %d %p) stub\n",
2192 IN PSID TrustedDomainSid,
2196 FIXME(
"LsaSetTrustedDomainInformation(%p %p %d %p) stub\n",
2215 TRACE(
"LsaStorePrivateData(%p %p %p)\n",
2216 PolicyHandle,
KeyName, PrivateData);
2218 if (PrivateData !=
NULL)
2222 if (EncryptedData ==
NULL)
2228 EncryptedData->
Length = PrivateData->Length;
2230 EncryptedData->
Buffer = (
BYTE *)(EncryptedData + 1);
2233 PrivateData->Buffer,
2234 PrivateData->Length);
2250 if (EncryptedData !=
NULL)
#define WINE_DEFAULT_DEBUG_CHANNEL(t)
BOOLEAN NTAPI RtlFreeHeap(IN PVOID HeapHandle, IN ULONG Flags, IN PVOID HeapBase)
BOOL WINAPI GetComputerNameW(LPWSTR lpBuffer, LPDWORD lpnSize)
IN PUNICODE_STRING IN POBJECT_ATTRIBUTES ObjectAttributes
#define NT_SUCCESS(StatCode)
NTSTATUS WINAPI LsaAddPrivilegesToAccount(IN LSA_HANDLE AccountHandle, IN PPRIVILEGE_SET PrivilegeSet)
NTSTATUS WINAPI LsaSetInformationPolicy(IN LSA_HANDLE PolicyHandle, IN POLICY_INFORMATION_CLASS InformationClass, IN PVOID Buffer)
NTSTATUS WINAPI LsaSetTrustedDomainInfoByName(IN LSA_HANDLE PolicyHandle, IN PLSA_UNICODE_STRING TrustedDomainName, IN TRUSTED_INFORMATION_CLASS InformationClass, IN PVOID Buffer)
NTSTATUS WINAPI LsaSetSecurityObject(IN LSA_HANDLE ObjectHandle, IN SECURITY_INFORMATION SecurityInformation, IN PSECURITY_DESCRIPTOR SecurityDescriptor)
NTSTATUS WINAPI LsaCreateSecret(IN LSA_HANDLE PolicyHandle, IN PLSA_UNICODE_STRING SecretName, IN ACCESS_MASK DesiredAccess, OUT PLSA_HANDLE SecretHandle)
NTSTATUS WINAPI LsaEnumerateTrustedDomains(IN LSA_HANDLE PolicyHandle, IN OUT PLSA_ENUMERATION_HANDLE EnumerationContext, OUT PVOID *Buffer, IN ULONG PreferedMaximumLength, OUT PULONG CountReturned)
NTSTATUS WINAPI LsaQuerySecurityObject(IN LSA_HANDLE ObjectHandle, IN SECURITY_INFORMATION SecurityInformation, OUT PSECURITY_DESCRIPTOR *SecurityDescriptor)
NTSTATUS WINAPI LsaCreateTrustedDomain(IN LSA_HANDLE PolicyHandle, IN PLSA_TRUST_INFORMATION TrustedDomainInformation, IN ACCESS_MASK DesiredAccess, OUT PLSA_HANDLE TrustedDomainHandle)
NTSTATUS WINAPI LsaEnumerateAccounts(IN LSA_HANDLE PolicyHandle, IN OUT PLSA_ENUMERATION_HANDLE EnumerationContext, OUT PVOID *Buffer, IN ULONG PreferedMaximumLength, OUT PULONG CountReturned)
NTSTATUS WINAPI LsaQueryDomainInformationPolicy(IN LSA_HANDLE PolicyHandle, IN POLICY_DOMAIN_INFORMATION_CLASS InformationClass, OUT PVOID *Buffer)
NTSTATUS WINAPI LsaQueryForestTrustInformation(IN LSA_HANDLE PolicyHandle, IN PLSA_UNICODE_STRING TrustedDomainName, OUT PLSA_FOREST_TRUST_INFORMATION *ForestTrustInfo)
NTSTATUS WINAPI LsaLookupPrivilegeDisplayName(IN LSA_HANDLE PolicyHandle, IN PLSA_UNICODE_STRING Name, OUT PLSA_UNICODE_STRING *DisplayName, OUT PUSHORT LanguageReturned)
NTSTATUS WINAPI LsaEnumeratePrivileges(IN LSA_HANDLE PolicyHandle, IN OUT PLSA_ENUMERATION_HANDLE EnumerationContext, OUT PVOID *Buffer, IN ULONG PreferedMaximumLength, OUT PULONG CountReturned)
NTSTATUS WINAPI LsaOpenPolicy(IN PLSA_UNICODE_STRING SystemName OPTIONAL, IN PLSA_OBJECT_ATTRIBUTES ObjectAttributes, IN ACCESS_MASK DesiredAccess, OUT PLSA_HANDLE PolicyHandle)
NTSTATUS WINAPI LsaClearAuditLog(IN LSA_HANDLE PolicyHandle)
NTSTATUS WINAPI LsaLookupPrivilegeName(IN LSA_HANDLE PolicyHandle, IN PLUID Value, OUT PUNICODE_STRING *Name)
NTSTATUS WINAPI LsaLookupSids(IN LSA_HANDLE PolicyHandle, IN ULONG Count, IN PSID *Sids, OUT PLSA_REFERENCED_DOMAIN_LIST *ReferencedDomains, OUT PLSA_TRANSLATED_NAME *Names)
handle_t __RPC_USER PLSAPR_SERVER_NAME_bind(PLSAPR_SERVER_NAME pszSystemName)
NTSTATUS WINAPI LsaEnumerateAccountsWithUserRight(IN LSA_HANDLE PolicyHandle, IN PLSA_UNICODE_STRING UserRight OPTIONAL, OUT PVOID *Buffer, OUT PULONG CountReturned)
ULONG WINAPI LsaNtStatusToWinError(IN NTSTATUS Status)
NTSTATUS WINAPI LsaSetSystemAccessAccount(IN LSA_HANDLE AccountHandle, IN ULONG SystemAccess)
NTSTATUS WINAPI LsaLookupPrivilegeValue(IN LSA_HANDLE PolicyHandle, IN PLSA_UNICODE_STRING Name, OUT PLUID Value)
NTSTATUS WINAPI LsaCreateAccount(IN LSA_HANDLE PolicyHandle, IN PSID AccountSid, IN ACCESS_MASK DesiredAccess, OUT PLSA_HANDLE AccountHandle)
NTSTATUS WINAPI LsaQueryInformationPolicy(IN LSA_HANDLE PolicyHandle, IN POLICY_INFORMATION_CLASS InformationClass, OUT PVOID *Buffer)
NTSTATUS WINAPI LsaDelete(IN LSA_HANDLE ObjectHandle)
NTSTATUS WINAPI LsaEnumeratePrivilegesOfAccount(IN LSA_HANDLE AccountHandle, OUT PPRIVILEGE_SET *Privileges)
NTSTATUS WINAPI LsaLookupNames2(IN LSA_HANDLE PolicyHandle, IN ULONG Flags, IN ULONG Count, IN PLSA_UNICODE_STRING Names, OUT PLSA_REFERENCED_DOMAIN_LIST *ReferencedDomains, OUT PLSA_TRANSLATED_SID2 *Sids)
void __RPC_USER PLSAPR_SERVER_NAME_unbind(PLSAPR_SERVER_NAME pszSystemName, handle_t hBinding)
NTSTATUS WINAPI LsaQuerySecret(IN LSA_HANDLE SecretHandle, OUT PLSA_UNICODE_STRING *CurrentValue OPTIONAL, OUT PLARGE_INTEGER CurrentValueSetTime OPTIONAL, OUT PLSA_UNICODE_STRING *OldValue OPTIONAL, OUT PLARGE_INTEGER OldValueSetTime OPTIONAL)
NTSTATUS WINAPI LsaQueryTrustedDomainInfoByName(IN LSA_HANDLE PolicyHandle, IN PLSA_UNICODE_STRING TrustedDomainName, IN TRUSTED_INFORMATION_CLASS InformationClass, OUT PVOID *Buffer)
NTSTATUS WINAPI LsaDeleteTrustedDomain(IN LSA_HANDLE PolicyHandle, IN PSID TrustedDomainSid)
NTSTATUS WINAPI LsaGetSystemAccessAccount(IN LSA_HANDLE AccountHandle, OUT PULONG SystemAccess)
NTSTATUS WINAPI LsaOpenAccount(IN LSA_HANDLE PolicyHandle, IN PSID AccountSid, IN ACCESS_MASK DesiredAccess, OUT PLSA_HANDLE AccountHandle)
NTSTATUS WINAPI LsaOpenSecret(IN LSA_HANDLE PolicyHandle, IN PLSA_UNICODE_STRING SecretName, IN ACCESS_MASK DesiredAccess, OUT PLSA_HANDLE SecretHandle)
NTSTATUS WINAPI LsaGetUserName(OUT PUNICODE_STRING *UserName, OUT PUNICODE_STRING *DomainName OPTIONAL)
NTSTATUS WINAPI LsaStorePrivateData(IN LSA_HANDLE PolicyHandle, IN PLSA_UNICODE_STRING KeyName, IN PLSA_UNICODE_STRING PrivateData OPTIONAL)
NTSTATUS WINAPI LsaRemovePrivilegesFromAccount(IN LSA_HANDLE AccountHandle, IN BOOLEAN AllPrivileges, IN PPRIVILEGE_SET Privileges OPTIONAL)
NTSTATUS WINAPI LsaCreateTrustedDomainEx(IN LSA_HANDLE PolicyHandle, IN PTRUSTED_DOMAIN_INFORMATION_EX TrustedDomainInformation, IN PTRUSTED_DOMAIN_AUTH_INFORMATION AuthenticationInformation, IN ACCESS_MASK DesiredAccess, OUT PLSA_HANDLE TrustedDomainHandle)
NTSTATUS WINAPI LsaOpenPolicySce(IN PLSA_UNICODE_STRING SystemName OPTIONAL, IN PLSA_OBJECT_ATTRIBUTES ObjectAttributes, IN ACCESS_MASK DesiredAccess, OUT PLSA_HANDLE PolicyHandle)
NTSTATUS WINAPI LsaQueryTrustedDomainInfo(IN LSA_HANDLE PolicyHandle, IN PSID TrustedDomainSid, IN TRUSTED_INFORMATION_CLASS InformationClass, OUT PVOID *Buffer)
NTSTATUS WINAPI LsaSetDomainInformationPolicy(IN LSA_HANDLE PolicyHandle, IN POLICY_DOMAIN_INFORMATION_CLASS InformationClass, IN PVOID Buffer OPTIONAL)
NTSTATUS WINAPI LsaSetInformationTrustedDomain(IN LSA_HANDLE TrustedDomainHandle, IN TRUSTED_INFORMATION_CLASS InformationClass, IN PVOID Buffer)
NTSTATUS WINAPI LsaSetSecret(IN LSA_HANDLE SecretHandle, IN PLSA_UNICODE_STRING CurrentValue OPTIONAL, IN PLSA_UNICODE_STRING OldValue OPTIONAL)
NTSTATUS WINAPI LsaAddAccountRights(IN LSA_HANDLE PolicyHandle, IN PSID AccountSid, IN PLSA_UNICODE_STRING UserRights, IN ULONG CountOfRights)
static BOOL LsapIsLocalComputer(PLSA_UNICODE_STRING ServerName)
NTSTATUS WINAPI LsaSetQuotasForAccount(IN LSA_HANDLE AccountHandle, IN PQUOTA_LIMITS QuotaLimits)
NTSTATUS WINAPI LsaQueryInfoTrustedDomain(IN LSA_HANDLE TrustedDomainHandle, IN TRUSTED_INFORMATION_CLASS InformationClass, OUT PVOID *Buffer)
NTSTATUS WINAPI LsaSetForestTrustInformation(IN LSA_HANDLE PolicyHandle, IN PLSA_UNICODE_STRING TrustedDomainName, IN PLSA_FOREST_TRUST_INFORMATION ForestTrustInfo, IN BOOLEAN CheckOnly, OUT PLSA_FOREST_TRUST_COLLISION_INFORMATION *CollisionInfo)
NTSTATUS WINAPI LsaGetQuotasForAccount(IN LSA_HANDLE AccountHandle, OUT PQUOTA_LIMITS QuotaLimits)
NTSTATUS WINAPI LsaFreeMemory(IN PVOID Buffer)
NTSTATUS WINAPI LsaEnumerateAccountRights(IN LSA_HANDLE PolicyHandle, IN PSID AccountSid, OUT PLSA_UNICODE_STRING *UserRights, OUT PULONG CountOfRights)
NTSTATUS WINAPI LsaSetTrustedDomainInformation(IN LSA_HANDLE PolicyHandle, IN PSID TrustedDomainSid, IN TRUSTED_INFORMATION_CLASS InformationClass, IN PVOID Buffer)
NTSTATUS WINAPI LsaEnumerateTrustedDomainsEx(IN LSA_HANDLE PolicyHandle, IN OUT PLSA_ENUMERATION_HANDLE EnumerationContext, OUT PVOID *Buffer, IN ULONG PreferedMaximumLength, OUT PULONG CountReturned)
NTSTATUS WINAPI LsaRemoveAccountRights(IN LSA_HANDLE PolicyHandle, IN PSID AccountSid, IN BOOLEAN AllRights, IN PLSA_UNICODE_STRING UserRights, IN ULONG CountOfRights)
NTSTATUS WINAPI LsaGetRemoteUserName(IN PLSA_UNICODE_STRING SystemName OPTIONAL, OUT PLSA_UNICODE_STRING *UserName, OUT PLSA_UNICODE_STRING *DomainName OPTIONAL)
NTSTATUS WINAPI LsaLookupNames(IN LSA_HANDLE PolicyHandle, IN ULONG Count, IN PLSA_UNICODE_STRING Names, OUT PLSA_REFERENCED_DOMAIN_LIST *ReferencedDomains, OUT PLSA_TRANSLATED_SID *Sids)
NTSTATUS WINAPI LsaRetrievePrivateData(IN LSA_HANDLE PolicyHandle, IN PLSA_UNICODE_STRING KeyName, OUT PLSA_UNICODE_STRING *PrivateData)
NTSTATUS WINAPI LsaClose(IN LSA_HANDLE ObjectHandle)
NTSTATUS WINAPI LsaOpenTrustedDomain(IN LSA_HANDLE PolicyHandle, IN PSID TrustedDomainSid, IN ACCESS_MASK DesiredAccess, OUT PLSA_HANDLE TrustedDomainHandle)
NTSTATUS WINAPI LsaOpenTrustedDomainByName(IN LSA_HANDLE PolicyHandle, IN PLSA_UNICODE_STRING TrustedDomainName, IN ACCESS_MASK DesiredAccess, OUT PLSA_HANDLE TrustedDomainHandle)
#define HeapFree(x, y, z)
UNICODE_STRING * PUNICODE_STRING
_Must_inspect_result_ _In_ PFILE_OBJECT _In_ SECURITY_INFORMATION SecurityInformation
_In_ FILTER_INFORMATION_CLASS InformationClass
GLenum GLuint GLenum GLsizei const GLchar * buf
#define EXCEPTION_EXECUTE_HANDLER
NTSYSAPI ULONG WINAPI RtlNtStatusToDosError(NTSTATUS)
void *__RPC_USER MIDL_user_allocate(SIZE_T size)
void __RPC_USER MIDL_user_free(void *p)
LANGID WINAPI GetUserDefaultUILanguage(void)
LANGID WINAPI GetSystemDefaultUILanguage(void)
struct _LSAPR_CR_CIPHER_VALUE LSAPR_CR_CIPHER_VALUE
LPWSTR PLSAPR_SERVER_NAME
struct _LSAPR_SID_INFORMATION * PLSAPR_SID_INFORMATION
NTSTATUS WINAPI LsarSetSystemAccessAccount(LSAPR_HANDLE AccountHandle, ACCESS_MASK SystemAccess)
NTSTATUS WINAPI LsarEnumerateAccountsWithUserRight(LSAPR_HANDLE PolicyHandle, PRPC_UNICODE_STRING UserRight, PLSAPR_ACCOUNT_ENUM_BUFFER EnumerationBuffer)
NTSTATUS WINAPI LsarEnumerateTrustedDomains(LSAPR_HANDLE PolicyHandle, DWORD *EnumerationContext, PLSAPR_TRUSTED_ENUM_BUFFER EnumerationBuffer, DWORD PreferedMaximumLength)
NTSTATUS WINAPI LsarQueryDomainInformationPolicy(LSAPR_HANDLE PolicyHandle, POLICY_INFORMATION_CLASS InformationClass, PLSAPR_POLICY_DOMAIN_INFORMATION *PolicyInformation)
NTSTATUS WINAPI LsarCreateTrustedDomainEx2(LSAPR_HANDLE PolicyHandle, PLSAPR_TRUSTED_DOMAIN_INFORMATION_EX TrustedDomainInformation, PLSAPR_TRUSTED_DOMAIN_AUTH_INFORMATION_INTERNAL AuthentificationInformation, ACCESS_MASK DesiredAccess, LSAPR_HANDLE *TrustedDomainHandle)
NTSTATUS WINAPI LsarQuerySecret(LSAPR_HANDLE SecretHandle, PLSAPR_CR_CIPHER_VALUE *EncryptedCurrentValue, PLARGE_INTEGER CurrentValueSetTime, PLSAPR_CR_CIPHER_VALUE *EncryptedOldValue, PLARGE_INTEGER OldValueSetTime)
NTSTATUS WINAPI LsarOpenAccount(LSAPR_HANDLE PolicyHandle, PRPC_SID AccountSid, ACCESS_MASK DesiredAccess, LSAPR_HANDLE *AccountHandle)
NTSTATUS WINAPI LsarSetInformationPolicy(LSAPR_HANDLE PolicyHandle, POLICY_INFORMATION_CLASS InformationClass, PLSAPR_POLICY_INFORMATION PolicyInformation)
NTSTATUS WINAPI LsarEnumeratePrivileges(LSAPR_HANDLE PolicyHandle, DWORD *EnumerationContext, PLSAPR_PRIVILEGE_ENUM_BUFFER EnumerationBuffer, DWORD PreferedMaximumLength)
NTSTATUS WINAPI LsarGetQuotasForAccount(LSAPR_HANDLE AccountHandle, PQUOTA_LIMITS QuotaLimits)
NTSTATUS WINAPI LsarOpenTrustedDomain(LSAPR_HANDLE PolicyHandle, PRPC_SID TrustedDomainSid, ACCESS_MASK DesiredAccess, LSAPR_HANDLE *TrustedDomainHandle)
NTSTATUS WINAPI LsarRemovePrivilegesFromAccount(LSAPR_HANDLE AccountHandle, BOOLEAN AllPrivileges, PLSAPR_PRIVILEGE_SET Privileges)
NTSTATUS WINAPI LsarRetrievePrivateData(LSAPR_HANDLE PolicyHandle, PRPC_UNICODE_STRING KeyName, PLSAPR_CR_CIPHER_VALUE *EncryptedData)
NTSTATUS WINAPI LsarEnumerateAccounts(LSAPR_HANDLE PolicyHandle, DWORD *EnumerationContext, PLSAPR_ACCOUNT_ENUM_BUFFER EnumerationBuffer, DWORD PreferedMaximumLength)
NTSTATUS WINAPI LsarDeleteTrustedDomain(LSAPR_HANDLE PolicyHandle, PRPC_SID TrustedDomainSid)
NTSTATUS WINAPI LsarLookupPrivilegeName(LSAPR_HANDLE PolicyHandle, PLUID Value, PRPC_UNICODE_STRING *Name)
NTSTATUS WINAPI LsarLookupNames(LSAPR_HANDLE PolicyHandle, DWORD Count, PRPC_UNICODE_STRING Names, PLSAPR_REFERENCED_DOMAIN_LIST *ReferencedDomains, PLSAPR_TRANSLATED_SIDS TranslatedSids, LSAP_LOOKUP_LEVEL LookupLevel, DWORD *MappedCount)
NTSTATUS WINAPI LsarQueryTrustedDomainInfo(LSAPR_HANDLE PolicyHandle, PRPC_SID TrustedDomainSid, TRUSTED_INFORMATION_CLASS InformationClass, PLSAPR_TRUSTED_DOMAIN_INFO *TrustedDomainInformation)
NTSTATUS WINAPI LsarLookupPrivilegeValue(LSAPR_HANDLE PolicyHandle, PRPC_UNICODE_STRING Name, PLUID Value)
NTSTATUS WINAPI LsarGetUserName(LPWSTR SystemName, PRPC_UNICODE_STRING *UserName, PRPC_UNICODE_STRING *DomainName)
NTSTATUS WINAPI LsarSetSecret(LSAPR_HANDLE SecretHandle, PLSAPR_CR_CIPHER_VALUE EncryptedCurrentValue, PLSAPR_CR_CIPHER_VALUE EncryptedOldValue)
NTSTATUS WINAPI LsarOpenPolicy(LPWSTR SystemName, PLSAPR_OBJECT_ATTRIBUTES ObjectAttributes, ACCESS_MASK DesiredAccess, LSAPR_HANDLE *PolicyHandle)
NTSTATUS WINAPI LsarLookupNames3(LSAPR_HANDLE PolicyHandle, DWORD Count, PRPC_UNICODE_STRING Names, PLSAPR_REFERENCED_DOMAIN_LIST *ReferencedDomains, PLSAPR_TRANSLATED_SIDS_EX2 TranslatedSids, LSAP_LOOKUP_LEVEL LookupLevel, DWORD *MappedCount, DWORD LookupOptions, DWORD ClientRevision)
NTSTATUS WINAPI LsarQueryInfoTrustedDomain(LSAPR_HANDLE TrustedDomainHandle, TRUSTED_INFORMATION_CLASS InformationClass, PLSAPR_TRUSTED_DOMAIN_INFO *TrustedDomainInformation)
NTSTATUS WINAPI LsarOpenSecret(LSAPR_HANDLE PolicyHandle, PRPC_UNICODE_STRING SecretName, ACCESS_MASK DesiredAccess, LSAPR_HANDLE *SecretHandle)
NTSTATUS WINAPI LsarEnumeratePrivilegesAccount(LSAPR_HANDLE AccountHandle, PLSAPR_PRIVILEGE_SET *Privileges)
NTSTATUS WINAPI LsarClearAuditLog(LSAPR_HANDLE ObjectHandle)
NTSTATUS WINAPI LsarClose(LSAPR_HANDLE *ObjectHandle)
NTSTATUS WINAPI LsarCreateTrustedDomain(LSAPR_HANDLE PolicyHandle, PLSAPR_TRUST_INFORMATION TrustedDomainInformation, ACCESS_MASK DesiredAccess, LSAPR_HANDLE *TrustedDomainHandle)
NTSTATUS WINAPI LsarSetQuotasForAccount(LSAPR_HANDLE AccountHandle, PQUOTA_LIMITS QuotaLimits)
NTSTATUS WINAPI LsarGetSystemAccessAccount(LSAPR_HANDLE AccountHandle, ACCESS_MASK *SystemAccess)
NTSTATUS WINAPI LsarAddPrivilegesToAccount(LSAPR_HANDLE AccountHandle, PLSAPR_PRIVILEGE_SET Privileges)
NTSTATUS WINAPI LsarStorePrivateData(LSAPR_HANDLE PolicyHandle, PRPC_UNICODE_STRING KeyName, PLSAPR_CR_CIPHER_VALUE EncryptedData)
NTSTATUS WINAPI LsarLookupPrivilegeDisplayName(LSAPR_HANDLE PolicyHandle, PRPC_UNICODE_STRING Name, USHORT ClientLanguage, USHORT ClientSystemDefaultLanguage, PRPC_UNICODE_STRING *DisplayName, USHORT *LanguageReturned)
NTSTATUS WINAPI LsarSetForestTrustInformation(LSAPR_HANDLE PolicyHandle, PLSA_UNICODE_STRING TrustedDomainName, LSA_FOREST_TRUST_RECORD_TYPE HighestRecordType, PLSA_FOREST_TRUST_INFORMATION ForestTrustInfo, BOOLEAN CheckOnly, PLSA_FOREST_TRUST_COLLISION_INFORMATION *CollisionInfo)
NTSTATUS WINAPI LsarQuerySecurityObject(LSAPR_HANDLE ObjectHandle, SECURITY_INFORMATION SecurityInformation, PLSAPR_SR_SECURITY_DESCRIPTOR *SecurityDescriptor)
NTSTATUS WINAPI LsarQueryForestTrustInformation(LSAPR_HANDLE PolicyHandle, PLSA_UNICODE_STRING TrustedDomainName, LSA_FOREST_TRUST_RECORD_TYPE HighestRecordType, PLSA_FOREST_TRUST_INFORMATION *ForestTrustInfo)
NTSTATUS WINAPI LsarAddAccountRights(LSAPR_HANDLE PolicyHandle, PRPC_SID AccountSid, PLSAPR_USER_RIGHT_SET UserRights)
NTSTATUS WINAPI LsarEnumerateAccountRights(LSAPR_HANDLE PolicyHandle, PRPC_SID AccountSid, PLSAPR_USER_RIGHT_SET UserRights)
NTSTATUS WINAPI LsarLookupSids(LSAPR_HANDLE PolicyHandle, PLSAPR_SID_ENUM_BUFFER SidEnumBuffer, PLSAPR_REFERENCED_DOMAIN_LIST *ReferencedDomains, PLSAPR_TRANSLATED_NAMES TranslatedNames, LSAP_LOOKUP_LEVEL LookupLevel, DWORD *MappedCount)
NTSTATUS WINAPI LsarCreateSecret(LSAPR_HANDLE PolicyHandle, PRPC_UNICODE_STRING SecretName, ACCESS_MASK DesiredAccess, LSAPR_HANDLE *SecretHandle)
NTSTATUS WINAPI LsarQueryInformationPolicy(LSAPR_HANDLE PolicyHandle, POLICY_INFORMATION_CLASS InformationClass, PLSAPR_POLICY_INFORMATION *PolicyInformation)
NTSTATUS WINAPI LsarOpenPolicySce(LPWSTR SystemName, PLSAPR_OBJECT_ATTRIBUTES ObjectAttributes, ACCESS_MASK DesiredAccess, LSAPR_HANDLE *PolicyHandle)
NTSTATUS WINAPI LsarCreateAccount(LSAPR_HANDLE PolicyHandle, PRPC_SID AccountSid, ACCESS_MASK DesiredAccess, LSAPR_HANDLE *AccountHandle)
NTSTATUS WINAPI LsarEnumerateTrustedDomainsEx(LSAPR_HANDLE PolicyHandle, DWORD *EnumerationContext, PLSAPR_TRUSTED_ENUM_BUFFER_EX EnumerationBuffer, DWORD PreferedMaximumLength)
NTSTATUS WINAPI LsarSetSecurityObject(LSAPR_HANDLE ObjectHandle, SECURITY_INFORMATION SecurityInformation, PLSAPR_SR_SECURITY_DESCRIPTOR SecurityDescriptor)
NTSTATUS WINAPI LsarSetDomainInformationPolicy(LSAPR_HANDLE PolicyHandle, POLICY_INFORMATION_CLASS InformationClass, PLSAPR_POLICY_DOMAIN_INFORMATION PolicyInformation)
NTSTATUS WINAPI LsarOpenTrustedDomainByName(LSAPR_HANDLE PolicyHandle, PRPC_UNICODE_STRING TrustedDomainName, ACCESS_MASK DesiredAccess, LSAPR_HANDLE *TrustedDomainHandle)
NTSTATUS WINAPI LsarQueryTrustedDomainInfoByName(LSAPR_HANDLE PolicyHandle, PRPC_UNICODE_STRING TrustedDomainName, POLICY_INFORMATION_CLASS InformationClass, PLSAPR_TRUSTED_DOMAIN_INFO *PolicyInformation)
NTSTATUS WINAPI LsarDelete(LSAPR_HANDLE ObjectHandle)
NTSTATUS WINAPI LsarRemoveAccountRights(LSAPR_HANDLE PolicyHandle, PRPC_SID AccountSid, BOOLEAN AllRights, PLSAPR_USER_RIGHT_SET UserRights)
int WINAPI lstrcmpW(LPCWSTR lpString1, LPCWSTR lpString2)
#define memcpy(s1, s2, n)
PSDBQUERYRESULT_VISTA PVOID DWORD * dwSize
DWORD SECURITY_INFORMATION
struct _RPC_UNICODE_STRING * PRPC_UNICODE_STRING
NTSYSAPI NTSTATUS NTAPI RtlMakeSelfRelativeSD(_In_ PSECURITY_DESCRIPTOR AbsoluteSD, _Out_ PSECURITY_DESCRIPTOR SelfRelativeSD, _Inout_ PULONG BufferLength)
struct _LSA_TRANSLATED_SID2 * PLSA_TRANSLATED_SID2
enum _POLICY_DOMAIN_INFORMATION_CLASS POLICY_DOMAIN_INFORMATION_CLASS
struct _LSA_UNICODE_STRING * PLSA_UNICODE_STRING
@ TrustedDomainFullInformationInternal
@ TrustedDomainAuthInformationInternal
struct _LSA_UNICODE_STRING LSA_UNICODE_STRING
enum _POLICY_INFORMATION_CLASS POLICY_INFORMATION_CLASS
enum _TRUSTED_INFORMATION_CLASS TRUSTED_INFORMATION_CLASS
ULONG * PLSA_ENUMERATION_HANDLE
struct _LSA_TRANSLATED_SID * PLSA_TRANSLATED_SID
struct _LSA_TRANSLATED_NAME * PLSA_TRANSLATED_NAME
#define RPC_NT_SERVER_UNAVAILABLE
#define STATUS_NOT_IMPLEMENTED
#define STATUS_INVALID_INFO_CLASS
RPC_STATUS WINAPI RpcBindingFromStringBindingW(RPC_WSTR StringBinding, RPC_BINDING_HANDLE *Binding)
RPC_STATUS WINAPI RpcStringBindingComposeW(RPC_WSTR ObjUuid, RPC_WSTR Protseq, RPC_WSTR NetworkAddr, RPC_WSTR Endpoint, RPC_WSTR Options, RPC_WSTR *StringBinding)
RPC_STATUS WINAPI RpcBindingFree(RPC_BINDING_HANDLE *Binding)
LONG WINAPI I_RpcMapWin32Status(RPC_STATUS status)
RPC_STATUS WINAPI RpcStringFreeW(RPC_WSTR *String)
#define RpcExceptionCode()
#define midl_user_allocate
#define STATUS_BUFFER_TOO_SMALL
PULONG MinorVersion OPTIONAL
PLSAPR_ACCOUNT_INFORMATION Information
PLSAPR_POLICY_PRIVILEGE_DEF Privileges
PLSAPR_SID_INFORMATION SidInfo
BYTE * SecurityDescriptor
PLSAPR_TRANSLATED_NAME Names
PLSAPR_TRANSLATED_SID_EX2 Sids
PLSAPR_TRUSTED_DOMAIN_INFORMATION_EX EnumerationBuffer
PLSAPR_TRUST_INFORMATION Information
PRPC_UNICODE_STRING UserRights
#define RtlCopyMemory(Destination, Source, Length)
#define STATUS_INVALID_PARAMETER
#define STATUS_INSUFFICIENT_RESOURCES
_Must_inspect_result_ _In_ WDFDEVICE _In_ ULONG _In_ ACCESS_MASK DesiredAccess
_Must_inspect_result_ _In_ WDFDEVICE _In_ PCUNICODE_STRING KeyName
_In_ WDFMEMORY _Out_opt_ size_t * BufferSize
_Must_inspect_result_ _In_ WDFKEY _In_ PCUNICODE_STRING _Out_opt_ PUSHORT _Inout_opt_ PUNICODE_STRING Value
#define MAX_COMPUTERNAME_LENGTH
_In_ USHORT _In_ ULONG _In_ PSOCKADDR _In_ PSOCKADDR _Reserved_ ULONG _In_opt_ PVOID _In_opt_ const WSK_CLIENT_CONNECTION_DISPATCH _In_opt_ PEPROCESS _In_opt_ PETHREAD _In_opt_ PSECURITY_DESCRIPTOR SecurityDescriptor
_At_(*)(_In_ PWSK_CLIENT Client, _In_opt_ PUNICODE_STRING NodeName, _In_opt_ PUNICODE_STRING ServiceName, _In_opt_ ULONG NameSpace, _In_opt_ GUID *Provider, _In_opt_ PADDRINFOEXW Hints, _Outptr_ PADDRINFOEXW *Result, _In_opt_ PEPROCESS OwningProcess, _In_opt_ PETHREAD OwningThread, _Inout_ PIRP Irp Result)(Mem)) NTSTATUS(WSKAPI *PFN_WSK_GET_ADDRESS_INFO
_Must_inspect_result_ _In_ ULONG Flags
_In_ PSECURITY_SUBJECT_CONTEXT _In_ BOOLEAN _In_ ACCESS_MASK _In_ ACCESS_MASK _Outptr_opt_ PPRIVILEGE_SET * Privileges