Lines Matching refs:arg

157 	struct mslsa_OpenPolicy2 arg;
166 bzero(&arg, sizeof (struct mslsa_OpenPolicy2));
168 arg.servername = ndr_rpc_derive_nbhandle(lsa_handle, server);
169 if (arg.servername == NULL) {
174 arg.attributes.length = sizeof (struct mslsa_object_attributes);
177 arg.desiredAccess = MAXIMUM_ALLOWED;
179 arg.desiredAccess = GENERIC_EXECUTE
185 if ((rc = ndr_rpc_call(lsa_handle, opnum, &arg)) != 0) {
190 if (arg.status != 0) {
193 (void) memcpy(&lsa_handle->handle, &arg.domain_handle,
222 struct mslsa_OpenAccount arg;
230 bzero(&arg, sizeof (struct mslsa_OpenAccount));
232 (void) memcpy(&arg.handle, lsa_handle, sizeof (mslsa_handle_t));
233 arg.sid = sid;
234 arg.access_mask = STANDARD_RIGHTS_REQUIRED
242 if ((rc = ndr_rpc_call(lsa_handle, opnum, &arg)) != 0)
245 if (arg.status != 0) {
251 &arg.account_handle, sizeof (ndr_hdid_t));
275 struct mslsa_CloseHandle arg;
282 bzero(&arg, sizeof (struct mslsa_CloseHandle));
283 (void) memcpy(&arg.handle, lsa_handle, sizeof (mslsa_handle_t));
285 (void) ndr_rpc_call(lsa_handle, opnum, &arg);
303 struct mslsa_QuerySecurityObject arg;
309 bzero(&arg, sizeof (struct mslsa_QuerySecurityObject));
310 (void) memcpy(&arg.handle, lsa_handle, sizeof (mslsa_handle_t));
312 rc = ndr_rpc_call(lsa_handle, opnum, &arg);
337 struct mslsa_QueryInfoPolicy arg;
352 bzero(&arg, sizeof (struct mslsa_QueryInfoPolicy));
353 (void) memcpy(&arg.handle, lsa_handle, sizeof (mslsa_handle_t));
355 arg.info_class = infoClass;
357 if (ndr_rpc_call(lsa_handle, opnum, &arg) != 0) {
359 } else if (arg.status != 0) {
360 ndr_rpc_status(lsa_handle, opnum, arg.status);
361 status = NT_SC_VALUE(arg.status);
366 pd_info = &arg.ru.pd_info;
377 ad_info = &arg.ru.ad_info;
388 dns_info = &arg.ru.dns_info;
529 struct mslsa_LookupNames arg;
536 bzero(&arg, sizeof (struct mslsa_LookupNames));
537 (void) memcpy(&arg.handle, lsa_handle, sizeof (mslsa_handle_t));
538 arg.lookup_level = LSA_LOOKUP_WKSTA;
539 arg.name_table = (struct mslsa_lup_name_table *)names;
541 if (ndr_rpc_call(lsa_handle, opnum, &arg) != 0) {
546 if (arg.status != NT_STATUS_SUCCESS) {
547 ndr_rpc_status(lsa_handle, opnum, arg.status);
549 return (NT_SC_VALUE(arg.status));
552 if (arg.mapped_count == 0) {
557 rid_entry = &arg.translated_sids.rids[0];
563 domain_entry = &arg.domain_table->entries[0];
583 struct lsar_LookupNames2 arg;
590 bzero(&arg, sizeof (struct lsar_LookupNames2));
591 (void) memcpy(&arg.policy_handle, lsa_handle, sizeof (mslsa_handle_t));
592 arg.lookup_level = LSA_LOOKUP_WKSTA;
593 arg.client_revision = LSA_CLIENT_REVISION_AD;
594 arg.name_table = (struct mslsa_lup_name_table *)names;
596 if (ndr_rpc_call(lsa_handle, opnum, &arg) != 0) {
601 if (arg.status != NT_STATUS_SUCCESS) {
602 ndr_rpc_status(lsa_handle, opnum, arg.status);
604 return (NT_SC_VALUE(arg.status));
607 if (arg.mapped_count == 0) {
612 rid_entry = &arg.translated_sids.rids[0];
618 domain_entry = &arg.domain_table->entries[0];
638 struct lsar_LookupNames3 arg;
645 bzero(&arg, sizeof (struct lsar_LookupNames3));
646 (void) memcpy(&arg.policy_handle, lsa_handle, sizeof (mslsa_handle_t));
647 arg.lookup_level = LSA_LOOKUP_WKSTA;
648 arg.client_revision = LSA_CLIENT_REVISION_AD;
649 arg.name_table = (struct mslsa_lup_name_table *)names;
651 if (ndr_rpc_call(lsa_handle, opnum, &arg) != 0) {
656 if (arg.status != NT_STATUS_SUCCESS) {
657 ndr_rpc_status(lsa_handle, opnum, arg.status);
659 return (NT_SC_VALUE(arg.status));
662 if (arg.mapped_count == 0) {
667 sid_entry = &arg.translated_sids.sids[0];
673 domain_entry = &arg.domain_table->entries[0];
700 struct lsar_LookupNames4 arg;
707 bzero(&arg, sizeof (struct lsar_LookupNames4));
708 arg.lookup_level = LSA_LOOKUP_WKSTA;
709 arg.client_revision = LSA_CLIENT_REVISION_AD;
710 arg.name_table = (struct mslsa_lup_name_table *)names;
712 if (ndr_rpc_call(lsa_handle, opnum, &arg) != 0) {
717 if (arg.status != NT_STATUS_SUCCESS) {
718 ndr_rpc_status(lsa_handle, opnum, arg.status);
720 if (arg.status == RPC_NT_PROTSEQ_NOT_SUPPORTED ||
721 arg.status == NT_STATUS_INVALID_SERVER_STATE)
723 return (NT_SC_VALUE(arg.status));
726 if (arg.mapped_count == 0) {
731 sid_entry = &arg.translated_sids.sids[0];
737 domain_entry = &arg.domain_table->entries[0];
795 struct mslsa_LookupSids arg;
803 bzero(&arg, sizeof (struct mslsa_LookupSids));
804 (void) memcpy(&arg.handle, lsa_handle, sizeof (mslsa_handle_t));
805 arg.lookup_level = LSA_LOOKUP_WKSTA;
808 arg.lup_sid_table.n_entry = 1;
809 arg.lup_sid_table.entries = &sid_entry;
811 if (ndr_rpc_call(lsa_handle, opnum, &arg) != 0) {
816 if (arg.status != NT_STATUS_SUCCESS) {
817 ndr_rpc_status(lsa_handle, opnum, arg.status);
819 return (NT_SC_VALUE(arg.status));
822 if (arg.mapped_count == 0) {
827 name_entry = &arg.name_table.entries[0];
839 domain_entry = &arg.domain_table->entries[0];
855 struct lsar_lookup_sids2 arg;
863 bzero(&arg, sizeof (struct lsar_lookup_sids2));
864 (void) memcpy(&arg.policy_handle, lsa_handle, sizeof (mslsa_handle_t));
867 arg.lup_sid_table.n_entry = 1;
868 arg.lup_sid_table.entries = &sid_entry;
869 arg.lookup_level = LSA_LOOKUP_WKSTA;
870 arg.client_revision = LSA_CLIENT_REVISION_AD;
872 if (ndr_rpc_call(lsa_handle, opnum, &arg) != 0) {
877 if (arg.status != NT_STATUS_SUCCESS) {
878 ndr_rpc_status(lsa_handle, opnum, arg.status);
880 return (NT_SC_VALUE(arg.status));
883 if (arg.mapped_count == 0) {
888 name_entry = &arg.name_table.entries[0];
900 domain_entry = &arg.domain_table->entries[0];
923 struct lsar_lookup_sids3 arg;
931 bzero(&arg, sizeof (struct lsar_lookup_sids3));
934 arg.lup_sid_table.n_entry = 1;
935 arg.lup_sid_table.entries = &sid_entry;
936 arg.lookup_level = LSA_LOOKUP_WKSTA;
937 arg.client_revision = LSA_CLIENT_REVISION_AD;
939 if (ndr_rpc_call(lsa_handle, opnum, &arg) != 0) {
944 if (arg.status != NT_STATUS_SUCCESS) {
945 ndr_rpc_status(lsa_handle, opnum, arg.status);
947 if (arg.status == RPC_NT_PROTSEQ_NOT_SUPPORTED ||
948 arg.status == NT_STATUS_INVALID_SERVER_STATE)
950 return (NT_SC_VALUE(arg.status));
953 if (arg.mapped_count == 0) {
958 name_entry = &arg.name_table.entries[0];
970 domain_entry = &arg.domain_table->entries[0];
996 struct mslsa_EnumerateAccounts arg;
1012 bzero(&arg, sizeof (struct mslsa_EnumerateAccounts));
1013 (void) memcpy(&arg.handle, lsa_handle, sizeof (mslsa_handle_t));
1014 arg.enum_context = *enum_context;
1015 arg.max_length = MLSVC_MAX_RESPONSE_LEN;
1017 rc = ndr_rpc_call(lsa_handle, opnum, &arg);
1019 if (arg.status != 0) {
1020 if (arg.status == NT_STATUS_NO_MORE_ENTRIES) {
1021 *enum_context = arg.enum_context;
1023 ndr_rpc_status(lsa_handle, opnum, arg.status);
1026 } else if (arg.enum_buf->entries_read != 0) {
1027 n_entries = arg.enum_buf->entries_read;
1037 (smb_sid_t *)arg.enum_buf->info[i].sid);
1041 *enum_context = arg.enum_context;
1068 struct mslsa_EnumTrustedDomain arg;
1078 bzero(&arg, sizeof (struct mslsa_EnumTrustedDomain));
1079 (void) memcpy(&arg.handle, lsa_handle, sizeof (mslsa_handle_t));
1080 arg.enum_context = *enum_context;
1081 arg.max_length = MLSVC_MAX_RESPONSE_LEN;
1083 if (ndr_rpc_call(lsa_handle, opnum, &arg) != 0) {
1085 } else if (arg.status != 0) {
1086 *enum_context = arg.enum_context;
1087 status = NT_SC_VALUE(arg.status);
1094 ndr_rpc_status(lsa_handle, opnum, arg.status);
1095 } else if (arg.enum_buf->entries_read == 0) {
1096 *enum_context = arg.enum_context;
1099 lsar_set_trusted_domains(arg.enum_buf, list);
1100 *enum_context = arg.enum_context;
1112 struct mslsa_EnumTrustedDomainEx arg;
1122 bzero(&arg, sizeof (struct mslsa_EnumTrustedDomainEx));
1123 (void) memcpy(&arg.handle, lsa_handle, sizeof (mslsa_handle_t));
1124 arg.enum_context = *enum_context;
1125 arg.max_length = MLSVC_MAX_RESPONSE_LEN;
1127 if (ndr_rpc_call(lsa_handle, opnum, &arg) != 0) {
1129 } else if (arg.status != 0) {
1130 *enum_context = arg.enum_context;
1131 status = NT_SC_VALUE(arg.status);
1138 ndr_rpc_status(lsa_handle, opnum, arg.status);
1139 } else if (arg.enum_buf->entries_read == 0) {
1140 *enum_context = arg.enum_context;
1143 lsar_set_trusted_domains_ex(arg.enum_buf, list);
1144 *enum_context = arg.enum_context;
1161 struct mslsa_EnumPrivsAccount arg;
1167 bzero(&arg, sizeof (struct mslsa_EnumPrivsAccount));
1168 (void) memcpy(&arg.account_handle, &account_handle->handle,
1171 rc = ndr_rpc_call(account_handle, opnum, &arg);
1172 if ((rc == 0) && (arg.status != 0)) {
1173 ndr_rpc_status(account_handle, opnum, arg.status);
1193 struct mslsa_LookupPrivValue arg;
1203 bzero(&arg, sizeof (struct mslsa_LookupPrivValue));
1204 (void) memcpy(&arg.handle, lsa_handle, sizeof (mslsa_handle_t));
1210 arg.name.length = length;
1211 arg.name.allosize = length;
1212 arg.name.str = (unsigned char *)name;
1214 rc = ndr_rpc_call(lsa_handle, opnum, &arg);
1216 if (arg.status != 0)
1219 (void) memcpy(luid, &arg.luid, sizeof (struct ms_luid));
1238 struct mslsa_LookupPrivName arg;
1247 bzero(&arg, sizeof (struct mslsa_LookupPrivName));
1248 (void) memcpy(&arg.handle, lsa_handle, sizeof (mslsa_handle_t));
1249 (void) memcpy(&arg.luid, luid, sizeof (struct ms_luid));
1251 rc = ndr_rpc_call(lsa_handle, opnum, &arg);
1253 if (arg.status != 0)
1256 (void) strlcpy(name, (char const *)arg.name->str,
1281 struct mslsa_LookupPrivDisplayName arg;
1291 bzero(&arg, sizeof (struct mslsa_LookupPrivDisplayName));
1292 (void) memcpy(&arg.handle, lsa_handle, sizeof (mslsa_handle_t));
1295 arg.name.length = length;
1296 arg.name.allosize = length;
1297 arg.name.str = (unsigned char *)name;
1299 arg.client_language = MAKELANGID(LANG_ENGLISH, SUBLANG_ENGLISH_US);
1300 arg.default_language = MAKELANGID(LANG_ENGLISH, SUBLANG_NEUTRAL);
1302 if (ndr_rpc_call(lsa_handle, opnum, &arg) != 0)
1305 else if (arg.status != 0)
1306 status = NT_SC_VALUE(arg.status);
1310 (char const *)arg.display_name->str, display_len);