/* * CDDL HEADER START * * The contents of this file are subject to the terms of the * Common Development and Distribution License (the "License"). * You may not use this file except in compliance with the License. * * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE * or http://www.opensolaris.org/os/licensing. * See the License for the specific language governing permissions * and limitations under the License. * * When distributing Covered Code, include this CDDL HEADER in each * file and include the License file at usr/src/OPENSOLARIS.LICENSE. * If applicable, add the following below this CDDL HEADER, with the * fields enclosed by brackets "[]" replaced with your own identifying * information: Portions Copyright [yyyy] [name of copyright owner] * * CDDL HEADER END */ /* * Copyright 2009 Sun Microsystems, Inc. All rights reserved. * Use is subject to license terms. */ #ifndef _MLSVC_LANMAN_NDL_ #define _MLSVC_LANMAN_NDL_ /* * LanMan RPC (WKSSVC and SRVSVC) interface definitions. */ #include "ndrtypes.ndl" /* * WARNING: The cpp(1) macros in this file are not understood by * /usr/bin/cpp. Use /usr/libexec/cpp instead. */ /* * TYPE CONSTRUCTOR MACROS FOR INFORMATION RESULTS **************************************************************** * * This is an explanation of the macros that follow this comment. * * The LANMAN API's look something like this: * * NetXXXGetInfo ( * IN char * servername, * IN char * XXX_name, * IN int level, * OUT char ** bufptr); * * The bufptr is a pointer-to-pointer (**). The NetXXXGetInfo() function * malloc()s memory, and sets *bufptr to the memory. The API's * are undiscriminated about what bufptr really points to. * * However, for RPI (Remote Procedure Interface), this just won't fly. * We have to know what the result data looks like in order to * properly (un)marshall it. * * As best we can determine, the MSC developers use an RPI that looks * like this (approximately in IDL): * * RemoteNetXXXGetInfo ( * IN char * servername, * IN char * XXX_name, * IN int level, * OUT union switch(level) { * case(1): XXX_INFO_1 * info1; * case(2): XXX_INFO_2 * info2; * } bufptr); * * The level guides the (un)marshalling as it follows the pointer. * DCE(MS) IDL will automatically form a structure for the union * which looks about like this (much as Sun/RPC does): * * struct { * int _keyvalue_; * union { * XXX_INFO_1 *info1; * XXX_INFO_2 *info2; * } _u_; * } bufptr; * * This struct is not made visible to the application. It is purely * an internal (automagic) thing. However, ndrgen does not do this. * The ndrgen input MUST remain a valid C header file, and all * struct and union declarations must be exact, and we (would) have * to tediously code sequences like this (approximately NDL)): * * union XXXGetInfo_result_u { * [case(1)] * XXX_INFO_1 * info1; * [case(2)] * XXX_INFO_2 * info2; * }; * * struct XXXGetInfo_result { * int level; * * union XXXGetInfo_result_u bufptr; * }; * * struct XXXGetInfo_param { // still have to code this one * [in] char * servername; * [in] ushort level; * [out] struct XXXGetInfo_result result; * }; * * This is error prone and difficult to write, and more difficult * and distracting to read. It is hard to pick through the * necessary evils and see what's really going on. To mitigate * the situation, we have a series of macros which generate * the tedious code, and are easily recognized as supporting * fluff rather than important structures: * * INFO1RES_DEFINITION(XXXGetInfo, * INFO1RES_UNION_ENTRY(XXXGetInfo, 1) * INFO1RES_UNION_ENTRY(XXXGetInfo, 2)) * * structt XXXGetInfo_param { // still have to code this one * [in] char * servername; * [in] ushort level; * [out] struct XXXGetInfo_result result; * }; * * The INFO1RES_DEFINITION macro defines two types: * * union ...__ru {...} * struct ..._result { DWORD level; union ..._ru bufptr; } * * There is a similar macro, INFO1RESBUF_DEFINITION, which defines * actual space rather than just pointers. It defines: * * union ...._rb {...} * typedef union ..._rb ..._rb; * * Which is handy in functions because the initial coding sequence * looks something like: * * XXXGetInfoParam (struct XXXGetInfo_param *param) { * XXXGetInfo_rb rb; * * param->result.level = param->level; // for marshalling * param->result.bufptr.nullptr = &rb; // anything fits * * There are two flavors of Info results. The first is the * single XXX_INFO_x result, which the foregoing example * uses. The second flavor is when there are multiple entries * possible. Again, for the sake of guiding the marshalling, * the RPIs use something accommodating: * * struct XXX_INFO_1_result { * unsigned entriesread; * [size_is(entriesread)] * XXX_INFO_1 * table; * }; * * union { XXX_INFO_1_result *info1; ...} * * Notice this is using XXX_INFO_1_result rather than just XXX_INFO_1. * The requirements from this point are much like before. Because of * the variable-length value, there is no realistic way to do something * like INFO1RESBUF_DEFINITION. * * There are two sets of macros here. INFO1RES_xxx are for the * single result case, and INFONRES_xxx for the multiple entry case. */ /* * INFO1RES_... * Type constructors for single-result case */ #define INFO1RES_DEFINITION(INFOPREF, ENTRIES) \ INFO1RES_UNION(INFOPREF, ENTRIES) \ INFO1RES_STRUCT(INFOPREF) #define INFO1RES_UNION(INFOPREF, ENTRIES) \ union INFOPREF##__ru { \ INFO1RES_UNION_NULLPTR \ ENTRIES \ }; #define INFO1RES_UNION_NULLPTR \ DEFAULT char * nullptr; #define INFO1RES_UNION_ENTRY(INFOPREF,NUM) \ CASE(NUM) struct INFOPREF##_##NUM * bufptr##NUM; #define INFO1RES_STRUCT(INFOPREF) \ struct INFOPREF##_result { \ DWORD level; \ SWITCH(level) \ union INFOPREF##__ru bufptr; \ }; /* * INFO1RESBUF_... * Type constructors for single-result buffering. */ #ifndef NDRGEN #define INFO1RESBUF_DEFINITION(INFOPREF, ENTRIES) \ typedef union INFOPREF##_rb { \ ENTRIES \ } INFOPREF##_rb; #define INFO1RESBUF_UNION_ENTRY(INFOPREF,NUM) \ CASE(NUM) struct INFOPREF##_##NUM buf##NUM; #else #define INFO1RESBUF_DEFINITION(INFOPREF, ENTRIES) #define INFO1RESBUF_UNION_ENTRY(INFOPREF,NUM) #endif /* * INFONRES_... * Type constructors for multiple-result case */ #define INFONRES_RESULT(INFOPREF,NUM) \ struct INFOPREF##_##NUM##_result { \ DWORD entriesread; \ SIZE_IS(entriesread) \ struct INFOPREF##_##NUM *entries; \ }; #define INFONRES_DEFINITION(INFOPREF, ENTRIES) \ INFONRES_UNION(INFOPREF, ENTRIES) \ INFONRES_STRUCT(INFOPREF) #define INFONRES_UNION(INFOPREF, ENTRIES) \ union INFOPREF##__ru { \ INFONRES_UNION_NULLPTR \ INFONRES_UNION_INFONRES \ ENTRIES \ }; #define INFONRES_UNION_NULLPTR \ DEFAULT char * nullptr; #ifndef NDRGEN #define INFONRES_UNION_INFONRES \ struct mslm_infonres * p; #else #define INFONRES_UNION_INFONRES #endif #define INFONRES_UNION_ENTRY(INFOPREF,NUM) \ CASE(NUM) struct INFOPREF##_##NUM##_result * bufptr##NUM; #define INFONRES_STRUCT(INFOPREF) \ struct INFOPREF##_result { \ DWORD level; \ SWITCH(level) \ union INFOPREF##__ru bufptr; \ }; #ifndef NDRGEN /* * This just makes things a little easier on the stub modules: * * XXXGetInfoParam (struct XXXGetInfo_param *param) { * struct mslm_infonres infonres; * * infonres.entriesread = 0; * infonres.entries = 0; * param->result.level = param->level; // for marshalling * param->result.bufptr.p = &infonres; */ struct mslm_infonres { DWORD entriesread; void * entries; }; #endif /* * SRVSVC - Server Service */ /* Windows NT */ #define SRVSVC_OPNUM_NetCharDevEnum 0x00 #define SRVSVC_OPNUM_NetCharDevGetInfo 0x01 #define SRVSVC_OPNUM_NetCharDevControl 0x02 #define SRVSVC_OPNUM_NetCharDevQEnum 0x03 #define SRVSVC_OPNUM_NetCharDevQGetInfo 0x04 #define SRVSVC_OPNUM_NetCharDevQSetInfo 0x05 #define SRVSVC_OPNUM_NetCharDevQPurge 0x06 #define SRVSVC_OPNUM_NetCharDevQPurgeSelf 0x07 #define SRVSVC_OPNUM_NetConnectEnum 0x08 #define SRVSVC_OPNUM_NetFileEnum 0x09 #define SRVSVC_OPNUM_NetFileGetInfo 0x0a #define SRVSVC_OPNUM_NetFileClose 0x0b #define SRVSVC_OPNUM_NetSessionEnum 0x0c #define SRVSVC_OPNUM_NetSessionDel 0x0d #define SRVSVC_OPNUM_NetShareAdd 0x0e #define SRVSVC_OPNUM_NetShareEnum 0x0f #define SRVSVC_OPNUM_NetShareGetInfo 0x10 #define SRVSVC_OPNUM_NetShareSetInfo 0x11 #define SRVSVC_OPNUM_NetShareDel 0x12 #define SRVSVC_OPNUM_NetShareDelSticky 0x13 #define SRVSVC_OPNUM_NetShareCheck 0x14 #define SRVSVC_OPNUM_NetServerGetInfo 0x15 #define SRVSVC_OPNUM_NetServerSetInfo 0x16 #define SRVSVC_OPNUM_NetServerDiskEnum 0x17 #define SRVSVC_OPNUM_NetServerStatisticsGet 0x18 #define SRVSVC_OPNUM_NetServerTransportAdd 0x19 #define SRVSVC_OPNUM_NetServerTransportEnum 0x1a #define SRVSVC_OPNUM_NetServerTransportDel 0x1b #define SRVSVC_OPNUM_NetRemoteTOD 0x1c #define SRVSVC_OPNUM_NetServerSetServiceBits 0x1d #define SRVSVC_OPNUM_NetPathType 0x1e #define SRVSVC_OPNUM_NetPathCanonicalize 0x1f #define SRVSVC_OPNUM_NetPathCompare 0x20 #define SRVSVC_OPNUM_NetNameValidate 0x21 #define SRVSVC_OPNUM_NetNameCanonicalize 0x22 #define SRVSVC_OPNUM_NetNameCompare 0x23 #define SRVSVC_OPNUM_NetShareEnumSticky 0x24 #define SRVSVC_OPNUM_NetShareDelStart 0x25 #define SRVSVC_OPNUM_NetShareDelCommit 0x26 #define SRVSVC_OPNUM_NetGetFileSecurity 0x27 #define SRVSVC_OPNUM_NetSetFileSecurity 0x28 #define SRVSVC_OPNUM_NetServerTransportAddEx 0x29 #define SRVSVC_OPNUM_NetServerSetServiceBitsEx 0x2a #define SRVSVC_OPNUM_NetDfsGetVersion 0x2b /* Windows 2000 */ #define SRVSVC_OPNUM_NetDfsCreateLocalPartition 0x2c #define SRVSVC_OPNUM_NetDfsDeleteLocalPartition 0x2d #define SRVSVC_OPNUM_NetDfsSetLocalVolumeState 0x2e #define SRVSVC_OPNUM_NetDfsSetServerInfo 0x2f #define SRVSVC_OPNUM_NetDfsCreateExitPoint 0x30 #define SRVSVC_OPNUM_NetDfsDeleteExitPoint 0x31 #define SRVSVC_OPNUM_NetDfsModifyPrefix 0x32 #define SRVSVC_OPNUM_NetDfsFixLocalVolume 0x33 #define SRVSVC_OPNUM_NetDfsManagerReportSiteInfo 0x34 /* Windows XP and Windows Server 2003 */ #define SRVSVC_OPNUM_NetServerTransportDelEx 0x35 /* Windows Vista */ #define SRVSVC_OPNUM_NetServerAliasAdd 0x36 #define SRVSVC_OPNUM_NetServerAliasEnum 0x37 #define SRVSVC_OPNUM_NetServerAliasDel 0x38 #define SRVSVC_OPNUM_NetShareDelEx 0x39 /* *********************************************************************** * NetConnectEnum *********************************************************************** */ /* * Level 0 connect information. */ struct mslm_NetConnectInfoBuf0 { DWORD coni0_id; }; typedef struct mslm_NetConnectInfoBuf0 srvsvc_NetConnectInfoBuf0_t; struct mslm_NetConnectInfo0 { DWORD entries_read; SIZE_IS(entries_read) struct mslm_NetConnectInfoBuf0 *ci0; }; typedef struct mslm_NetConnectInfo0 srvsvc_NetConnectInfo0_t; /* * Level 1 connect information. */ struct mslm_NetConnectInfoBuf1 { DWORD coni1_id; DWORD coni1_type; DWORD coni1_num_opens; DWORD coni1_num_users; DWORD coni1_time; LPTSTR coni1_username; LPTSTR coni1_netname; /* share name */ }; typedef struct mslm_NetConnectInfoBuf1 srvsvc_NetConnectInfoBuf1_t; struct mslm_NetConnectInfo1 { DWORD entries_read; SIZE_IS(entries_read) struct mslm_NetConnectInfoBuf1 *ci1; }; typedef struct mslm_NetConnectInfo1 srvsvc_NetConnectInfo1_t; union mslm_NetConnectInfoResUnion { CASE(0) struct mslm_NetConnectInfo0 *info0; CASE(1) struct mslm_NetConnectInfo1 *info1; DEFAULT char *nullptr; }; struct mslm_NetConnectInfo { DWORD level; DWORD switch_value; SWITCH(switch_value) union mslm_NetConnectInfoResUnion ru; }; typedef struct mslm_NetConnectInfo srvsvc_NetConnectInfo_t; OPERATION(SRVSVC_OPNUM_NetConnectEnum) struct mslm_NetConnectEnum { IN LPTSTR servername; IN LPTSTR qualifier; /* share name */ INOUT struct mslm_NetConnectInfo info; IN DWORD pref_max_len; OUT DWORD total_entries; INOUT DWORD *resume_handle; OUT DWORD status; }; /* *********************************************************************** * NetFileEnum *********************************************************************** */ struct mslm_NetFileInfoBuf2 { DWORD fi2_id; }; typedef struct mslm_NetFileInfoBuf2 srvsvc_NetFileInfoBuf2_t; struct mslm_NetFileInfo2 { DWORD entries_read; SIZE_IS(entries_read) struct mslm_NetFileInfoBuf2 *fi2; }; typedef struct mslm_NetFileInfo2 srvsvc_NetFileInfo2_t; struct mslm_NetFileInfoBuf3 { DWORD fi3_id; DWORD fi3_permissions; DWORD fi3_num_locks; LPTSTR fi3_pathname; LPTSTR fi3_username; }; typedef struct mslm_NetFileInfoBuf3 srvsvc_NetFileInfoBuf3_t; struct mslm_NetFileInfo3 { DWORD entries_read; SIZE_IS(entries_read) struct mslm_NetFileInfoBuf3 *fi3; }; typedef struct mslm_NetFileInfo3 srvsvc_NetFileInfo3_t; union mslm_NetFileInfoResUnion { CASE(2) struct mslm_NetFileInfo2 *info2; CASE(3) struct mslm_NetFileInfo3 *info3; DEFAULT char *nullptr; }; struct mslm_NetFileInfo { DWORD level; DWORD switch_value; SWITCH(switch_value) union mslm_NetFileInfoResUnion ru; }; OPERATION(SRVSVC_OPNUM_NetFileEnum) struct mslm_NetFileEnum { IN LPTSTR servername; IN DWORD basepath; IN DWORD username; INOUT struct mslm_NetFileInfo info; IN DWORD pref_max_len; OUT DWORD total_entries; INOUT DWORD *resume_handle; OUT DWORD status; }; /* *********************************************************************** * NetFileClose * * Close files using a file id reported by NetFileEnum. *********************************************************************** */ OPERATION(SRVSVC_OPNUM_NetFileClose) struct mslm_NetFileClose { IN LPTSTR servername; IN DWORD file_id; OUT DWORD status; }; /* *********************************************************************** * NetShareGetInfo/NetShareSetInfo: netname is the name of a share. * * Levels: * 0 The share name. * 1 Information about the shared resource: name, type of resource * and a comment. * 2 Information about the shared resource: name, type, permissions, * password and number of connections. * 501 Information about the shared resource: name, type of resource * and a comment. * 502 Information about the shared resource, including the name, type, * permissions, number of connections etc. * 503 Contains information about the shared resource; identical to 502 * except for the addition of a servername. * 1004 A comment for the shared resource. * 1005 A set of flags describing the shared resource. * 1006 The maximum number of concurrent connections that the shared * resource can accommodate. * 1501 Specifies the SECURITY_DESCRIPTOR for the share. * * Windows Me/98/95 supports level 50, which is similar to level 1. * * shi1005_flags: SHI1005_VALID_FLAGS_SET defines the set of flags that * can be set with the NetShareSetInfo function. SHI1005_FLAGS_DFS and * SHI1005_FLAGS_DFS_ROOT can only be returned, but not set. * * 0x01 SHI1005_FLAGS_DFS * The specified share is present in a Dfs tree structure. * This flag cannot be set with NetShareSetInfo. * * 0x02 SHI1005_FLAGS_DFS_ROOT * The specified share is the root volume in a Dfs tree. * This flag cannot be set with NetShareSetInfo. * * 0x30 CSC_MASK Client-side caching (CSC) state: * 0x00 CSC_CACHE_MANUAL_REINT Automatic file-by-file * reintegration not allowed. * 0x10 CSC_CACHE_AUTO_REINT File-by-file reintegration allowed. * 0x20 CSC_CACHE_VDO File opens do not need to be flowed. * 0x30 CSC_CACHE_NONE CSC is disabled for this share. * * 0x0100 SHI1005_FLAGS_RESTRICT_EXCLUSIVE_OPENS * The specified share disallows exclusive file opens, * where reads to an open file are disallowed. * * 0x0200 SHI1005_FLAGS_FORCE_SHARED_DELETE * Shared files in the specified share can be forcibly deleted. * * 0x0400 SHI1005_FLAGS_ALLOW_NAMESPACE_CACHING * Clients are allowed to cache the namespace of the share. * * 0x0800 SHI1005_FLAGS_ACCESS_BASED_DIRECTORY_ENUM * The server will filter directory entries based on the access * permissions of the client. The access-based enumeration (ABE) * flag may also appear as SHI1005_FLAGS_ENFORCE_NAMESPACE_ACCESS. * * Support for Access-based Enumeration (ABE) was added to Windows in * Windows Server 2003 Service Pack 1. ABE filters directory contents * (and other shared resources) returned via a share based on a user's * access rights, i.e. a user would not see objects that are * inaccessible to that user. ABE requests are made using info level * 1005 with the value 0x0800 in the flags field. *********************************************************************** */ #define CSC_MASK 0x30 #define CSC_CACHE_MANUAL_REINT 0x00 #define CSC_CACHE_AUTO_REINT 0x10 #define CSC_CACHE_VDO 0x20 #define CSC_CACHE_NONE 0x30 #define MLSM_SID_AUTH_MAX 6 /* * Definition for a SID. The ndl compiler does not allow a typedef of * a structure containing variable size members. */ struct mslm_sid { BYTE revision; BYTE sub_auth_count; BYTE authority[MLSM_SID_AUTH_MAX]; SIZE_IS(sub_auth_count) DWORD sub_authority[ANY_SIZE_ARRAY]; }; struct mslm_ace_hdr { BYTE type; BYTE flags; WORD size; }; typedef struct mslm_ace_hdr mslm_ace_hdr_t; struct mslm_ace { mslm_ace_hdr_t header; DWORD mask; struct mslm_sid *sid; }; typedef struct mslm_ace mslm_ace_t; struct mslm_acl { BYTE revision; BYTE sbz1; WORD size; WORD ace_count; WORD sbz2; SIZE_IS(ace_count) mslm_ace_t ace[ANY_SIZE_ARRAY]; }; /* * SRVSVC definition of a security_descriptor. */ struct mslm_security_descriptor { BYTE revision; BYTE sbz1; WORD control; DWORD offset_owner; DWORD offset_group; DWORD offset_sacl; DWORD offset_dacl; struct mslm_sid *owner; struct mslm_sid *group; struct mslm_acl *sacl; struct mslm_acl *dacl; }; typedef struct mslm_security_descriptor mslm_security_descriptor_t; struct mslm_NetShareInfo_0 { LPTSTR shi0_netname; }; struct mslm_NetShareInfo_1 { LPTSTR shi1_netname; DWORD shi1_type; /* type of resource such as IPC$ */ LPTSTR shi1_comment; }; struct mslm_NetShareInfo_2 { LPTSTR shi2_netname; DWORD shi2_type; LPTSTR shi2_comment; DWORD shi2_permissions; DWORD shi2_max_uses; DWORD shi2_current_uses; LPTSTR shi2_path; LPTSTR shi2_passwd; }; struct mslm_NetShareInfo_501 { LPTSTR shi501_netname; DWORD shi501_type; LPTSTR shi501_comment; DWORD shi501_flags; }; struct mslm_NetShareInfo_502 { LPTSTR shi502_netname; DWORD shi502_type; LPTSTR shi502_comment; DWORD shi502_permissions; DWORD shi502_max_uses; DWORD shi502_current_uses; LPTSTR shi502_path; LPTSTR shi502_passwd; DWORD shi502_reserved; SIZE_IS(shi502_reserved) LPBYTE shi502_security_descriptor; }; struct mslm_NetShareInfo_503 { LPTSTR shi503_netname; DWORD shi503_type; LPTSTR shi503_comment; DWORD shi503_permissions; DWORD shi503_max_uses; DWORD shi503_current_uses; LPTSTR shi503_path; LPTSTR shi503_passwd; LPTSTR shi503_servername; DWORD shi503_reserved; SIZE_IS(shi503_reserved) LPBYTE shi503_security_descriptor; }; struct mslm_NetShareInfo_1004 { LPTSTR shi1004_comment; }; struct mslm_NetShareInfo_1005 { DWORD shi1005_flags; }; struct mslm_NetShareInfo_1006 { DWORD shi1006_max_uses; }; struct mslm_NetShareInfo_1501 { DWORD shi1501_reserved; SIZE_IS(shi1501_reserved) LPBYTE shi1501_security_descriptor; }; union mlsm_NetShareInfoResUnion { CASE(0) struct mslm_NetShareInfo_0 *info0; CASE(1) struct mslm_NetShareInfo_1 *info1; CASE(2) struct mslm_NetShareInfo_2 *info2; CASE(501) struct mslm_NetShareInfo_501 *info501; CASE(502) struct mslm_NetShareInfo_502 *info502; CASE(503) struct mslm_NetShareInfo_503 *info503; CASE(1004) struct mslm_NetShareInfo_1004 *info1004; CASE(1005) struct mslm_NetShareInfo_1005 *info1005; CASE(1006) struct mslm_NetShareInfo_1006 *info1006; CASE(1501) struct mslm_NetShareInfo_1501 *info1501; DEFAULT char *nullptr; }; struct mlsm_NetShareInfoRes { DWORD switch_value; SWITCH(switch_value) union mlsm_NetShareInfoResUnion ru; }; OPERATION(SRVSVC_OPNUM_NetShareGetInfo) struct mlsm_NetShareGetInfo { IN LPTSTR servername; IN REFERENCE LPTSTR netname; IN DWORD level; OUT struct mlsm_NetShareInfoRes result; OUT DWORD status; }; OPERATION(SRVSVC_OPNUM_NetShareSetInfo) struct mlsm_NetShareSetInfo { IN LPTSTR servername; IN REFERENCE LPTSTR netname; IN DWORD level; IN struct mlsm_NetShareInfoRes result; INOUT DWORD *parm_err; OUT DWORD status; }; /* *********************************************************************** * NetSessionEnum * * The NetSessionEnum function provides information about sessions * established on a server. * * Only members of the Administrators or Account Operators local groups * can successfully execute the NetSessionEnum function at level 1 or * level 2. No special group membership is required for level 0 or level * 10 calls. * * Windows NT/2000/XP: The parameter order is as follows. * * NET_API_STATUS NetSessionEnum(LPWSTR servername, * LPWSTR UncClientName, * LPWSTR username, * DWORD level, * LPBYTE *bufptr, * DWORD prefmaxlen, * LPDWORD entriesread, * LPDWORD totalentries, * LPDWORD resume_handle); * * Windows 95/98/Me: The calling application must use the cbBuffer parameter * to specify the size, in bytes, of the information buffer pointed to by the * pbBuffer parameter. (The cbBuffer parameter replaces the prefmaxlen * parameter.) Neither a user name parameter nor a resume handle parameter is * available on this platform. Therefore, the parameter list is as follows. * * API_FUNCTION NetSessionEnum(const char FAR *pszServer, * short sLevel, * char FAR *pbBuffer, * unsigned short cbBuffer, * unsigned short FAR *pcEntriesRead, * unsigned short FAR *pcTotalAvail); * * Parameters * * servername * [in] Pointer to a string that specifies the DNS or NetBIOS name of the * remote server on which the function is to execute. If this parameter is * NULL, the local computer is used. * Windows NT 4.0 and earlier: This string must begin with \\. * * UncClientName * [in] Pointer to a string that specifies the name of the computer session * for which information is to be returned. If this parameter is NULL, * NetSessionEnum returns information for all computer sessions on the server. * * username * [in] Pointer to a string that specifies the name of the user for which * information is to be returned. If this parameter is NULL, NetSessionEnum * returns information for all users. * * level * [in] Specifies the information level of the data. This parameter can be * one of the following values. * Windows NT/2000/XP: The following levels are valid. * Value Meaning * 0 Return the name of the computer that established the session. * The bufptr parameter points to an array of SESSION_INFO_0 * structures. * 1 Return the name of the computer, name of the user, and open files, * pipes, and devices on the computer. The bufptr parameter points to * an array of SESSION_INFO_1 structures. * 2 In addition to the information indicated for level 1, return the * type of client and how the user established the session. The bufptr * parameter points to an array of SESSION_INFO_2 structures. * 10 Return the name of the computer, name of the user, and active and * idle times for the session. The bufptr parameter points to an array * of SESSION_INFO_10 structures. * 502 Return the name of the computer; name of the user; open files, * pipes, and devices on the computer; and the name of the transport * the client is using. The bufptr parameter points to an array of * SESSION_INFO_502 structures. * * Windows 95/98/Me: The following level is valid. * Value Meaning * 50 Return the name of the computer, name of the user, open files on * the computer, and the name of the transport protocol the client is * using. The pbBuffer parameter points to an array of session_info_50 * structures. * * bufptr * [out] Pointer to the buffer that receives the data. The format of this * data depends on the value of the level parameter. * Windows NT/2000/XP: This buffer is allocated by the system and must be * freed using the NetApiBufferFree function. Note that you must free the * buffer even if the function fails with ERROR_MORE_DATA. * Windows 95/98/Me: The caller must allocate and deallocate this buffer. * * prefmaxlen * [in] Specifies the preferred maximum length of returned data, in bytes. * If you specify MAX_PREFERRED_LENGTH, the function allocates the amount * of memory required for the data. If you specify another value in this * parameter, it can restrict the number of bytes that the function returns. * If the buffer size is insufficient to hold all entries, the function * returns ERROR_MORE_DATA. For more information, see Network Management * Function Buffers and Network Management Function Buffer Lengths. * * entriesread * [out] Pointer to a value that receives the count of elements actually * enumerated. * * totalentries * [out] Pointer to a value that receives the total number of entries that * could have been enumerated from the current resume position. * * resume_handle * [in/out] Pointer to a value that contains a resume handle which is used * to continue an existing session search. The handle should be zero on the * first call and left unchanged for subsequent calls. If resume_handle is * NULL, no resume handle is stored. * * * SESSION_INFO_1 * ============== * The SESSION_INFO_1 structure contains information about the session, * including name of the computer; name of the user; and open files, pipes, * and devices on the computer. * * Members * * sesi1_cname * Pointer to a Unicode string specifying the name of the computer that * established the session. * * sesi1_username * Pointer to a Unicode string specifying the name of the user who established * the session. * * sesi1_num_opens * Specifies a DWORD value that contains the number of files, devices, * and pipes opened during the session. * * sesi1_time * Specifies a DWORD value that contains the number of seconds the session * has been active. * * sesi1_idle_time * Specifies a DWORD value that contains the number of seconds the session * has been idle. * * sesi1_user_flags * Specifies a DWORD value that describes how the user established the * session. This member can be one of the following values: * SESS_GUEST The user specified by the sesi1_username member * established the session using a guest account. * SESS_NOENCRYPTION The user specified by the sesi1_username member * established the session without using password * encryption. *********************************************************************** */ #define SESS_GUEST 0x00000001 #define SESS_NOENCRYPTION 0x00000002 struct mslm_SESSION_INFO_0 { LPTSTR sesi0_cname; }; INFONRES_RESULT(mslm_SESSION_INFO, 0) struct mslm_SESSION_INFO_1 { LPTSTR sesi1_cname; LPTSTR sesi1_uname; DWORD sesi1_nopens; DWORD sesi1_time; DWORD sesi1_itime; DWORD sesi1_uflags; }; INFONRES_RESULT(mslm_SESSION_INFO, 1) struct mslm_SESSION_INFO_2 { LPTSTR sesi2_cname; LPTSTR sesi2_uname; DWORD sesi2_nopens; DWORD sesi2_time; DWORD sesi2_itime; DWORD sesi2_uflags; LPTSTR sesi2_cltype_name; }; INFONRES_RESULT(mslm_SESSION_INFO, 2) struct mslm_SESSION_INFO_10 { LPTSTR sesi10_cname; LPTSTR sesi10_uname; DWORD sesi10_time; DWORD sesi10_itime; }; INFONRES_RESULT(mslm_SESSION_INFO, 10) struct mslm_SESSION_INFO_502 { LPTSTR sesi502_cname; LPTSTR sesi502_uname; DWORD sesi502_nopens; DWORD sesi502_time; DWORD sesi502_itime; DWORD sesi502_uflags; LPTSTR sesi502_cltype_name; LPTSTR sesi502_transport; }; INFONRES_RESULT(mslm_SESSION_INFO, 502) INFONRES_DEFINITION(mslm_NetSessionEnum, INFONRES_UNION_ENTRY(mslm_SESSION_INFO, 0) INFONRES_UNION_ENTRY(mslm_SESSION_INFO, 1) INFONRES_UNION_ENTRY(mslm_SESSION_INFO, 2) INFONRES_UNION_ENTRY(mslm_SESSION_INFO, 10) INFONRES_UNION_ENTRY(mslm_SESSION_INFO, 502)) OPERATION(SRVSVC_OPNUM_NetSessionEnum) struct mslm_NetSessionEnum { IN LPTSTR servername; IN DWORD unc_clientname; IN DWORD username; INOUT DWORD level; INOUT struct mslm_NetSessionEnum_result result; IN DWORD pref_max_len; OUT DWORD total_entries; INOUT DWORD *resume_handle; OUT DWORD status; }; /* *********************************************************************** * NetSessionDel (Platform SDK: Network Management) * * The NetSessionDel function ends a network session between a server * and a workstation. * * Security Requirements * Only members of the Administrators or Account Operators local group * can successfully execute the NetSessionDel function. * * Windows NT/2000/XP: The parameter order is as follows. * * NET_API_STATUS NetSessionDel(LPWSTR servername, * LPWSTR UncClientName, * LPWSTR username); * * Windows 95/98/Me: The sReserved parameter replaces the username * parameter. For more information, see the following Remarks section. * The parameter list is as follows. * * API_FUNCTION NetSessionDel(const char FAR *pszServer, * const char FAR *pszClientName, * short sReserved); * * Parameters * * servername * [in] Pointer to a string that specifies the DNS or NetBIOS name * of the server. Servers should not validate this parameter. * This parameter may be NULL and on Windows NT 4.0 and earlier it * should begin with \\. * * UncClientName * [in] Pointer to a string that specifies the name of the client * to disconnect. If UncClientName is NULL, all sessions associated * with the specified user will be disconnected. * * username * [in] Pointer to a string that specifies the name of the user whose * session is to be terminated. If username is NULL, all sessions * from the specified client will be disconnected. * * Remarks * Windows 95/98/Me: You must specify the session key in the sReserved * parameter when you call NetSessionDel. The session key is returned by * the NetSessionEnum function or the NetSessionGetInfo function in the * sesi50_key member of the session_info_50 structure. *********************************************************************** */ OPERATION(SRVSVC_OPNUM_NetSessionDel) struct mslm_NetSessionDel { IN LPTSTR servername; IN LPTSTR unc_clientname; IN LPTSTR username; OUT DWORD status; }; /* * SRVSVC NetServerGetInfo ( * IN LPTSTR servername, * IN DWORD level, * OUT union switch(level) { * case 100: _SERVER_INFO_100 * p100; * case 101: _SERVER_INFO_101 * p101; * case 102: _SERVER_INFO_102 * p102; * } bufptr, * OUT DWORD status * ) */ /* for svX_platform */ #define SV_PLATFORM_ID_DOS 300 #define SV_PLATFORM_ID_OS2 400 #define SV_PLATFORM_ID_NT 500 #define SV_PLATFORM_ID_OSF 600 #define SV_PLATFORM_ID_VMS 700 /* Bit-mapped values for svX_type fields */ #define SV_TYPE_WORKSTATION 0x00000001 #define SV_TYPE_SERVER 0x00000002 #define SV_TYPE_SQLSERVER 0x00000004 #define SV_TYPE_DOMAIN_CTRL 0x00000008 #define SV_TYPE_DOMAIN_BAKCTRL 0x00000010 #define SV_TYPE_TIME_SOURCE 0x00000020 #define SV_TYPE_AFP 0x00000040 #define SV_TYPE_NOVELL 0x00000080 #define SV_TYPE_DOMAIN_MEMBER 0x00000100 #define SV_TYPE_PRINTQ_SERVER 0x00000200 #define SV_TYPE_DIALIN_SERVER 0x00000400 #define SV_TYPE_XENIX_SERVER 0x00000800 #define SV_TYPE_SERVER_UNIX SV_TYPE_XENIX_SERVER #define SV_TYPE_NT 0x00001000 /* NT Workstation */ #define SV_TYPE_WFW 0x00002000 /* Windows for Workgroups */ #define SV_TYPE_SERVER_MFPN 0x00004000 #define SV_TYPE_SERVER_NT 0x00008000 /* NT Server */ #define SV_TYPE_POTENTIAL_BROWSER 0x00010000 #define SV_TYPE_BACKUP_BROWSER 0x00020000 #define SV_TYPE_MASTER_BROWSER 0x00040000 #define SV_TYPE_DOMAIN_MASTER 0x00080000 #define SV_TYPE_SERVER_OSF 0x00100000 #define SV_TYPE_SERVER_VMS 0x00200000 #define SV_TYPE_WINDOWS 0x00400000 /* Windows95 and above */ #define SV_TYPE_ALTERNATE_XPORT 0x20000000 /* Return alt transport list */ #define SV_TYPE_LOCAL_LIST_ONLY 0x40000000 /* Return local list only */ #define SV_TYPE_DOMAIN_ENUM 0x80000000 #define SV_TYPE_ALL 0xFFFFFFFF /* handy for NetServerEnum2 */ /* NT-Server 4.0 sends 0x0006_120B */ #define SV_TYPE_SENT_BY_NT_4_0_SERVER \ ( SV_TYPE_WORKSTATION \ | SV_TYPE_SERVER \ | SV_TYPE_DOMAIN_CTRL \ | SV_TYPE_NT \ | SV_TYPE_BACKUP_BROWSER \ | SV_TYPE_MASTER_BROWSER) /* NT-workstation 4.0 send 0x0004_1013 */ #define SV_TYPE_SENT_BY_NT_4_0_WORKSTATION \ ( SV_TYPE_WORKSTATION \ | SV_TYPE_SERVER \ | SV_TYPE_DOMAIN_BAKCTRL \ | SV_TYPE_NT \ | SV_TYPE_MASTER_BROWSER) /* Special value for sv102_disc that specifies infinite disconnect time */ #define SV_NODISC (-1L) /* No autodisconnect timeout enforced */ /* Values of svX_security field */ #define SV_USERSECURITY 1 #define SV_SHARESECURITY 0 /* Values of svX_hidden field */ #define SV_HIDDEN 1 #define SV_VISIBLE 0 struct mslm_SERVER_INFO_100 { DWORD sv100_platform_id; LPTSTR sv100_name; }; struct mslm_SERVER_INFO_101 { DWORD sv101_platform_id; LPTSTR sv101_name; DWORD sv101_version_major; DWORD sv101_version_minor; DWORD sv101_type; LPTSTR sv101_comment; }; struct mslm_SERVER_INFO_102 { DWORD sv102_platform_id; LPTSTR sv102_name; DWORD sv102_version_major; DWORD sv102_version_minor; DWORD sv102_type; LPTSTR sv102_comment; DWORD sv102_users; DWORD sv102_disc; DWORD sv102_hidden; /* BOOL */ DWORD sv102_announce; DWORD sv102_anndelta; DWORD sv102_licenses; LPTSTR sv102_userpath; }; struct mslm_SERVER_INFO_502 { DWORD sv502_sessopens; DWORD sv502_sessvcs; DWORD sv502_opensearch; DWORD sv502_sizreqbuf; DWORD sv502_initworkitems; DWORD sv502_maxworkitems; DWORD sv502_rawworkitems; DWORD sv502_irpstacksize; DWORD sv502_maxrawbuflen; DWORD sv502_sessusers; DWORD sv502_sessconns; DWORD sv502_maxpagedmemoryusage; DWORD sv502_maxnonpagedmemoryusage; DWORD sv502_enablesoftcompat; DWORD sv502_enableforcedlogoff; DWORD sv502_timesource; DWORD sv502_acceptdownlevelapis; DWORD sv502_lmannounce; }; struct mslm_SERVER_INFO_503 { DWORD sv503_sessopens; DWORD sv503_sessvcs; DWORD sv503_opensearch; DWORD sv503_sizreqbuf; DWORD sv503_initworkitems; DWORD sv503_maxworkitems; DWORD sv503_rawworkitems; DWORD sv503_irpstacksize; DWORD sv503_maxrawbuflen; DWORD sv503_sessusers; DWORD sv503_sessconns; DWORD sv503_maxpagedmemoryusage; DWORD sv503_maxnonpagedmemoryusage; DWORD sv503_enablesoftcompat; DWORD sv503_enableforcedlogoff; DWORD sv503_timesource; DWORD sv503_acceptdownlevelapis; DWORD sv503_lmannounce; LPTSTR sv503_domain; DWORD sv503_maxcopyreadlen; DWORD sv503_maxcopywritelen; DWORD sv503_minkeepsearch; DWORD sv503_maxkeepsearch; DWORD sv503_minkeepcomplsearch; DWORD sv503_maxkeepcomplsearch; DWORD sv503_threadcountadd; DWORD sv503_numblockthreads; DWORD sv503_scavtimeout; DWORD sv503_minrcvqueue; DWORD sv503_minfreeworkitems; DWORD sv503_xactmemsize; DWORD sv503_threadpriority; DWORD sv503_maxmpxct; DWORD sv503_oplockbreakwait; DWORD sv503_oplockbreakresponsewait; DWORD sv503_enableoplocks; DWORD sv503_enableoplockforceclose; DWORD sv503_enablefcbopens; DWORD sv503_enableraw; DWORD sv503_enablesharednetdrives; DWORD sv503_minfreeconnections; DWORD sv503_maxfreeconnections; }; union mslm_NetServerGetInfo_ru { CASE(100) struct mslm_SERVER_INFO_100 *bufptr100; CASE(101) struct mslm_SERVER_INFO_101 *bufptr101; CASE(102) struct mslm_SERVER_INFO_102 *bufptr102; CASE(502) struct mslm_SERVER_INFO_502 *bufptr502; CASE(503) struct mslm_SERVER_INFO_503 *bufptr503; DEFAULT char *nullptr; }; struct mslm_NetServerGetInfo_result { DWORD level; SWITCH(level) union mslm_NetServerGetInfo_ru bufptr; }; OPERATION(SRVSVC_OPNUM_NetServerGetInfo) struct mslm_NetServerGetInfo { IN LPTSTR servername; IN DWORD level; OUT struct mslm_NetServerGetInfo_result result; OUT DWORD status; }; /* * SRVSVC NetRemoteTOD ( * IN LPTSTR servername, * OUT _TIME_OF_DAY_INFO *bufptr, * OUT long status * ) */ struct mslm_TIME_OF_DAY_INFO { DWORD tod_elapsedt; DWORD tod_msecs; DWORD tod_hours; DWORD tod_mins; DWORD tod_secs; DWORD tod_hunds; DWORD tod_timezone; DWORD tod_tinterval; DWORD tod_day; DWORD tod_month; DWORD tod_year; DWORD tod_weekday; }; OPERATION(SRVSVC_OPNUM_NetRemoteTOD) struct mslm_NetRemoteTOD { IN LPTSTR servername; OUT struct mslm_TIME_OF_DAY_INFO *bufptr; OUT DWORD status; }; #define NAMETYPE_USER 1 #define NAMETYPE_PASSWORD 2 #define NAMETYPE_GROUP 3 #define NAMETYPE_COMPUTER 4 #define NAMETYPE_EVENT 5 #define NAMETYPE_DOMAIN 6 #define NAMETYPE_SERVICE 7 #define NAMETYPE_NET 8 #define NAMETYPE_SHARE 9 #define NAMETYPE_MESSAGE 10 #define NAMETYPE_MESSAGEDEST 11 #define NAMETYPE_SHAREPASSWORD 12 #define NAMETYPE_WORKGROUP 13 OPERATION(SRVSVC_OPNUM_NetNameValidate) struct mslm_NetNameValidate { IN LPTSTR servername; IN REFERENCE LPTSTR pathname; IN DWORD type; IN DWORD flags; OUT DWORD status; }; /* * SRVSVC NetShareEnum ( * IN LPTSTR servername, * IN DWORD level; * OUT union switch(level) { * case 0: struct { * DWORD entriesread; * [size_is(entriesread)] * _SHARE_INFO_0 *entries; * } *bufptr0; * case 1: struct { * DWORD entriesread; * [size_is(entriesread)] * _SHARE_INFO_1 *entries; * } *bufptr1; * ... * } bufptr, * IN DWORD prefmaxlen, * OUT DWORD totalentries, * IN OUT DWORD ?* resume_handle, * OUT DWORD status * ) */ /* * Share types for shiX_type fields - duplicated from cifs.h */ #ifndef _SHARE_TYPES_DEFINED_ #define _SHARE_TYPES_DEFINED_ #define STYPE_DISKTREE 0x00000000 #define STYPE_PRINTQ 0x00000001 #define STYPE_DEVICE 0x00000002 #define STYPE_IPC 0x00000003 #define STYPE_MASK 0x0000000F #define STYPE_DFS 0x00000064 #define STYPE_HIDDEN 0x80000000 #define STYPE_SPECIAL 0x80000000 #endif /* _SHARE_TYPES_DEFINED_ */ /* Maximum uses for shiX_max_uses fields */ #define SHI_USES_UNLIMITED (DWORD)-1 INFONRES_RESULT(mslm_NetShareInfo,0) INFONRES_RESULT(mslm_NetShareInfo,1) INFONRES_RESULT(mslm_NetShareInfo,2) INFONRES_RESULT(mslm_NetShareInfo,501) INFONRES_RESULT(mslm_NetShareInfo,502) union mslm_NetShareAddInfo_u { CASE(2) struct mslm_NetShareInfo_2 *info2; CASE(502) struct mslm_NetShareInfo_502 *info502; DEFAULT char *nullptr; }; struct mslm_NetShareAddInfo { DWORD switch_value; SWITCH(switch_value) union mslm_NetShareAddInfo_u un; }; OPERATION(SRVSVC_OPNUM_NetShareAdd) struct mslm_NetShareAdd { IN LPTSTR servername; IN DWORD level; IN struct mslm_NetShareAddInfo info; INOUT DWORD *parm_err; OUT DWORD status; }; INFONRES_DEFINITION(mslm_NetShareEnum, INFONRES_UNION_ENTRY(mslm_NetShareInfo,0) INFONRES_UNION_ENTRY(mslm_NetShareInfo,1) INFONRES_UNION_ENTRY(mslm_NetShareInfo,2) INFONRES_UNION_ENTRY(mslm_NetShareInfo,501) INFONRES_UNION_ENTRY(mslm_NetShareInfo,502)) /* * NetShareEnum: enumerate all shares (see also NetShareEnumSticky). * Note: the server should ignore the content of servername. */ OPERATION(SRVSVC_OPNUM_NetShareEnum) struct mslm_NetShareEnum { IN LPTSTR servername; INOUT DWORD level; INOUT struct mslm_NetShareEnum_result result; IN DWORD prefmaxlen; OUT DWORD totalentries; INOUT DWORD *resume_handle; OUT DWORD status; }; /* * Delete a share. The reserved field appears in netmon * but I've left it out in case it's not always present. * This won't affect RPC processing. */ OPERATION(SRVSVC_OPNUM_NetShareDel) struct mslm_NetShareDel { IN LPTSTR servername; IN REFERENCE LPTSTR netname; /* IN DWORD reserved; */ OUT DWORD status; }; OPERATION(SRVSVC_OPNUM_NetShareCheck) struct mslm_NetShareCheck { IN LPTSTR servername; IN REFERENCE LPTSTR path; OUT DWORD stype; OUT DWORD status; }; /* * NetShareEnumSticky is the same as NetShareEnum except that * STYPE_SPECIAL (hidden or special) shares are not returned. * Note: the server should ignore the content of servername. */ OPERATION(SRVSVC_OPNUM_NetShareEnumSticky) struct mslm_NetShareEnumSticky { IN LPTSTR servername; INOUT DWORD level; INOUT struct mslm_NetShareEnum_result result; IN DWORD prefmaxlen; OUT DWORD totalentries; INOUT DWORD *resume_handle; OUT DWORD status; }; /* * When you install Windows NT Server Tools on a Win95 client, * a security tab will be added to properties dialog box of files/folders. * Within this security tab, when you try to get/set permissions on a * file/folder the next two RPC calls are used. */ OPERATION(SRVSVC_OPNUM_NetGetFileSecurity) struct mslm_NetGetFileSecurity { IN LPTSTR servername; IN LPTSTR sharename; IN REFERENCE LPTSTR filename; IN DWORD securityinfo; /* * Right now, we can't send back SD of the requested object * in RPC code, so we just reply with access denied error * code. Thus, this output declaration is only valid in this * case i.e., it's not complete. * It looks like: * * A Pointer * A Length * * A Pointer * A Length (equal to the prev length) * A buffer * * return value */ OUT DWORD length; OUT DWORD status; }; /* * This is the request: * * R_SRVSVC: RPC Client call srvsvc:NetrpSetFileSecurity(..) * R_SRVSVC: SRVSVC_HANDLE ServerName = \\WK76-177 * R_SRVSVC: LPWSTR ShareName = AFSHIN * R_SRVSVC: LPWSTR lpFileName = \salek.txt * R_SRVSVC: SECURITY_INFORMATION SecurityInformation = 4 (0x4) * -R_SRVSVC: PADT_SECURITY_DESCRIPTOR SecurityDescriptor {..} * R_SRVSVC: DWORD Length = 64 (0x40) * R_SRVSVC: LPBYTE Buffer = 4496048 (0x449AB0) * R_SRVSVC: LPBYTE Buffer [..] = 01 00 04 80 00 00 00 00 00 00 00 00 00 00 00 * ... * * 000000A0 00 83 46 00 0B 00 00 00 00 00 00 00 0B 00 ..F........... * 000000B0 00 00 5C 00 5C 00 57 00 4B 00 37 00 36 00 2D 00 ..\.\.W.K.7.6.-. * 000000C0 31 00 37 00 37 00 00 00 08 00 16 83 46 00 07 00 1.7.7.......F... * 000000D0 00 00 00 00 00 00 07 00 00 00 41 00 46 00 53 00 ..........A.F.S. * 000000E0 48 00 49 00 4E 00 00 00 00 00 0B 00 00 00 00 00 H.I.N........... * 000000F0 00 00 0B 00 00 00 5C 00 73 00 61 00 6C 00 65 00 ......\.s.a.l.e. * 00000100 6B 00 2E 00 74 00 78 00 74 00 00 00 00 00 04 00 k...t.x.t....... * 00000110 00 00 40 00 00 00 B0 9A 44 00 40 00 00 00 01 00 ..@.....D.@..... * 00000120 04 80 00 00 00 00 00 00 00 00 00 00 00 00 14 00 ................ * 00000130 00 00 02 00 2C 00 01 00 00 00 00 00 24 00 00 00 ....,.......$... * 00000140 00 A0 01 05 00 00 00 00 00 05 15 00 00 00 1A 24 ...............$ * 00000150 44 38 90 00 0F 02 65 3A BE 4C FF 03 00 00 00 00 D8....e:.L...... * 00000160 00 00 00 00 00 00 00 00 00 00 .......... */ OPERATION(SRVSVC_OPNUM_NetSetFileSecurity) struct mslm_NetSetFileSecurity { IN LPTSTR servername; IN LPTSTR sharename; IN REFERENCE LPTSTR filename; IN DWORD securityinfo; /* * IN Security Descriptor (looks like): * Length1 * Pointer * Length2 (== Length1) * buffer itself */ OUT DWORD status; }; /* * The SRVSVC already */ INTERFACE(0) union srvsvc_interface { CASE(SRVSVC_OPNUM_NetConnectEnum) struct mslm_NetConnectEnum NetConnectEnum; CASE(SRVSVC_OPNUM_NetFileEnum) struct mslm_NetFileEnum NetFileEnum; CASE(SRVSVC_OPNUM_NetFileClose) struct mslm_NetFileClose NetFileClose; CASE(SRVSVC_OPNUM_NetShareGetInfo) struct mlsm_NetShareGetInfo NetShareGetInfo; CASE(SRVSVC_OPNUM_NetShareSetInfo) struct mlsm_NetShareSetInfo NetShareSetInfo; CASE(SRVSVC_OPNUM_NetSessionDel) struct mslm_NetSessionDel NetSessionDel; CASE(SRVSVC_OPNUM_NetSessionEnum) struct mslm_NetSessionEnum NetSessionEnum; CASE(SRVSVC_OPNUM_NetServerGetInfo) struct mslm_NetServerGetInfo NetServerGetInfo; CASE(SRVSVC_OPNUM_NetRemoteTOD) struct mslm_NetRemoteTOD NetRemoteTOD; CASE(SRVSVC_OPNUM_NetNameValidate) struct mslm_NetNameValidate NetNameValidate; CASE(SRVSVC_OPNUM_NetShareAdd) struct mslm_NetShareAdd NetShareAdd; CASE(SRVSVC_OPNUM_NetShareDel) struct mslm_NetShareDel NetShareDel; CASE(SRVSVC_OPNUM_NetShareCheck) struct mslm_NetShareCheck NetShareCheck; CASE(SRVSVC_OPNUM_NetShareEnum) struct mslm_NetShareEnum NetShareEnum; CASE(SRVSVC_OPNUM_NetShareEnumSticky) struct mslm_NetShareEnumSticky NetShareEnumSticky; CASE(SRVSVC_OPNUM_NetGetFileSecurity) struct mslm_NetGetFileSecurity NetGetFileSecurity; CASE(SRVSVC_OPNUM_NetSetFileSecurity) struct mslm_NetSetFileSecurity NetSetFileSecurity; }; typedef union srvsvc_interface srvsvc_interface_t; EXTERNTYPEINFO(srvsvc_interface) /* * WKSSVC - Workstation Service */ /* Windows NT */ #define WKSSVC_OPNUM_NetWkstaGetInfo 0x00 #define WKSSVC_OPNUM_NetWkstaSetInfo 0x01 #define WKSSVC_OPNUM_NetWkstaUserEnum 0x02 #define WKSSVC_OPNUM_NetWkstaUserGetInfo 0x03 #define WKSSVC_OPNUM_NetWkstaUserSetInfo 0x04 #define WKSSVC_OPNUM_NetWkstaTransportEnum 0x05 #define WKSSVC_OPNUM_NetWkstaTransportAdd 0x06 #define WKSSVC_OPNUM_NetWkstaTransportDel 0x07 #define WKSSVC_OPNUM_NetUseAdd 0x08 #define WKSSVC_OPNUM_NetUseGetInfo 0x09 #define WKSSVC_OPNUM_NetUseDel 0x0a #define WKSSVC_OPNUM_NetUseEnum 0x0b #define WKSSVC_OPNUM_NetMessageBufferSend 0x0c #define WKSSVC_OPNUM_NetWkstaStatisticsGet 0x0d #define WKSSVC_OPNUM_NetLogonDomainNameAdd 0x0e /* Windows 2000 */ #define WKSSVC_OPNUM_NetLogonDomainNameDel 0x0f #define WKSSVC_OPNUM_NetJoinDomain 0x10 #define WKSSVC_OPNUM_NetUnjoinDomain 0x11 #define WKSSVC_OPNUM_NetValidateName 0x12 #define WKSSVC_OPNUM_NetRenameMachineInDomain 0x13 #define WKSSVC_OPNUM_NetGetJoinInformation 0x14 #define WKSSVC_OPNUM_NetGetJoinableOUs 0x15 #define WKSSVC_OPNUM_NetJoinDomain2 0x16 #define WKSSVC_OPNUM_NetUnjoinDomain2 0x17 #define WKSSVC_OPNUM_NetRenameMachineInDomain2 0x18 #define WKSSVC_OPNUM_NetValidateName2 0x19 #define WKSSVC_OPNUM_NetGetJoinableOUs2 0x1a /* Windows XP and Windows Server 2003 */ #define WKSSVC_OPNUM_NetAddAlternateComputerName 0x1b #define WKSSVC_OPNUM_NetRemoveAlternateComputerName 0x1c #define WKSSVC_OPNUM_NetSetPrimaryComputerName 0x1d #define WKSSVC_OPNUM_NetEnumerateComputerNames 0x1e #define WKSSVC_OPNUM_NetWorkstationResetDfsCache 0x1f struct mslm_WKSTA_INFO_100 { DWORD wki100_platform_id; LPTSTR wki100_computername; LPTSTR wki100_langroup; DWORD wki100_ver_major; DWORD wki100_ver_minor; }; /* NetWkstaGetInfo only. System information - user access */ struct mslm_WKSTA_INFO_101 { DWORD wki101_platform_id; LPTSTR wki101_computername; LPTSTR wki101_langroup; DWORD wki101_ver_major; DWORD wki101_ver_minor; LPTSTR wki101_lanroot; }; /* NetWkstaGetInfo only. System information - admin or operator access */ struct mslm_WKSTA_INFO_102 { DWORD wki102_platform_id; LPTSTR wki102_computername; LPTSTR wki102_langroup; DWORD wki102_ver_major; DWORD wki102_ver_minor; LPTSTR wki102_lanroot; DWORD wki102_logged_on_users; }; struct mslm_WKSTA_INFO_502 { DWORD char_wait; DWORD collection_time; DWORD maximum_collection_count; DWORD keep_connection; DWORD max_commands; DWORD session_timeout; DWORD size_char_buf; DWORD max_threads; DWORD lock_quota; DWORD lock_increment; DWORD lock_maximum; DWORD pipe_increment; DWORD pipe_maximum; DWORD cache_file_timeout; DWORD dormant_file_limit; DWORD read_ahead_throughput; DWORD num_mailslot_buffers; DWORD num_srv_announce_buffers; DWORD max_illegal_dgram_events; DWORD dgram_event_reset_freq; DWORD log_election_packets; DWORD use_opportunistic_locking; DWORD use_unlock_behind; DWORD use_close_behind; DWORD buf_named_pipes; DWORD use_lock_read_unlock; DWORD utilize_nt_caching; DWORD use_raw_read; DWORD use_raw_write; DWORD use_write_raw_data; DWORD use_encryption; DWORD buf_files_deny_write; DWORD buf_read_only_files; DWORD force_core_create_mode; DWORD use_512_byte_max_transfer; }; INFO1RES_DEFINITION(mslm_NetWkstaGetInfo, INFO1RES_UNION_ENTRY(mslm_WKSTA_INFO,100) INFO1RES_UNION_ENTRY(mslm_WKSTA_INFO,101) INFO1RES_UNION_ENTRY(mslm_WKSTA_INFO,102) INFO1RES_UNION_ENTRY(mslm_WKSTA_INFO,502)) INFO1RESBUF_DEFINITION(mslm_NetWkstaGetInfo, INFO1RESBUF_UNION_ENTRY(mslm_WKSTA_INFO,100) INFO1RESBUF_UNION_ENTRY(mslm_WKSTA_INFO,101) INFO1RESBUF_UNION_ENTRY(mslm_WKSTA_INFO,102) INFO1RESBUF_UNION_ENTRY(mslm_WKSTA_INFO,502)) OPERATION(WKSSVC_OPNUM_NetWkstaGetInfo) struct mslm_NetWkstaGetInfo { IN LPTSTR servername; IN DWORD level; OUT struct mslm_NetWkstaGetInfo_result result; OUT DWORD status; }; /* *********************************************************************** * NetWkstaTransportEnum *********************************************************************** */ struct mslm_NetWkstaTransportInfo0 { DWORD quality_of_service; DWORD num_vcs; LPTSTR transport_name; LPTSTR transport_address; DWORD wan_ish; }; struct mslm_NetWkstaTransportCtr0 { DWORD count; SIZE_IS(count) struct mslm_NetWkstaTransportInfo0 *ti0; }; union mslm_NetWkstaTransportInfo_ru { CASE(0) struct mslm_NetWkstaTransportCtr0 *info0; DEFAULT char *nullptr; }; struct mslm_NetWkstaTransportInfo { DWORD address; DWORD level; SWITCH(level) union mslm_NetWkstaTransportInfo_ru ru; }; OPERATION(WKSSVC_OPNUM_NetWkstaTransportEnum) struct mslm_NetWkstaTransportEnum { IN LPTSTR servername; INOUT struct mslm_NetWkstaTransportInfo info; IN DWORD pref_max_len; OUT DWORD total_entries; INOUT DWORD *resume_handle; OUT DWORD status; }; /* * The WKSSVC already */ INTERFACE(0) union wkssvc_interface { CASE(WKSSVC_OPNUM_NetWkstaGetInfo) struct mslm_NetWkstaGetInfo NetWkstaGetInfo; CASE(WKSSVC_OPNUM_NetWkstaTransportEnum) struct mslm_NetWkstaTransportEnum NetWkstaTransportEnum; }; typedef union wkssvc_interface wkssvc_interface_t; EXTERNTYPEINFO(wkssvc_interface) #endif /* _MLSVC_LANMAN_NDL_ */