Source code of Windows XP (NT5)
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

346 lines
7.2 KiB

/*++
Copyright (c) 1997 Microsoft Corporation
Module Name:
dssetp.ch
Abstract:
local funciton prototypes/defines
Author:
Mac McLain (MacM) Feb 10, 1997
Environment:
User Mode
Revision History:
--*/
#ifndef __DSSETP_H__
#define __DSSETP_H__
#include <winldap.h>
#include <dsysdbg.h>
#include <dssetrpc.h>
#include <dns.h>
#include <dsgetdc.h>
#include <lmcons.h>
#include <logonmsv.h>
#define DEB_TRACE_DS 0x00000008
#define DEB_TRACE_UPDATE 0x00000010
#define DEB_TRACE_LOCK 0x00000020
#define DEB_TRACE_SERVICES 0x00000040
#define DEB_TRACE_NET 0x00000080
#if DBG
#ifdef ASSERT
#undef ASSERT
#endif
#define ASSERT DsysAssert
DECLARE_DEBUG2( DsRole )
#define DsRoleDebugOut( args ) DsRoleDebugPrint args
VOID
DsRoleDebugInitialize(
VOID
);
#else
#define DsRoleDebugOut(args)
#define DsRoleDebugInitialize()
#endif // DBG
#define DSROLEP_EVENT_NAME L"\\DsRoleLsaEventName"
#define DSROLEP_PROD_KEY_PATH L"System\\CurrentControlSet\\Control\\ProductOptions"
#define DSROLEP_PROD_VALUE L"ProductType"
#define DSROLEP_SERVER_PRINCIPAL_NAME L"DsRole"
extern handle_t ClientBindingHandle;
//
// Determines whether a bit flag is turned on or not
//
#define FLAG_ON(flag,bits) ((flag) & (bits))
#define FLAG_OFF(flag,bits) (!FLAG_ON(flag,bits))
#define NELEMENTS(x) (sizeof(x)/sizeof((x)[0]))
#define DSROLEP_MIDL_ALLOC_AND_COPY_STRING_ERROR( dest, src, err ) \
if ( (src) ) { \
(dest) = MIDL_user_allocate( (wcslen( (src) ) + 1) * sizeof( WCHAR ) ); \
if ( !(dest) ) { \
err = ERROR_NOT_ENOUGH_MEMORY; \
} else { \
wcscpy((dest), (src)); \
} \
} else { \
(dest) = NULL; \
}
//
// Options for specifiying the behavior of the path validation function
//
#define DSROLEP_PATH_VALIDATE_EXISTENCE 0x00000001
#define DSROLEP_PATH_VALIDATE_LOCAL 0x00000002
#define DSROLEP_PATH_VALIDATE_NTFS 0x00000004
typedef enum _DSROLEP_MACHINE_TYPE {
DSROLEP_MT_CLIENT = 0,
DSROLEP_MT_STANDALONE,
DSROLEP_MT_MEMBER
} DSROLEP_MACHINE_TYPE, *PDSROLEP_MACHINE_TYPE;
//
// Utility functions
//
DWORD
DsRolepDecryptPassword(
IN PUNICODE_STRING EncryptedPassword,
IN OUT PUNICODE_STRING DecryptedPassword,
OUT PUCHAR Seed
);
DWORD
DsRolepGetMachineType(
IN OUT PDSROLEP_MACHINE_TYPE MachineType );
NTSTATUS
DsRolepInitialize(
VOID
);
NTSTATUS
DsRolepInitializePhase2(
VOID
);
DWORD
DsRolepSetProductType(
IN DSROLEP_MACHINE_TYPE MachineType
);
DWORD
DsRolepCreateAuthIdentForCreds(
IN PWSTR Account,
IN PWSTR Password,
OUT PSEC_WINNT_AUTH_IDENTITY *AuthIdent
);
VOID
DsRolepFreeAuthIdentForCreds(
IN PSEC_WINNT_AUTH_IDENTITY AuthIdent
);
DWORD
DsRolepForceTimeSync(
IN HANDLE ImpToken,
IN PWSTR TimeSource
);
DWORD
DsRolepDnsNameToFlatName(
IN LPWSTR DnsName,
OUT LPWSTR *FlatName,
OUT PULONG StatusFlag
);
DWORD
DsRolepValidatePath(
IN LPWSTR Path,
IN ULONG ValidationCriteria,
OUT PULONG MatchingCriteria
);
DWORD
DsRolepCopyDsDitFiles(
IN LPWSTR DsPath
);
DWORD
DsRolepSetDcSecurity(
IN HANDLE ClientToken,
IN LPWSTR SysvolRootPath,
IN LPWSTR DsDatabasePath,
IN LPWSTR DsLogPath,
IN BOOLEAN Upgrade,
IN BOOLEAN Replica
);
DWORD
DsRolepDsGetDcForAccount(
IN LPWSTR Server OPTIONAL,
IN LPWSTR Domain,
IN LPWSTR Account,
IN ULONG Flags,
IN ULONG AccountBits,
OUT PDOMAIN_CONTROLLER_INFOW *DomainControllerInfo
);
DWORD
DsRolepSetMachineAccountType(
IN LPWSTR Dc,
IN HANDLE ClientToken,
IN LPWSTR User,
IN LPWSTR Password,
IN LPWSTR AccountName,
IN ULONG AccountBits,
IN OUT WCHAR** AccountDn OPTIONAL
);
NTSTATUS
DsRolepGetMixedModeFlags(
IN PSID DomainSid,
OUT PULONG Flags
);
//
// Prototype from protos.h
//
ULONG
SpmpReportEvent(
IN BOOL Unicode,
IN WORD EventType,
IN ULONG EventId,
IN ULONG Category,
IN ULONG SizeOfRawData,
IN PVOID RawData,
IN ULONG NumberOfStrings,
...
);
DWORD
DsRolepGenerateRandomPassword(
IN ULONG Length,
IN WCHAR *Buffer
);
DWORD
DsRolepDelnodePath(
IN LPWSTR Path,
IN ULONG BufferSize,
IN BOOLEAN DeleteRoot
);
DWORD
DsRolepIsDnsNameChild(
IN LPWSTR ParentDnsName,
IN LPWSTR ChildDnsName
);
DWORD
ImpDsRolepDsGetDcForAccount(
IN HANDLE CallerToken,
IN LPWSTR Server OPTIONAL,
IN LPWSTR Domain,
IN LPWSTR Account,
IN ULONG Flags,
IN ULONG AccountBits,
OUT PDOMAIN_CONTROLLER_INFOW *DomainControllerInfo
);
NET_API_STATUS
NET_API_FUNCTION
ImpNetpManageIPCConnect(
IN HANDLE CallerToken,
IN LPWSTR lpServer,
IN LPWSTR lpAccount,
IN LPWSTR lpPassword,
IN ULONG fOptions
);
NTSTATUS
ImpLsaOpenPolicy(
IN HANDLE CallerToken,
IN PLSA_UNICODE_STRING SystemName OPTIONAL,
IN PLSA_OBJECT_ATTRIBUTES ObjectAttributes,
IN ACCESS_MASK DesiredAccess,
IN OUT PLSA_HANDLE PolicyHandle
);
NTSTATUS
ImpLsaDelete(
IN HANDLE CallerToken,
IN LSA_HANDLE ObjectHandle
);
NTSTATUS
ImpLsaQueryInformationPolicy(
IN HANDLE CallerToken,
IN LSA_HANDLE PolicyHandle,
IN POLICY_INFORMATION_CLASS InformationClass,
OUT PVOID *Buffer
);
NTSTATUS
ImpLsaOpenTrustedDomainByName(
IN HANDLE CallerToken,
IN LSA_HANDLE PolicyHandle,
IN PLSA_UNICODE_STRING TrustedDomainName,
IN ACCESS_MASK DesiredAccess,
OUT PLSA_HANDLE TrustedDomainHandle
);
NTSTATUS
ImpLsaOpenTrustedDomain(
IN HANDLE CallerToken,
IN LSA_HANDLE PolicyHandle,
IN PSID TrustedDomainSid,
IN ACCESS_MASK DesiredAccess,
OUT PLSA_HANDLE TrustedDomainHandle
);
NTSTATUS
ImpLsaCreateTrustedDomainEx(
IN HANDLE CallerToken,
IN LSA_HANDLE PolicyHandle,
IN PTRUSTED_DOMAIN_INFORMATION_EX TrustedDomainInformation,
IN PTRUSTED_DOMAIN_AUTH_INFORMATION AuthenticationInformation,
IN ACCESS_MASK DesiredAccess,
OUT PLSA_HANDLE TrustedDomainHandle
);
NTSTATUS
ImpLsaQueryTrustedDomainInfoByName(
IN HANDLE CallerToken,
IN LSA_HANDLE PolicyHandle,
IN PLSA_UNICODE_STRING TrustedDomainName,
IN TRUSTED_INFORMATION_CLASS InformationClass,
OUT PVOID *Buffer
);
NTSTATUS
ImpLsaQueryDomainInformationPolicy(
IN HANDLE CallerToken,
IN LSA_HANDLE PolicyHandle,
IN POLICY_DOMAIN_INFORMATION_CLASS InformationClass,
OUT PVOID *Buffer
);
NTSTATUS
ImpLsaClose(
IN HANDLE CallerToken,
IN LSA_HANDLE ObjectHandle
);
#endif // __DSSETP_H__