Lines Matching refs:arg

161 	struct samr_Connect2 arg;  in samr_connect2()  local
166 bzero(&arg, sizeof (struct samr_Connect2)); in samr_connect2()
171 arg.servername = ndr_rpc_malloc(samr_handle, len); in samr_connect2()
172 (void) snprintf((char *)arg.servername, len, "\\\\%s", server); in samr_connect2()
173 arg.access_mask = access_mask; in samr_connect2()
175 if (ndr_rpc_call(samr_handle, opnum, &arg) != 0) { in samr_connect2()
177 } else if (arg.status != 0) { in samr_connect2()
178 status = NT_SC_VALUE(arg.status); in samr_connect2()
180 (void) memcpy(&samr_handle->handle, &arg.handle, in samr_connect2()
201 struct samr_Connect4 arg; in samr_connect4() local
206 bzero(&arg, sizeof (struct samr_Connect4)); in samr_connect4()
211 arg.servername = ndr_rpc_malloc(samr_handle, len); in samr_connect4()
212 (void) snprintf((char *)arg.servername, len, "\\\\%s", server); in samr_connect4()
213 arg.revision = SAMR_REVISION_2; in samr_connect4()
214 arg.access_mask = access_mask; in samr_connect4()
216 if (ndr_rpc_call(samr_handle, opnum, &arg) != 0) { in samr_connect4()
218 } else if (arg.status != 0) { in samr_connect4()
219 status = NT_SC_VALUE(arg.status); in samr_connect4()
221 (void) memcpy(&samr_handle->handle, &arg.handle, in samr_connect4()
248 struct samr_Connect5 arg; in samr_connect5() local
253 bzero(&arg, sizeof (struct samr_Connect5)); in samr_connect5()
258 arg.servername = ndr_rpc_malloc(samr_handle, len); in samr_connect5()
259 (void) snprintf((char *)arg.servername, len, "\\\\%s", server); in samr_connect5()
261 arg.access_mask = SAM_ENUM_LOCAL_DOMAIN; in samr_connect5()
262 arg.unknown2_00000001 = 0x00000001; in samr_connect5()
263 arg.unknown3_00000001 = 0x00000001; in samr_connect5()
264 arg.unknown4_00000003 = 0x00000003; in samr_connect5()
265 arg.unknown5_00000000 = 0x00000000; in samr_connect5()
267 if (ndr_rpc_call(samr_handle, opnum, &arg) != 0) { in samr_connect5()
269 } else if (arg.status != 0) { in samr_connect5()
270 status = NT_SC_VALUE(arg.status); in samr_connect5()
273 (void) memcpy(&samr_handle->handle, &arg.handle, in samr_connect5()
295 struct samr_CloseHandle arg; in samr_close_handle() local
302 bzero(&arg, sizeof (struct samr_CloseHandle)); in samr_close_handle()
303 (void) memcpy(&arg.handle, &samr_handle->handle, sizeof (ndr_hdid_t)); in samr_close_handle()
305 (void) ndr_rpc_call(samr_handle, opnum, &arg); in samr_close_handle()
325 struct samr_OpenDomain arg; in samr_open_domain() local
335 bzero(&arg, sizeof (struct samr_OpenDomain)); in samr_open_domain()
336 (void) memcpy(&arg.handle, &samr_handle->handle, sizeof (ndr_hdid_t)); in samr_open_domain()
338 arg.access_mask = access_mask; in samr_open_domain()
339 arg.sid = sid; in samr_open_domain()
341 if (ndr_rpc_call(samr_handle, opnum, &arg) != 0) { in samr_open_domain()
343 } else if (arg.status != 0) { in samr_open_domain()
344 status = arg.status; in samr_open_domain()
349 (void) memcpy(&domain_handle->handle, &arg.domain_handle, in samr_open_domain()
376 struct samr_OpenUser arg; in samr_open_user() local
384 bzero(&arg, sizeof (struct samr_OpenUser)); in samr_open_user()
385 (void) memcpy(&arg.handle, &domain_handle->handle, in samr_open_user()
387 arg.access_mask = access_mask; in samr_open_user()
388 arg.rid = rid; in samr_open_user()
390 if (ndr_rpc_call(domain_handle, opnum, &arg) != 0) { in samr_open_user()
392 } else if (arg.status != 0) { in samr_open_user()
393 ndr_rpc_status(domain_handle, opnum, arg.status); in samr_open_user()
394 status = NT_SC_VALUE(arg.status); in samr_open_user()
398 (void) memcpy(&user_handle->handle, &arg.user_handle, in samr_open_user()
417 struct samr_DeleteUser arg; in samr_delete_user() local
425 bzero(&arg, sizeof (struct samr_DeleteUser)); in samr_delete_user()
426 (void) memcpy(&arg.user_handle, &user_handle->handle, in samr_delete_user()
429 if (ndr_rpc_call(user_handle, opnum, &arg) != 0) { in samr_delete_user()
431 } else if (arg.status != 0) { in samr_delete_user()
432 ndr_rpc_status(user_handle, opnum, arg.status); in samr_delete_user()
433 status = NT_SC_VALUE(arg.status); in samr_delete_user()
457 struct samr_OpenGroup arg; in samr_open_group() local
465 bzero(&arg, sizeof (struct samr_OpenUser)); in samr_open_group()
466 (void) memcpy(&arg.handle, &domain_handle->handle, in samr_open_group()
468 arg.access_mask = SAM_LOOKUP_INFORMATION | SAM_ACCESS_USER_READ; in samr_open_group()
469 arg.rid = rid; in samr_open_group()
471 if ((rc = ndr_rpc_call(domain_handle, opnum, &arg)) != 0) in samr_open_group()
474 if (arg.status != 0) { in samr_open_group()
475 ndr_rpc_status(domain_handle, opnum, arg.status); in samr_open_group()
480 (void) memcpy(&group_handle->handle, &arg.group_handle, in samr_open_group()
510 struct samr_CreateUser arg; in samr_create_user() local
523 bzero(&arg, sizeof (struct samr_CreateUser)); in samr_create_user()
524 (void) memcpy(&arg.handle, &domain_handle->handle, in samr_create_user()
528 ndr_heap_mkvcs(heap, username, (ndr_vcstr_t *)&arg.username); in samr_create_user()
530 arg.account_flags = account_flags; in samr_create_user()
531 arg.desired_access = 0xE00500B0; in samr_create_user()
533 rc = ndr_rpc_call(domain_handle, opnum, &arg); in samr_create_user()
536 } else if (arg.status != 0) { in samr_create_user()
537 status = NT_SC_VALUE(arg.status); in samr_create_user()
546 (void) memcpy(&user_handle->handle, &arg.user_handle, in samr_create_user()
549 *rid = arg.rid; in samr_create_user()
571 struct samr_LookupDomain arg; in samr_lookup_domain() local
580 bzero(&arg, sizeof (struct samr_LookupDomain)); in samr_lookup_domain()
582 (void) memcpy(&arg.handle, &samr_handle->handle, in samr_lookup_domain()
588 arg.domain_name.length = length; in samr_lookup_domain()
589 arg.domain_name.allosize = length; in samr_lookup_domain()
590 arg.domain_name.str = (unsigned char *)domain_name; in samr_lookup_domain()
592 if (ndr_rpc_call(samr_handle, opnum, &arg) == 0) in samr_lookup_domain()
593 domsid = smb_sid_dup((smb_sid_t *)arg.sid); in samr_lookup_domain()
609 struct samr_EnumLocalDomain arg; in samr_enum_local_domains() local
617 bzero(&arg, sizeof (struct samr_EnumLocalDomain)); in samr_enum_local_domains()
619 (void) memcpy(&arg.handle, &samr_handle->handle, in samr_enum_local_domains()
621 arg.enum_context = 0; in samr_enum_local_domains()
622 arg.max_length = 0x00002000; /* Value used by NT */ in samr_enum_local_domains()
624 if (ndr_rpc_call(samr_handle, opnum, &arg) != 0) { in samr_enum_local_domains()
627 status = NT_SC_VALUE(arg.status); in samr_enum_local_domains()
633 ndr_rpc_status(samr_handle, opnum, arg.status); in samr_enum_local_domains()
653 struct samr_LookupNames arg; in samr_lookup_domain_names() local
665 bzero(&arg, sizeof (struct samr_LookupNames)); in samr_lookup_domain_names()
667 (void) memcpy(&arg.handle, &domain_handle->handle, in samr_lookup_domain_names()
669 arg.n_entry = 1; in samr_lookup_domain_names()
670 arg.max_n_entry = 1000; in samr_lookup_domain_names()
671 arg.index = 0; in samr_lookup_domain_names()
672 arg.total = 1; in samr_lookup_domain_names()
677 arg.name.length = length; in samr_lookup_domain_names()
678 arg.name.allosize = length; in samr_lookup_domain_names()
679 arg.name.str = (unsigned char *)name; in samr_lookup_domain_names()
681 if (ndr_rpc_call(domain_handle, opnum, &arg) != 0) { in samr_lookup_domain_names()
683 } else if (arg.status != NT_STATUS_SUCCESS) { in samr_lookup_domain_names()
684 status = NT_SC_VALUE(arg.status); in samr_lookup_domain_names()
690 ndr_rpc_status(domain_handle, opnum, arg.status); in samr_lookup_domain_names()
692 account->a_type = arg.rid_types.rid_type[0]; in samr_lookup_domain_names()
693 account->a_rid = arg.rids.rid[0]; in samr_lookup_domain_names()
713 struct samr_QueryUserInfo arg; in samr_query_user_info() local
720 bzero(&arg, sizeof (struct samr_QueryUserInfo)); in samr_query_user_info()
722 (void) memcpy(&arg.user_handle, &user_handle->handle, in samr_query_user_info()
724 arg.switch_value = switch_value; in samr_query_user_info()
726 if (ndr_rpc_call(user_handle, opnum, &arg) != 0) in samr_query_user_info()
727 arg.status = RPC_NT_CALL_FAILED; in samr_query_user_info()
729 if (arg.status == 0) in samr_query_user_info()
730 (void) samr_setup_user_info(switch_value, &arg, user_info); in samr_query_user_info()
732 return (arg.status); in samr_query_user_info()
746 struct samr_QueryUserInfo *arg, union samr_user_info *user_info) in samr_setup_user_info() argument
753 info1 = &arg->ru.info1; in samr_setup_user_info()
765 info6 = &arg->ru.info6; in samr_setup_user_info()
774 (char const *)arg->ru.info7.username.str); in samr_setup_user_info()
779 (char const *)arg->ru.info8.fullname.str); in samr_setup_user_info()
783 user_info->info9.group_rid = arg->ru.info9.group_rid; in samr_setup_user_info()
788 arg->ru.info16.UserAccountControl; in samr_setup_user_info()
814 struct samr_QueryUserGroups arg; in samr_query_user_groups() local
823 bzero(&arg, sizeof (struct samr_QueryUserGroups)); in samr_query_user_groups()
825 (void) memcpy(&arg.user_handle, &user_handle->handle, in samr_query_user_groups()
828 rc = ndr_rpc_call(user_handle, opnum, &arg); in samr_query_user_groups()
830 if (arg.info == 0) { in samr_query_user_groups()
833 nbytes = arg.info->n_entry * in samr_query_user_groups()
840 *n_groups = arg.info->n_entry; in samr_query_user_groups()
841 bcopy(arg.info->groups, *groups, nbytes); in samr_query_user_groups()
863 struct samr_GetUserPwInfo arg; in samr_get_user_pwinfo() local
871 bzero(&arg, sizeof (struct samr_GetUserPwInfo)); in samr_get_user_pwinfo()
872 (void) memcpy(&arg.user_handle, &user_handle->handle, in samr_get_user_pwinfo()
875 if (ndr_rpc_call(user_handle, opnum, &arg) != 0) { in samr_get_user_pwinfo()
877 } else if (arg.status != 0) { in samr_get_user_pwinfo()
878 ndr_rpc_status(user_handle, opnum, arg.status); in samr_get_user_pwinfo()
879 status = NT_SC_VALUE(arg.status); in samr_get_user_pwinfo()
905 struct samr_SetUserInfo arg; in samr_set_user_info() local
944 bzero(&arg, sizeof (arg)); in samr_set_user_info()
945 (void) memcpy(&arg.user_handle, &user_handle->handle, in samr_set_user_info()
947 arg.info.info_level = info_level; in samr_set_user_info()
948 arg.info.switch_value = info_level; in samr_set_user_info()
949 (void) memcpy(&arg.info.ru, info_buf, usize); in samr_set_user_info()
951 if (ndr_rpc_call(user_handle, opnum, &arg) != 0) in samr_set_user_info()
952 arg.status = RPC_NT_CALL_FAILED; in samr_set_user_info()
953 else if (arg.status != 0) in samr_set_user_info()
954 ndr_rpc_status(user_handle, opnum, arg.status); in samr_set_user_info()
957 return (arg.status); in samr_set_user_info()
975 struct samr_ChangePasswordUser2 arg; in samr_change_password() local
980 (void) memset(&arg, 0, sizeof (arg)); in samr_change_password()
989 arg.servername = ndr_rpc_malloc(handle, sizeof (samr_string_t)); in samr_change_password()
990 if (arg.servername == NULL) in samr_change_password()
996 arg.servername->length = len; in samr_change_password()
997 arg.servername->allosize = len; in samr_change_password()
998 arg.servername->str = (uint8_t *)slashserver; in samr_change_password()
1000 arg.username = ndr_rpc_malloc(handle, sizeof (samr_string_t)); in samr_change_password()
1001 if (arg.username == NULL) in samr_change_password()
1007 arg.username->length = len; in samr_change_password()
1008 arg.username->allosize = len; in samr_change_password()
1009 arg.username->str = (uint8_t *)account; in samr_change_password()
1011 arg.nt_newpw = newpw; in samr_change_password()
1012 arg.nt_oldpw = oldpw; in samr_change_password()
1014 arg.lm_newpw = &zero_newpw; in samr_change_password()
1015 arg.lm_oldpw = &zero_oldpw; in samr_change_password()
1017 if (ndr_rpc_call(handle, opnum, &arg) != 0) in samr_change_password()
1018 arg.status = RPC_NT_CALL_FAILED; in samr_change_password()
1019 else if (arg.status != 0) in samr_change_password()
1020 ndr_rpc_status(handle, opnum, arg.status); in samr_change_password()
1023 return (arg.status); in samr_change_password()