/* Unix SMB/Netbios implementation. Version 1.9. SMB parameters and setup Copyright (C) Andrew Tridgell 1992-1997 Copyright (C) Luke Kenneth Casson Leighton 1996-1997 Copyright (C) Paul Ashton 1997 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. */ #ifndef _RPC_SAMR_H /* _RPC_SAMR_H */ #define _RPC_SAMR_H #include "rpc_misc.h" /******************************************************************* the following information comes from a QuickView on samsrv.dll, and gives an idea of exactly what is needed: SamrAddMemberToAlias SamrAddMemberToGroup SamrAddMultipleMembersToAlias SamrChangePasswordUser x SamrCloseHandle x SamrConnect SamrCreateAliasInDomain SamrCreateGroupInDomain SamrCreateUserInDomain SamrDeleteAlias SamrDeleteGroup SamrDeleteUser x SamrEnumerateAliasesInDomain SamrEnumerateDomainsInSamServer x SamrEnumerateGroupsInDomain x SamrEnumerateUsersInDomain SamrGetUserDomainPasswordInformation SamrLookupDomainInSamServer ? SamrLookupIdsInDomain x SamrLookupNamesInDomain x SamrOpenAlias x SamrOpenDomain SamrOpenGroup x SamrOpenUser x SamrQueryDisplayInformation x SamrQueryInformationAlias SamrQueryInformationDomain ? SamrQueryInformationUser SamrQuerySecurityObject SamrRemoveMemberFromAlias SamrRemoveMemberFromForiegnDomain SamrRemoveMemberFromGroup SamrRemoveMultipleMembersFromAlias SamrSetInformationAlias SamrSetInformationDomain SamrSetInformationGroup SamrSetInformationUser SamrSetMemberAttributesOfGroup SamrSetSecurityObject SamrShutdownSamServer SamrTestPrivateFunctionsDomain SamrTestPrivateFunctionsUser ********************************************************************/ #define SAMR_CLOSE_HND 0x01 #define SAMR_OPEN_DOMAIN 0x07 #define SAMR_QUERY_DOMAIN_INFO 0x08 #define SAMR_LOOKUP_IDS 0x10 #define SAMR_LOOKUP_NAMES 0x11 #define SAMR_UNKNOWN_3 0x03 #define SAMR_QUERY_DISPINFO 0x28 #define SAMR_OPEN_USER 0x22 #define SAMR_QUERY_USERINFO 0x24 #define SAMR_QUERY_USERGROUPS 0x27 #define SAMR_UNKNOWN_12 0x12 #define SAMR_UNKNOWN_21 0x21 #define SAMR_UNKNOWN_2C 0x2c #define SAMR_UNKNOWN_32 0x32 #define SAMR_UNKNOWN_34 0x34 #define SAMR_CHGPASSWD_USER 0x37 #define SAMR_UNKNOWN_38 0x38 #define SAMR_CONNECT 0x39 #define SAMR_CONNECT_ANON 0x00 #define SAMR_OPEN_ALIAS 0x1b #define SAMR_QUERY_ALIASINFO 0x1c #define SAMR_ENUM_DOM_USERS 0x0d #define SAMR_ENUM_DOM_ALIASES 0x0f #define SAMR_ENUM_DOM_GROUPS 0x30 typedef struct logon_hours_info { uint32 len; /* normally 21 bytes */ uint8 hours[32]; } LOGON_HRS; /* SAM_USER_INFO_21 */ typedef struct sam_user_info_21 { NTTIME logon_time; /* logon time */ NTTIME logoff_time; /* logoff time */ NTTIME kickoff_time; /* kickoff time */ NTTIME pass_last_set_time; /* password last set time */ NTTIME pass_can_change_time; /* password can change time */ NTTIME pass_must_change_time; /* password must change time */ UNIHDR hdr_user_name; /* username unicode string header */ UNIHDR hdr_full_name; /* user's full name unicode string header */ UNIHDR hdr_home_dir; /* home directory unicode string header */ UNIHDR hdr_dir_drive; /* home drive unicode string header */ UNIHDR hdr_logon_script; /* logon script unicode string header */ UNIHDR hdr_profile_path; /* profile path unicode string header */ UNIHDR hdr_acct_desc ; /* user description */ UNIHDR hdr_workstations; /* comma-separated workstations user can log in from */ UNIHDR hdr_unknown_str ; /* don't know what this is, yet. */ UNIHDR hdr_munged_dial ; /* munged path name and dial-back tel number */ uint8 lm_pwd[16]; /* lm user passwords */ uint8 nt_pwd[16]; /* nt user passwords */ uint32 user_rid; /* Primary User ID */ uint32 group_rid; /* Primary Group ID */ uint16 acb_info; /* account info (ACB_xxxx bit-mask) */ /* uint8 pad[2] */ uint32 unknown_3; /* 0x00ff ffff */ uint16 logon_divs; /* 0x0000 00a8 which is 168 which is num hrs in a week */ /* uint8 pad[2] */ uint32 ptr_logon_hrs; /* unknown pointer */ uint32 unknown_5; /* 0x0002 0000 */ uint8 padding1[8]; UNISTR2 uni_user_name; /* username unicode string */ UNISTR2 uni_full_name; /* user's full name unicode string */ UNISTR2 uni_home_dir; /* home directory unicode string */ UNISTR2 uni_dir_drive; /* home directory drive unicode string */ UNISTR2 uni_logon_script; /* logon script unicode string */ UNISTR2 uni_profile_path; /* profile path unicode string */ UNISTR2 uni_acct_desc ; /* user description unicode string */ UNISTR2 uni_workstations; /* login from workstations unicode string */ UNISTR2 uni_unknown_str ; /* don't know what this is, yet. */ UNISTR2 uni_munged_dial ; /* munged path name and dial-back tel number */ uint32 unknown_6; /* 0x0000 04ec */ uint32 padding4; LOGON_HRS logon_hrs; } SAM_USER_INFO_21; /* SAM_USER_INFO_11 */ typedef struct sam_user_info_11 { uint8 padding_0[16]; /* 0 - padding 16 bytes */ NTTIME expiry; /* expiry time or something? */ uint8 padding_1[24]; /* 0 - padding 24 bytes */ UNIHDR hdr_mach_acct; /* unicode header for machine account */ uint32 padding_2; /* 0 - padding 4 bytes */ uint32 ptr_1; /* pointer */ uint8 padding_3[32]; /* 0 - padding 32 bytes */ uint32 padding_4; /* 0 - padding 4 bytes */ uint32 ptr_2; /* pointer */ uint32 padding_5; /* 0 - padding 4 bytes */ uint32 ptr_3; /* pointer */ uint8 padding_6[32]; /* 0 - padding 32 bytes */ uint32 rid_user; /* user RID */ uint32 rid_group; /* group RID */ uint16 acct_ctrl; /* 0080 - ACB_XXXX */ uint16 unknown_3; /* 16 bit padding */ uint16 unknown_4; /* 0x003f - 16 bit unknown */ uint16 unknown_5; /* 0x003c - 16 bit unknown */ uint8 padding_7[16]; /* 0 - padding 16 bytes */ uint32 padding_8; /* 0 - padding 4 bytes */ UNISTR2 uni_mach_acct; /* unicode string for machine account */ uint8 padding_9[48]; /* 0 - padding 48 bytes */ } SAM_USER_INFO_11; /* SAM_USER_INFO_10 */ typedef struct sam_user_info_10 { uint32 acb_info; } SAM_USER_INFO_10; /* SAMR_Q_CLOSE_HND - probably a policy handle close */ typedef struct q_samr_close_hnd_info { POLICY_HND pol; /* policy handle */ } SAMR_Q_CLOSE_HND; /* SAMR_R_CLOSE_HND - probably a policy handle close */ typedef struct r_samr_close_hnd_info { POLICY_HND pol; /* policy handle */ uint32 status; /* return status */ } SAMR_R_CLOSE_HND; /**************************************************************************** SAMR_Q_UNKNOWN_2C - a "set user info" occurs just after this *****************************************************************************/ /* SAMR_Q_UNKNOWN_2C */ typedef struct q_samr_unknown_2c_info { POLICY_HND user_pol; /* policy handle */ } SAMR_Q_UNKNOWN_2C; /**************************************************************************** SAMR_R_UNKNOWN_2C - a "set user info" occurs just after this *****************************************************************************/ /* SAMR_R_UNKNOWN_2C */ typedef struct r_samr_unknown_2c_info { uint32 unknown_0; /* 0x0016 0000 */ uint32 unknown_1; /* 0x0000 0000 */ uint32 status; } SAMR_R_UNKNOWN_2C; /**************************************************************************** SAMR_Q_UNKNOWN_3 - info level 4. returns SIDs. *****************************************************************************/ /* SAMR_Q_UNKNOWN_3 - probably get domain info... */ typedef struct q_samr_unknown_3_info { POLICY_HND user_pol; /* policy handle */ uint16 switch_value; /* 0x0000 0004 */ /* uint8 pad[2] */ } SAMR_Q_UNKNOWN_3; /* DOM_SID3 example: 0x14 0x035b 0x0002 S-1-1 0x18 0x07ff 0x000f S-1-5-20-DOMAIN_ALIAS_RID_ADMINS 0x18 0x07ff 0x000f S-1-5-20-DOMAIN_ALIAS_RID_ACCOUNT_OPS 0x24 0x0044 0x0002 S-1-5-21-nnn-nnn-nnn-0x03f1 */ /* DOM_SID3 example: 0x24 0x0044 0x0002 S-1-5-21-nnn-nnn-nnn-0x03ee 0x18 0x07ff 0x000f S-1-5-20-DOMAIN_ALIAS_RID_ADMINS 0x14 0x035b 0x0002 S-1-1 */ /* DOM_SID3 - security id */ typedef struct sid_info_3 { uint16 len; /* length, bytes, including length of len :-) */ /* uint8 pad[2]; */ DOM_SID sid; } DOM_SID3; #define MAX_SAM_SIDS 15 /* SAM_SID_STUFF */ typedef struct sid_stuff_info { uint16 unknown_2; /* 0x0001 */ uint16 unknown_3; /* 0x8004 */ uint8 padding1[8]; uint32 unknown_4; /* 0x0000 0014 */ uint32 unknown_5; /* 0x0000 0014 */ uint16 unknown_6; /* 0x0002 */ uint16 unknown_7; /* 0x5800 */ uint32 num_sids; uint16 padding2; DOM_SID3 sid[MAX_SAM_SIDS]; } SAM_SID_STUFF; /* SAMR_R_UNKNOWN_3 - probably an open */ typedef struct r_samr_unknown_3_info { uint32 ptr_0; uint32 sid_stuff_len0; uint32 ptr_1; uint32 sid_stuff_len1; SAM_SID_STUFF sid_stuff; uint32 status; /* return status */ } SAMR_R_UNKNOWN_3; /**************************************************************************** SAMR_Q_QUERY_DOMAIN_INFO - probably a query on domain group info. *****************************************************************************/ /* SAMR_Q_QUERY_DOMAIN_INFO - */ typedef struct q_samr_query_domain_info { POLICY_HND domain_pol; /* policy handle */ uint16 switch_value; /* 0x0002 */ } SAMR_Q_QUERY_DOMAIN_INFO; typedef struct sam_unkown_info_2_info { uint32 unknown_0; /* 0x0000 0000 */ uint32 unknown_1; /* 0x8000 0000 */ uint32 unknown_2; /* 0x0000 0000 */ uint32 ptr_0; /* pointer to unknown structure */ UNIHDR hdr_domain; /* domain name unicode header */ UNIHDR hdr_server; /* server name unicode header */ /* put all the data in here, at the moment, including what the above pointer is referring to */ uint32 seq_num; /* some sort of incrementing sequence number? */ uint32 unknown_3; /* 0x0000 0000 */ uint32 unknown_4; /* 0x0000 0001 */ uint32 unknown_5; /* 0x0000 0003 */ uint32 unknown_6; /* 0x0000 0001 */ uint32 num_domain_usrs; /* number of users in domain */ uint32 num_domain_grps; /* number of domain groups in domain */ uint32 num_local_grps; /* number of local groups in domain */ uint8 padding[12]; /* 12 bytes zeros */ UNISTR2 uni_domain; /* domain name unicode string */ UNISTR2 uni_server; /* server name unicode string */ } SAM_UNK_INFO_2; typedef struct sam_unknown_ctr_info { union { SAM_UNK_INFO_2 inf2; } info; } SAM_UNK_CTR; /* SAMR_R_QUERY_DOMAIN_INFO - */ typedef struct r_samr_query_domain_info { uint32 ptr_0; uint16 switch_value; /* same as in query */ SAM_UNK_CTR *ctr; uint32 status; /* return status */ } SAMR_R_QUERY_DOMAIN_INFO; /**************************************************************************** SAMR_Q_OPEN_DOMAIN - unknown_0 values seen associated with SIDs: 0x0000 03f1 and a specific domain sid - S-1-5-21-44c01ca6-797e5c3d-33f83fd0 0x0000 0200 and a specific domain sid - S-1-5-21-44c01ca6-797e5c3d-33f83fd0 *****************************************************************************/ /* SAMR_Q_OPEN_DOMAIN */ typedef struct q_samr_open_domain_info { POLICY_HND connect_pol; /* policy handle */ uint32 rid; /* 0x2000 0000; 0x0000 0211; 0x0000 0280; 0x0000 0200 - a RID? */ DOM_SID2 dom_sid; /* domain SID */ } SAMR_Q_OPEN_DOMAIN; /* SAMR_R_OPEN_DOMAIN - probably an open */ typedef struct r_samr_open_domain_info { POLICY_HND domain_pol; /* policy handle associated with the SID */ uint32 status; /* return status */ } SAMR_R_OPEN_DOMAIN; #define MAX_SAM_ENTRIES 250 typedef struct samr_entry_info { uint32 rid; UNIHDR hdr_name; } SAM_ENTRY; /* SAMR_Q_ENUM_DOM_USERS - SAM rids and names */ typedef struct q_samr_enum_dom_users_info { POLICY_HND pol; /* policy handle */ uint16 req_num_entries; /* number of values (0 indicates unlimited?) */ uint16 unknown_0; /* enumeration context? */ uint16 acb_mask; /* 0x0000 indicates all */ uint16 unknown_1; /* 0x0000 */ uint32 max_size; /* 0x0000 ffff */ } SAMR_Q_ENUM_DOM_USERS; /* SAMR_R_ENUM_DOM_USERS - SAM rids and names */ typedef struct r_samr_enum_dom_users_info { uint16 total_num_entries; /* number of entries that match without the acb mask */ uint16 unknown_0; /* same as unknown_0 (enum context?) in request */ uint32 ptr_entries1; /* actual number of entries to follow, having masked some out */ uint32 num_entries2; uint32 ptr_entries2; uint32 num_entries3; SAM_ENTRY sam[MAX_SAM_ENTRIES]; UNISTR2 uni_acct_name[MAX_SAM_ENTRIES]; uint32 num_entries4; uint32 status; } SAMR_R_ENUM_DOM_USERS; typedef struct samr_entry_info3 { uint32 grp_idx; uint32 rid_grp; uint32 attr; UNIHDR hdr_grp_name; UNIHDR hdr_grp_desc; } SAM_ENTRY3; typedef struct samr_str_entry_info3 { UNISTR2 uni_grp_name; UNISTR2 uni_grp_desc; } SAM_STR3; /* SAMR_Q_ENUM_DOM_GROUPS - SAM rids and names */ typedef struct q_samr_enum_dom_groups_info { POLICY_HND pol; /* policy handle */ /* these are possibly an enumeration context handle... */ uint16 switch_level; /* 0x0003 */ uint16 unknown_0; /* 0x0000 */ uint32 start_idx; /* presumably the start enumeration index */ uint32 unknown_1; /* 0x0000 07d0 */ uint32 max_size; /* 0x0000 7fff */ } SAMR_Q_ENUM_DOM_GROUPS; /* SAMR_R_ENUM_DOM_GROUPS - SAM rids and names */ typedef struct r_samr_enum_dom_groups_info { uint32 unknown_0; /* 0x0000 0492 or 0x0000 00be */ uint32 unknown_1; /* 0x0000 049a or 0x0000 00be */ uint32 switch_level; /* 0x0000 0003 */ uint32 num_entries; uint32 ptr_entries; uint32 num_entries2; SAM_ENTRY3 sam[MAX_SAM_ENTRIES]; SAM_STR3 str[MAX_SAM_ENTRIES]; uint32 status; } SAMR_R_ENUM_DOM_GROUPS; /* SAMR_Q_ENUM_DOM_ALIASES - SAM rids and names */ typedef struct q_samr_enum_dom_aliases_info { POLICY_HND pol; /* policy handle */ /* this is possibly an enumeration context handle... */ uint32 unknown_0; /* 0x0000 0000 */ uint32 max_size; /* 0x0000 ffff */ } SAMR_Q_ENUM_DOM_ALIASES; /* SAMR_R_ENUM_DOM_ALIASES - SAM rids and names */ typedef struct r_samr_enum_dom_aliases_info { uint32 num_entries; uint32 ptr_entries; uint32 num_entries2; uint32 ptr_entries2; uint32 num_entries3; SAM_ENTRY sam[MAX_SAM_ENTRIES]; UNISTR2 uni_grp_name[MAX_SAM_ENTRIES]; uint32 num_entries4; uint32 status; } SAMR_R_ENUM_DOM_ALIASES; /* SAMR_Q_QUERY_DISPINFO - SAM rids, names and descriptions */ typedef struct q_samr_query_disp_info { POLICY_HND pol; /* policy handle */ uint16 switch_level; /* 0x0001 and 0x0002 seen */ uint16 unknown_0; /* 0x0000 and 0x2000 seen */ uint32 start_idx; /* presumably the start enumeration index */ uint32 unknown_1; /* 0x0000 07d0, 0x0000 0400 and 0x0000 0200 seen */ uint32 max_size; /* 0x0000 7fff, 0x0000 7ffe and 0x0000 3fff seen*/ } SAMR_Q_QUERY_DISPINFO; typedef struct samr_entry_info1 { uint32 user_idx; uint32 rid_user; uint16 acb_info; uint16 pad; UNIHDR hdr_acct_name; UNIHDR hdr_user_name; UNIHDR hdr_user_desc; } SAM_ENTRY1; typedef struct samr_str_entry_info1 { UNISTR2 uni_acct_name; UNISTR2 uni_full_name; UNISTR2 uni_acct_desc; } SAM_STR1; typedef struct sam_entry_info_1 { uint32 num_entries; uint32 ptr_entries; uint32 num_entries2; SAM_ENTRY1 sam[MAX_SAM_ENTRIES]; SAM_STR1 str[MAX_SAM_ENTRIES]; } SAM_INFO_1; typedef struct samr_entry_info2 { uint32 user_idx; uint32 rid_user; uint16 acb_info; uint16 pad; UNIHDR hdr_srv_name; UNIHDR hdr_srv_desc; } SAM_ENTRY2; typedef struct samr_str_entry_info2 { UNISTR2 uni_srv_name; UNISTR2 uni_srv_desc; } SAM_STR2; typedef struct sam_entry_info_2 { uint32 num_entries; uint32 ptr_entries; uint32 num_entries2; SAM_ENTRY2 sam[MAX_SAM_ENTRIES]; SAM_STR2 str[MAX_SAM_ENTRIES]; } SAM_INFO_2; typedef struct sam_info_ctr_info { union { SAM_INFO_1 *info1; /* server info */ SAM_INFO_2 *info2; /* user info */ void *info; /* allows assignment without typecasting, */ } sam; } SAM_INFO_CTR; /* SAMR_R_QUERY_DISPINFO - SAM rids, names and descriptions */ typedef struct r_samr_query_dispinfo_info { uint32 unknown_0; /* container length? 0x0000 0492 or 0x0000 00be */ uint32 unknown_1; /* container length? 0x0000 049a or 0x0000 00be */ uint16 switch_level; /* 0x0001 or 0x0002 */ /*uint8 pad[2] */ SAM_INFO_CTR *ctr; uint32 status; } SAMR_R_QUERY_DISPINFO; /* SAMR_Q_QUERY_ALIASINFO - SAM Alias Info */ typedef struct q_samr_enum_alias_info { POLICY_HND pol; /* policy handle */ uint16 switch_level; /* 0x0003 seen */ } SAMR_Q_QUERY_ALIASINFO; typedef struct samr_alias_info3 { UNIHDR hdr_acct_desc; UNISTR2 uni_acct_desc; } ALIAS_INFO3; /* SAMR_R_QUERY_ALIASINFO - SAM rids, names and descriptions */ typedef struct r_samr_query_aliasinfo_info { uint32 ptr; uint16 switch_value; /* 0x0003 */ /* uint8[2] padding */ union { ALIAS_INFO3 info3; } alias; uint32 status; } SAMR_R_QUERY_ALIASINFO; /* SAMR_Q_QUERY_USERGROUPS - */ typedef struct q_samr_query_usergroup_info { POLICY_HND pol; /* policy handle associated with unknown id */ } SAMR_Q_QUERY_USERGROUPS; /* SAMR_R_QUERY_USERGROUPS - probably a get sam info */ typedef struct r_samr_query_usergroup_info { uint32 ptr_0; /* pointer */ uint32 num_entries; /* number of RID groups */ uint32 ptr_1; /* pointer */ uint32 num_entries2; /* number of RID groups */ DOM_GID *gid; /* group info */ uint32 status; /* return status */ } SAMR_R_QUERY_USERGROUPS; /* SAMR_Q_QUERY_USERINFO - probably a get sam info */ typedef struct q_samr_query_user_info { POLICY_HND pol; /* policy handle associated with unknown id */ uint16 switch_value; /* 0x0015, 0x0011 or 0x0010 - 16 bit unknown */ } SAMR_Q_QUERY_USERINFO; /* SAMR_R_QUERY_USERINFO - probably a get sam info */ typedef struct r_samr_query_user_info { uint32 ptr; /* pointer */ uint16 switch_value; /* 0x0015, 0x0011 or 0x0010 - same as in query */ /* uint8[2] padding. */ union { SAM_USER_INFO_10 *id10; /* auth-level 0x10 */ SAM_USER_INFO_11 *id11; /* auth-level 0x11 */ SAM_USER_INFO_21 *id21; /* auth-level 21 */ void* id; /* to make typecasting easy */ } info; uint32 status; /* return status */ } SAMR_R_QUERY_USERINFO; /**************************************************************************** SAMR_Q_LOOKUP_IDS - do a conversion from name to RID. the policy handle allocated by an "samr open secret" call is associated with a SID. this policy handle is what is queried here, *not* the SID itself. the response to the lookup rids is relative to this SID. *****************************************************************************/ /* SAMR_Q_LOOKUP_IDS */ typedef struct q_samr_lookup_ids_info { POLICY_HND pol; /* policy handle */ uint32 num_sids1; /* number of rids being looked up */ uint32 ptr; /* buffer pointer */ uint32 num_sids2; /* number of rids being looked up */ uint32 ptr_sid[MAX_LOOKUP_SIDS]; /* pointers to sids to be looked up */ DOM_SID2 sid [MAX_LOOKUP_SIDS]; /* sids to be looked up. */ } SAMR_Q_LOOKUP_IDS; /* SAMR_R_LOOKUP_IDS */ typedef struct r_samr_lookup_ids_info { uint32 num_entries; uint32 ptr; /* undocumented buffer pointer */ uint32 num_entries2; uint32 rid[MAX_LOOKUP_SIDS]; /* domain RIDs being looked up */ uint32 status; /* return code */ } SAMR_R_LOOKUP_IDS; /**************************************************************************** SAMR_Q_LOOKUP_NAMES - do a conversion from SID to RID. the policy handle allocated by an "samr open secret" call is associated with a SID. this policy handle is what is queried here, *not* the SID itself. the response to the lookup rids is relative to this SID. *****************************************************************************/ /* SAMR_Q_LOOKUP_NAMES */ typedef struct q_samr_lookup_names_info { POLICY_HND pol; /* policy handle */ uint32 num_rids1; /* number of rids being looked up */ uint32 rid; /* 0x0000 03e8 - RID of the server doing the query? */ uint32 ptr; /* 0x0000 0000 - 32 bit unknown */ uint32 num_rids2; /* number of rids being looked up */ UNIHDR hdr_user_name[MAX_LOOKUP_SIDS]; /* unicode account name header */ UNISTR2 uni_user_name[MAX_LOOKUP_SIDS]; /* unicode account name string */ } SAMR_Q_LOOKUP_NAMES; /* SAMR_R_LOOKUP_NAMES */ typedef struct r_samr_lookup_names_info { uint32 num_entries; uint32 undoc_buffer; /* undocumented buffer pointer */ uint32 num_entries2; DOM_RID3 dom_rid[MAX_LOOKUP_SIDS]; /* domain RIDs being looked up */ uint32 num_entries3; uint32 status; /* return code */ } SAMR_R_LOOKUP_NAMES; /**************************************************************************** SAMR_Q_UNKNOWN_12 - do a conversion from RID groups to something. called to resolve domain RID groups. *****************************************************************************/ /* SAMR_Q_UNKNOWN_12 */ typedef struct q_samr_unknown_12_info { POLICY_HND pol; /* policy handle */ uint32 num_gids1; /* number of rids being looked up */ uint32 rid; /* 0x0000 03e8 - RID of the server doing the query? */ uint32 ptr; /* 0x0000 0000 - 32 bit unknown */ uint32 num_gids2; /* number of rids being looked up */ uint32 gid[MAX_LOOKUP_SIDS]; /* domain RIDs being looked up */ } SAMR_Q_UNKNOWN_12; /**************************************************************************** SAMR_R_UNKNOWN_12 - do a conversion from group RID to names *****************************************************************************/ /* SAMR_R_UNKNOWN_12 */ typedef struct r_samr_unknown_12_info { POLICY_HND pol; /* policy handle */ uint32 num_aliases1; /* number of aliases being looked up */ uint32 ptr_aliases; /* pointer to aliases */ uint32 num_aliases2; /* number of aliases being looked up */ UNIHDR hdr_als_name[MAX_LOOKUP_SIDS]; /* unicode account name header */ UNISTR2 uni_als_name[MAX_LOOKUP_SIDS]; /* unicode account name string */ uint32 num_als_usrs1; /* number of users in aliases being looked up */ uint32 ptr_als_usrs; /* pointer to users in aliases */ uint32 num_als_usrs2; /* number of users in aliases being looked up */ uint32 num_als_usrs[MAX_LOOKUP_SIDS]; /* number of users per group */ uint32 status; } SAMR_R_UNKNOWN_12; /* SAMR_Q_OPEN_USER - probably an open */ typedef struct q_samr_open_user_info { POLICY_HND domain_pol; /* policy handle */ uint32 unknown_0; /* 32 bit unknown - 0x02011b */ uint32 user_rid; /* user RID */ } SAMR_Q_OPEN_USER; /* SAMR_R_OPEN_USER - probably an open */ typedef struct r_samr_open_user_info { POLICY_HND user_pol; /* policy handle associated with unknown id */ uint32 status; /* return status */ } SAMR_R_OPEN_USER; /* SAMR_Q_UNKNOWN_13 - probably an open alias in domain */ typedef struct q_samr_unknown_13_info { POLICY_HND alias_pol; /* policy handle */ uint16 unknown_1; /* 16 bit unknown - 0x0200 */ uint16 unknown_2; /* 16 bit unknown - 0x0000 */ } SAMR_Q_UNKNOWN_13; /* SAMR_Q_UNKNOWN_21 - probably an open group in domain */ typedef struct q_samr_unknown_21_info { POLICY_HND group_pol; /* policy handle */ uint16 unknown_1; /* 16 bit unknown - 0x0477 */ uint16 unknown_2; /* 16 bit unknown - 0x0000 */ } SAMR_Q_UNKNOWN_21; /* SAMR_Q_UNKNOWN_32 - probably a "create SAM entry" */ typedef struct q_samr_unknown_32_info { POLICY_HND pol; /* policy handle */ UNIHDR hdr_mach_acct; /* unicode machine account name header */ UNISTR2 uni_mach_acct; /* unicode machine account name */ uint32 acct_ctrl; /* 32 bit ACB_XXXX */ uint16 unknown_1; /* 16 bit unknown - 0x00B0 */ uint16 unknown_2; /* 16 bit unknown - 0xe005 */ } SAMR_Q_UNKNOWN_32; /* SAMR_R_UNKNOWN_32 - probably a "create SAM entry" */ typedef struct r_samr_unknown_32_info { POLICY_HND pol; /* policy handle */ /* rid4.unknown - fail: 0030 success: 0x03ff */ DOM_RID4 rid4; /* rid and attributes */ uint32 status; /* return status - fail: 0xC000 0099: user exists */ } SAMR_R_UNKNOWN_32; /* SAMR_Q_OPEN_ALIAS - probably an open */ typedef struct q_samr_open_alias_info { uint32 unknown_0; /* 0x0000 0008 */ uint32 rid_alias; /* rid */ } SAMR_Q_OPEN_ALIAS; /* SAMR_R_OPEN_ALIAS - probably an open */ typedef struct r_samr_open_alias_info { POLICY_HND pol; /* policy handle */ uint32 status; /* return status */ } SAMR_R_OPEN_ALIAS; /* SAMR_Q_CONNECT_ANON - probably an open */ typedef struct q_samr_connect_anon_info { uint32 ptr; /* ptr? */ uint16 unknown_0; /* 0x005c */ uint16 unknown_1; /* 0x0001 */ uint32 unknown_2; /* 0x0000 0020 */ } SAMR_Q_CONNECT_ANON; /* SAMR_R_CONNECT_ANON - probably an open */ typedef struct r_samr_connect_anon_info { POLICY_HND connect_pol; /* policy handle */ uint32 status; /* return status */ } SAMR_R_CONNECT_ANON; /* SAMR_Q_CONNECT - probably an open */ typedef struct q_samr_connect_info { uint32 ptr_srv_name; /* pointer (to server name?) */ UNISTR2 uni_srv_name; /* unicode server name starting with '\\' */ uint32 unknown_0; /* 32 bit unknown */ } SAMR_Q_CONNECT; /* SAMR_R_CONNECT - probably an open */ typedef struct r_samr_connect_info { POLICY_HND connect_pol; /* policy handle */ uint32 status; /* return status */ } SAMR_R_CONNECT; /* SAMR_Q_UNKNOWN_38 */ typedef struct q_samr_unknown_38 { uint32 ptr; UNIHDR hdr_srv_name; UNISTR2 uni_srv_name; } SAMR_Q_UNKNOWN_38; /* SAMR_R_UNKNOWN_38 */ typedef struct r_samr_unknown_38 { uint16 unk_0; uint16 unk_1; uint16 unk_2; uint16 unk_3; } SAMR_R_UNKNOWN_38; /* SAMR_ENC_PASSWD */ typedef struct enc_passwd_info { uint32 ptr; uint8 pass[516]; } SAMR_ENC_PASSWD; /* SAMR_ENC_HASH */ typedef struct enc_hash_info { uint32 ptr; uint8 hash[16]; } SAMR_ENC_HASH; /* SAMR_Q_CHGPASSWD_USER */ typedef struct q_samr_chgpasswd_user_info { uint32 ptr_0; UNIHDR hdr_dest_host; /* server name unicode header */ UNISTR2 uni_dest_host; /* server name unicode string */ UNIHDR hdr_user_name; /* username unicode string header */ UNISTR2 uni_user_name; /* username unicode string */ SAMR_ENC_PASSWD nt_newpass; SAMR_ENC_HASH nt_oldhash; uint32 unknown; /* 0x0000 0001 */ SAMR_ENC_PASSWD lm_newpass; SAMR_ENC_HASH lm_oldhash; } SAMR_Q_CHGPASSWD_USER; /* SAMR_R_CHGPASSWD_USER */ typedef struct r_samr_chgpasswd_user_info { uint32 status; /* 0 == OK, C000006A (NT_STATUS_WRONG_PASSWORD) */ } SAMR_R_CHGPASSWD_USER; #endif /* _RPC_SAMR_H */