1/* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License (the "License"). 6 * You may not use this file except in compliance with the License. 7 * 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9 * or http://www.opensolaris.org/os/licensing. 10 * See the License for the specific language governing permissions 11 * and limitations under the License. 12 * 13 * When distributing Covered Code, include this CDDL HEADER in each 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15 * If applicable, add the following below this CDDL HEADER, with the 16 * fields enclosed by brackets "[]" replaced with your own identifying 17 * information: Portions Copyright [yyyy] [name of copyright owner] 18 * 19 * CDDL HEADER END 20 */ 21/* 22 * Copyright 2010 Sun Microsystems, Inc. All rights reserved. 23 * Use is subject to license terms. 24 * 25 * Copyright 2013 Nexenta Systems, Inc. All rights reserved. 26 */ 27 28#ifndef _MLSVC_LANMAN_NDL_ 29#define _MLSVC_LANMAN_NDL_ 30 31/* 32 * LanMan RPC (WKSSVC and SRVSVC) interface definitions. 33 */ 34 35#include <libmlrpc/ndrtypes.ndl> 36 37/* 38 * WARNING: The cpp(1) macros in this file are not understood by 39 * /usr/bin/cpp. Use /usr/libexec/cpp instead. 40 */ 41 42/* 43 * TYPE CONSTRUCTOR MACROS FOR INFORMATION RESULTS 44 **************************************************************** 45 * 46 * This is an explanation of the macros that follow this comment. 47 * 48 * The LANMAN API's look something like this: 49 * 50 * NetXXXGetInfo ( 51 * IN char * servername, 52 * IN char * XXX_name, 53 * IN int level, 54 * OUT char ** bufptr); 55 * 56 * The bufptr is a pointer-to-pointer (**). The NetXXXGetInfo() function 57 * malloc()s memory, and sets *bufptr to the memory. The API's 58 * are undiscriminated about what bufptr really points to. 59 * 60 * However, for RPI (Remote Procedure Interface), this just won't fly. 61 * We have to know what the result data looks like in order to 62 * properly (un)marshall it. 63 * 64 * As best we can determine, the MSC developers use an RPI that looks 65 * like this (approximately in IDL): 66 * 67 * RemoteNetXXXGetInfo ( 68 * IN char * servername, 69 * IN char * XXX_name, 70 * IN int level, 71 * OUT union switch(level) { 72 * case(1): XXX_INFO_1 * info1; 73 * case(2): XXX_INFO_2 * info2; 74 * } bufptr); 75 * 76 * The level guides the (un)marshalling as it follows the pointer. 77 * DCE(MS) IDL will automatically form a structure for the union 78 * which looks about like this (much as Sun/RPC does): 79 * 80 * struct { 81 * int _keyvalue_; 82 * union { 83 * XXX_INFO_1 *info1; 84 * XXX_INFO_2 *info2; 85 * } _u_; 86 * } bufptr; 87 * 88 * This struct is not made visible to the application. It is purely 89 * an internal (automagic) thing. However, ndrgen does not do this. 90 * The ndrgen input MUST remain a valid C header file, and all 91 * struct and union declarations must be exact, and we (would) have 92 * to tediously code sequences like this (approximately NDL)): 93 * 94 * union XXXGetInfo_result_u { 95 * [case(1)] 96 * XXX_INFO_1 * info1; 97 * [case(2)] 98 * XXX_INFO_2 * info2; 99 * }; 100 * 101 * struct XXXGetInfo_result { 102 * int level; 103 * 104 * union XXXGetInfo_result_u bufptr; 105 * }; 106 * 107 * struct XXXGetInfo_param { // still have to code this one 108 * [in] char * servername; 109 * [in] ushort level; 110 * [out] struct XXXGetInfo_result result; 111 * }; 112 * 113 * This is error prone and difficult to write, and more difficult 114 * and distracting to read. It is hard to pick through the 115 * necessary evils and see what's really going on. To mitigate 116 * the situation, we have a series of macros which generate 117 * the tedious code, and are easily recognized as supporting 118 * fluff rather than important structures: 119 * 120 * INFO1RES_DEFINITION(XXXGetInfo, 121 * INFO1RES_UNION_ENTRY(XXXGetInfo, 1) 122 * INFO1RES_UNION_ENTRY(XXXGetInfo, 2)) 123 * 124 * structt XXXGetInfo_param { // still have to code this one 125 * [in] char * servername; 126 * [in] ushort level; 127 * [out] struct XXXGetInfo_result result; 128 * }; 129 * 130 * The INFO1RES_DEFINITION macro defines two types: 131 * 132 * union ...__ru {...} 133 * struct ..._result { DWORD level; union ..._ru bufptr; } 134 * 135 * There is a similar macro, INFO1RESBUF_DEFINITION, which defines 136 * actual space rather than just pointers. It defines: 137 * 138 * union ...._rb {...} 139 * typedef union ..._rb ..._rb; 140 * 141 * Which is handy in functions because the initial coding sequence 142 * looks something like: 143 * 144 * XXXGetInfoParam (struct XXXGetInfo_param *param) { 145 * XXXGetInfo_rb rb; 146 * 147 * param->result.level = param->level; // for marshalling 148 * param->result.bufptr.nullptr = &rb; // anything fits 149 * 150 * There are two flavors of Info results. The first is the 151 * single XXX_INFO_x result, which the foregoing example 152 * uses. The second flavor is when there are multiple entries 153 * possible. Again, for the sake of guiding the marshalling, 154 * the RPIs use something accommodating: 155 * 156 * struct XXX_INFO_1_result { 157 * unsigned entriesread; 158 * [size_is(entriesread)] 159 * XXX_INFO_1 * table; 160 * }; 161 * 162 * union { XXX_INFO_1_result *info1; ...} 163 * 164 * Notice this is using XXX_INFO_1_result rather than just XXX_INFO_1. 165 * The requirements from this point are much like before. Because of 166 * the variable-length value, there is no realistic way to do something 167 * like INFO1RESBUF_DEFINITION. 168 * 169 * There are two sets of macros here. INFO1RES_xxx are for the 170 * single result case, and INFONRES_xxx for the multiple entry case. 171 */ 172 173/* 174 * INFO1RES_... 175 * Type constructors for single-result case 176 */ 177 178#define INFO1RES_DEFINITION(INFOPREF, ENTRIES) \ 179 INFO1RES_UNION(INFOPREF, ENTRIES) \ 180 INFO1RES_STRUCT(INFOPREF) 181 182#define INFO1RES_UNION(INFOPREF, ENTRIES) \ 183 union INFOPREF##__ru { \ 184 INFO1RES_UNION_NULLPTR \ 185 ENTRIES \ 186 }; 187 188#define INFO1RES_UNION_NULLPTR \ 189 DEFAULT char * nullptr; 190 191#define INFO1RES_UNION_ENTRY(INFOPREF,NUM) \ 192 CASE(NUM) struct INFOPREF##_##NUM * bufptr##NUM; 193 194#define INFO1RES_STRUCT(INFOPREF) \ 195 struct INFOPREF##_result { \ 196 DWORD level; \ 197 SWITCH(level) \ 198 union INFOPREF##__ru bufptr; \ 199 }; 200 201/* 202 * INFO1RESBUF_... 203 * Type constructors for single-result buffering. 204 */ 205 206 207#ifndef NDRGEN 208#define INFO1RESBUF_DEFINITION(INFOPREF, ENTRIES) \ 209 typedef union INFOPREF##_rb { \ 210 ENTRIES \ 211 } INFOPREF##_rb; 212#define INFO1RESBUF_UNION_ENTRY(INFOPREF,NUM) \ 213 CASE(NUM) struct INFOPREF##_##NUM buf##NUM; 214#else 215#define INFO1RESBUF_DEFINITION(INFOPREF, ENTRIES) 216#define INFO1RESBUF_UNION_ENTRY(INFOPREF,NUM) 217#endif 218 219 220 221 222/* 223 * INFONRES_... 224 * Type constructors for multiple-result case 225 */ 226 227#define INFONRES_RESULT(INFOPREF,NUM) \ 228 struct INFOPREF##_##NUM##_result { \ 229 DWORD entriesread; \ 230 SIZE_IS(entriesread) \ 231 struct INFOPREF##_##NUM *entries; \ 232 }; 233 234#define INFONRES_DEFINITION(INFOPREF, ENTRIES) \ 235 INFONRES_UNION(INFOPREF, ENTRIES) \ 236 INFONRES_STRUCT(INFOPREF) 237 238#define INFONRES_UNION(INFOPREF, ENTRIES) \ 239 union INFOPREF##__ru { \ 240 INFONRES_UNION_NULLPTR \ 241 INFONRES_UNION_INFONRES \ 242 ENTRIES \ 243 }; 244 245#define INFONRES_UNION_NULLPTR \ 246 DEFAULT char * nullptr; 247 248#ifndef NDRGEN 249#define INFONRES_UNION_INFONRES \ 250 struct mslm_infonres * p; 251#else 252#define INFONRES_UNION_INFONRES 253#endif 254 255#define INFONRES_UNION_ENTRY(INFOPREF,NUM) \ 256 CASE(NUM) struct INFOPREF##_##NUM##_result * bufptr##NUM; 257 258#define INFONRES_STRUCT(INFOPREF) \ 259 struct INFOPREF##_result { \ 260 DWORD level; \ 261 SWITCH(level) \ 262 union INFOPREF##__ru bufptr; \ 263 }; 264 265#ifndef NDRGEN 266/* 267 * This just makes things a little easier on the stub modules: 268 * 269 * XXXGetInfoParam (struct XXXGetInfo_param *param) { 270 * struct mslm_infonres infonres; 271 * 272 * infonres.entriesread = 0; 273 * infonres.entries = 0; 274 * param->result.level = param->level; // for marshalling 275 * param->result.bufptr.p = &infonres; 276 */ 277struct mslm_infonres { 278 DWORD entriesread; 279 void * entries; 280}; 281#endif 282 283 284/* 285 * SRVSVC - Server Service 286 */ 287 288/* Windows NT */ 289#define SRVSVC_OPNUM_NetCharDevEnum 0x00 290#define SRVSVC_OPNUM_NetCharDevGetInfo 0x01 291#define SRVSVC_OPNUM_NetCharDevControl 0x02 292#define SRVSVC_OPNUM_NetCharDevQEnum 0x03 293#define SRVSVC_OPNUM_NetCharDevQGetInfo 0x04 294#define SRVSVC_OPNUM_NetCharDevQSetInfo 0x05 295#define SRVSVC_OPNUM_NetCharDevQPurge 0x06 296#define SRVSVC_OPNUM_NetCharDevQPurgeSelf 0x07 297#define SRVSVC_OPNUM_NetConnectEnum 0x08 298#define SRVSVC_OPNUM_NetFileEnum 0x09 299#define SRVSVC_OPNUM_NetFileGetInfo 0x0a 300#define SRVSVC_OPNUM_NetFileClose 0x0b 301#define SRVSVC_OPNUM_NetSessionEnum 0x0c 302#define SRVSVC_OPNUM_NetSessionDel 0x0d 303#define SRVSVC_OPNUM_NetShareAdd 0x0e 304#define SRVSVC_OPNUM_NetShareEnum 0x0f 305#define SRVSVC_OPNUM_NetShareGetInfo 0x10 306#define SRVSVC_OPNUM_NetShareSetInfo 0x11 307#define SRVSVC_OPNUM_NetShareDel 0x12 308#define SRVSVC_OPNUM_NetShareDelSticky 0x13 309#define SRVSVC_OPNUM_NetShareCheck 0x14 310#define SRVSVC_OPNUM_NetServerGetInfo 0x15 311#define SRVSVC_OPNUM_NetServerSetInfo 0x16 312#define SRVSVC_OPNUM_NetServerDiskEnum 0x17 313#define SRVSVC_OPNUM_NetServerStatisticsGet 0x18 314#define SRVSVC_OPNUM_NetServerTransportAdd 0x19 315#define SRVSVC_OPNUM_NetServerTransportEnum 0x1a 316#define SRVSVC_OPNUM_NetServerTransportDel 0x1b 317#define SRVSVC_OPNUM_NetRemoteTOD 0x1c 318#define SRVSVC_OPNUM_NetServerSetServiceBits 0x1d 319#define SRVSVC_OPNUM_NetPathType 0x1e 320#define SRVSVC_OPNUM_NetPathCanonicalize 0x1f 321#define SRVSVC_OPNUM_NetPathCompare 0x20 322#define SRVSVC_OPNUM_NetNameValidate 0x21 323#define SRVSVC_OPNUM_NetNameCanonicalize 0x22 324#define SRVSVC_OPNUM_NetNameCompare 0x23 325#define SRVSVC_OPNUM_NetShareEnumSticky 0x24 326#define SRVSVC_OPNUM_NetShareDelStart 0x25 327#define SRVSVC_OPNUM_NetShareDelCommit 0x26 328#define SRVSVC_OPNUM_NetGetFileSecurity 0x27 329#define SRVSVC_OPNUM_NetSetFileSecurity 0x28 330#define SRVSVC_OPNUM_NetServerTransportAddEx 0x29 331#define SRVSVC_OPNUM_NetServerSetServiceBitsEx 0x2a 332#define SRVSVC_OPNUM_NetDfsGetVersion 0x2b 333 334/* Windows 2000 */ 335#define SRVSVC_OPNUM_NetDfsCreateLocalPartition 0x2c 336#define SRVSVC_OPNUM_NetDfsDeleteLocalPartition 0x2d 337#define SRVSVC_OPNUM_NetDfsSetLocalVolumeState 0x2e 338#define SRVSVC_OPNUM_NetDfsSetServerInfo 0x2f 339#define SRVSVC_OPNUM_NetDfsCreateExitPoint 0x30 340#define SRVSVC_OPNUM_NetDfsDeleteExitPoint 0x31 341#define SRVSVC_OPNUM_NetDfsModifyPrefix 0x32 342#define SRVSVC_OPNUM_NetDfsFixLocalVolume 0x33 343#define SRVSVC_OPNUM_NetDfsManagerReportSiteInfo 0x34 344 345/* Windows XP and Windows Server 2003 */ 346#define SRVSVC_OPNUM_NetServerTransportDelEx 0x35 347 348/* Windows Vista */ 349#define SRVSVC_OPNUM_NetServerAliasAdd 0x36 350#define SRVSVC_OPNUM_NetServerAliasEnum 0x37 351#define SRVSVC_OPNUM_NetServerAliasDel 0x38 352#define SRVSVC_OPNUM_NetShareDelEx 0x39 353 354/* 355 *********************************************************************** 356 * NetConnectEnum 357 *********************************************************************** 358 */ 359 360/* 361 * Level 0 connect information. 362 */ 363struct mslm_NetConnectInfoBuf0 { 364 DWORD coni0_id; 365}; 366typedef struct mslm_NetConnectInfoBuf0 srvsvc_NetConnectInfoBuf0_t; 367 368struct mslm_NetConnectInfo0 { 369 DWORD entries_read; 370 SIZE_IS(entries_read) 371 struct mslm_NetConnectInfoBuf0 *ci0; 372}; 373typedef struct mslm_NetConnectInfo0 srvsvc_NetConnectInfo0_t; 374 375/* 376 * Level 1 connect information. 377 */ 378struct mslm_NetConnectInfoBuf1 { 379 DWORD coni1_id; 380 DWORD coni1_type; 381 DWORD coni1_num_opens; 382 DWORD coni1_num_users; 383 DWORD coni1_time; 384 LPTSTR coni1_username; 385 LPTSTR coni1_netname; /* share name */ 386}; 387typedef struct mslm_NetConnectInfoBuf1 srvsvc_NetConnectInfoBuf1_t; 388 389struct mslm_NetConnectInfo1 { 390 DWORD entries_read; 391 SIZE_IS(entries_read) 392 struct mslm_NetConnectInfoBuf1 *ci1; 393}; 394typedef struct mslm_NetConnectInfo1 srvsvc_NetConnectInfo1_t; 395 396union mslm_NetConnectInfoResUnion { 397 CASE(0) struct mslm_NetConnectInfo0 *info0; 398 CASE(1) struct mslm_NetConnectInfo1 *info1; 399 DEFAULT char *nullptr; 400}; 401 402struct mslm_NetConnectInfo { 403 DWORD level; 404 DWORD switch_value; 405 SWITCH(switch_value) 406 union mslm_NetConnectInfoResUnion ru; 407}; 408typedef struct mslm_NetConnectInfo srvsvc_NetConnectInfo_t; 409 410OPERATION(SRVSVC_OPNUM_NetConnectEnum) 411struct mslm_NetConnectEnum { 412 IN LPTSTR servername; 413 IN LPTSTR qualifier; /* share name */ 414 INOUT struct mslm_NetConnectInfo info; 415 IN DWORD pref_max_len; 416 OUT DWORD total_entries; 417 INOUT DWORD *resume_handle; 418 OUT DWORD status; 419}; 420 421 422/* 423 *********************************************************************** 424 * NetFileEnum 425 *********************************************************************** 426 */ 427struct mslm_NetFileInfoBuf2 { 428 DWORD fi2_id; 429}; 430typedef struct mslm_NetFileInfoBuf2 srvsvc_NetFileInfoBuf2_t; 431 432struct mslm_NetFileInfo2 { 433 DWORD entries_read; 434 SIZE_IS(entries_read) 435 struct mslm_NetFileInfoBuf2 *fi2; 436}; 437typedef struct mslm_NetFileInfo2 srvsvc_NetFileInfo2_t; 438 439struct mslm_NetFileInfoBuf3 { 440 DWORD fi3_id; 441 DWORD fi3_permissions; 442 DWORD fi3_num_locks; 443 LPTSTR fi3_pathname; 444 LPTSTR fi3_username; 445}; 446typedef struct mslm_NetFileInfoBuf3 srvsvc_NetFileInfoBuf3_t; 447 448struct mslm_NetFileInfo3 { 449 DWORD entries_read; 450 SIZE_IS(entries_read) 451 struct mslm_NetFileInfoBuf3 *fi3; 452}; 453typedef struct mslm_NetFileInfo3 srvsvc_NetFileInfo3_t; 454 455union mslm_NetFileInfoResUnion { 456 CASE(2) struct mslm_NetFileInfo2 *info2; 457 CASE(3) struct mslm_NetFileInfo3 *info3; 458 DEFAULT char *nullptr; 459}; 460 461struct mslm_NetFileInfo { 462 DWORD level; 463 DWORD switch_value; 464 SWITCH(switch_value) 465 union mslm_NetFileInfoResUnion ru; 466}; 467 468OPERATION(SRVSVC_OPNUM_NetFileEnum) 469struct mslm_NetFileEnum { 470 IN LPTSTR servername; 471 IN DWORD basepath; 472 IN DWORD username; 473 INOUT struct mslm_NetFileInfo info; 474 IN DWORD pref_max_len; 475 OUT DWORD total_entries; 476 INOUT DWORD *resume_handle; 477 OUT DWORD status; 478}; 479 480 481/* 482 *********************************************************************** 483 * NetFileClose 484 * 485 * Close files using a file id reported by NetFileEnum. 486 *********************************************************************** 487 */ 488OPERATION(SRVSVC_OPNUM_NetFileClose) 489struct mslm_NetFileClose { 490 IN LPTSTR servername; 491 IN DWORD file_id; 492 OUT DWORD status; 493}; 494 495 496/* 497 *********************************************************************** 498 * NetShareGetInfo/NetShareSetInfo: netname is the name of a share. 499 * 500 * Levels: 501 * 0 The share name. 502 * 1 Information about the shared resource: name, type of resource 503 * and a comment. 504 * 2 Information about the shared resource: name, type, permissions, 505 * password and number of connections. 506 * 501 Information about the shared resource: name, type of resource 507 * and a comment. 508 * 502 Information about the shared resource, including the name, type, 509 * permissions, number of connections etc. 510 * 503 Contains information about the shared resource; identical to 502 511 * except for the addition of a servername. 512 * 1004 A comment for the shared resource. 513 * 1005 A set of flags describing the shared resource. 514 * 1006 The maximum number of concurrent connections that the shared 515 * resource can accommodate. 516 * 1501 Specifies the SECURITY_DESCRIPTOR for the share. 517 * 518 * Windows Me/98/95 supports level 50, which is similar to level 1. 519 * 520 * shi1005_flags: SHI1005_VALID_FLAGS_SET defines the set of flags that 521 * can be set with the NetShareSetInfo function. SHI1005_FLAGS_DFS and 522 * SHI1005_FLAGS_DFS_ROOT can only be returned, but not set. 523 * 524 * 0x01 SHI1005_FLAGS_DFS 525 * The specified share is present in a Dfs tree structure. 526 * This flag cannot be set with NetShareSetInfo. 527 * 528 * 0x02 SHI1005_FLAGS_DFS_ROOT 529 * The specified share is the root volume in a Dfs tree. 530 * This flag cannot be set with NetShareSetInfo. 531 * 532 * 0x30 CSC_MASK Client-side caching (CSC) state: 533 * 0x00 CSC_CACHE_MANUAL_REINT Automatic file-by-file 534 * reintegration not allowed. 535 * 0x10 CSC_CACHE_AUTO_REINT File-by-file reintegration allowed. 536 * 0x20 CSC_CACHE_VDO File opens do not need to be flowed. 537 * 0x30 CSC_CACHE_NONE CSC is disabled for this share. 538 * 539 * 0x0100 SHI1005_FLAGS_RESTRICT_EXCLUSIVE_OPENS 540 * The specified share disallows exclusive file opens, 541 * where reads to an open file are disallowed. 542 * 543 * 0x0200 SHI1005_FLAGS_FORCE_SHARED_DELETE 544 * Shared files in the specified share can be forcibly deleted. 545 * 546 * 0x0400 SHI1005_FLAGS_ALLOW_NAMESPACE_CACHING 547 * Clients are allowed to cache the namespace of the share. 548 * 549 * 0x0800 SHI1005_FLAGS_ACCESS_BASED_DIRECTORY_ENUM 550 * The server will filter directory entries based on the access 551 * permissions of the client. The access-based enumeration (ABE) 552 * flag may also appear as SHI1005_FLAGS_ENFORCE_NAMESPACE_ACCESS. 553 * 554 * Support for Access-based Enumeration (ABE) was added to Windows in 555 * Windows Server 2003 Service Pack 1. ABE filters directory contents 556 * (and other shared resources) returned via a share based on a user's 557 * access rights, i.e. a user would not see objects that are 558 * inaccessible to that user. ABE requests are made using info level 559 * 1005 with the value 0x0800 in the flags field. 560 *********************************************************************** 561 */ 562 563#define CSC_MASK 0x30 564#define CSC_CACHE_MANUAL_REINT 0x00 565#define CSC_CACHE_AUTO_REINT 0x10 566#define CSC_CACHE_VDO 0x20 567#define CSC_CACHE_NONE 0x30 568 569#define MLSM_SID_AUTH_MAX 6 570/* 571 * Definition for a SID. The ndl compiler does not allow a typedef of 572 * a structure containing variable size members. 573 */ 574struct mslm_sid { 575 BYTE revision; 576 BYTE sub_auth_count; 577 BYTE authority[MLSM_SID_AUTH_MAX]; 578 SIZE_IS(sub_auth_count) 579 DWORD sub_authority[ANY_SIZE_ARRAY]; 580}; 581 582struct mslm_ace_hdr { 583 BYTE type; 584 BYTE flags; 585 WORD size; 586}; 587typedef struct mslm_ace_hdr mslm_ace_hdr_t; 588 589struct mslm_ace { 590 mslm_ace_hdr_t header; 591 DWORD mask; 592 struct mslm_sid *sid; 593}; 594typedef struct mslm_ace mslm_ace_t; 595 596struct mslm_acl { 597 BYTE revision; 598 BYTE sbz1; 599 WORD size; 600 WORD ace_count; 601 WORD sbz2; 602 SIZE_IS(ace_count) 603 mslm_ace_t ace[ANY_SIZE_ARRAY]; 604}; 605 606/* 607 * SRVSVC definition of a security_descriptor. 608 */ 609struct mslm_security_descriptor { 610 BYTE revision; 611 BYTE sbz1; 612 WORD control; 613 DWORD offset_owner; 614 DWORD offset_group; 615 DWORD offset_sacl; 616 DWORD offset_dacl; 617 struct mslm_sid *owner; 618 struct mslm_sid *group; 619 struct mslm_acl *sacl; 620 struct mslm_acl *dacl; 621}; 622typedef struct mslm_security_descriptor mslm_security_descriptor_t; 623 624struct mslm_NetShareInfo_0 { 625 LPTSTR shi0_netname; 626}; 627 628struct mslm_NetShareInfo_1 { 629 LPTSTR shi1_netname; 630 DWORD shi1_type; /* type of resource such as IPC$ */ 631 LPTSTR shi1_comment; 632}; 633 634struct mslm_NetShareInfo_2 { 635 LPTSTR shi2_netname; 636 DWORD shi2_type; 637 LPTSTR shi2_comment; 638 DWORD shi2_permissions; 639 DWORD shi2_max_uses; 640 DWORD shi2_current_uses; 641 LPTSTR shi2_path; 642 LPTSTR shi2_passwd; 643}; 644 645struct mslm_NetShareInfo_501 { 646 LPTSTR shi501_netname; 647 DWORD shi501_type; 648 LPTSTR shi501_comment; 649 DWORD shi501_flags; 650}; 651 652struct mslm_NetShareInfo_502 { 653 LPTSTR shi502_netname; 654 DWORD shi502_type; 655 LPTSTR shi502_comment; 656 DWORD shi502_permissions; 657 DWORD shi502_max_uses; 658 DWORD shi502_current_uses; 659 LPTSTR shi502_path; 660 LPTSTR shi502_passwd; 661 DWORD shi502_reserved; 662 SIZE_IS(shi502_reserved) 663 LPBYTE shi502_security_descriptor; 664}; 665 666struct mslm_NetShareInfo_503 { 667 LPTSTR shi503_netname; 668 DWORD shi503_type; 669 LPTSTR shi503_comment; 670 DWORD shi503_permissions; 671 DWORD shi503_max_uses; 672 DWORD shi503_current_uses; 673 LPTSTR shi503_path; 674 LPTSTR shi503_passwd; 675 LPTSTR shi503_servername; 676 DWORD shi503_reserved; 677 SIZE_IS(shi503_reserved) 678 LPBYTE shi503_security_descriptor; 679}; 680 681struct mslm_NetShareInfo_1004 { 682 LPTSTR shi1004_comment; 683}; 684 685struct mslm_NetShareInfo_1005 { 686 DWORD shi1005_flags; 687}; 688 689struct mslm_NetShareInfo_1006 { 690 DWORD shi1006_max_uses; 691}; 692 693struct mslm_NetShareInfo_1501 { 694 DWORD shi1501_reserved; 695 SIZE_IS(shi1501_reserved) 696 LPBYTE shi1501_security_descriptor; 697}; 698 699union mlsm_NetShareInfoResUnion { 700 CASE(0) struct mslm_NetShareInfo_0 *info0; 701 CASE(1) struct mslm_NetShareInfo_1 *info1; 702 CASE(2) struct mslm_NetShareInfo_2 *info2; 703 CASE(501) struct mslm_NetShareInfo_501 *info501; 704 CASE(502) struct mslm_NetShareInfo_502 *info502; 705 CASE(503) struct mslm_NetShareInfo_503 *info503; 706 CASE(1004) struct mslm_NetShareInfo_1004 *info1004; 707 CASE(1005) struct mslm_NetShareInfo_1005 *info1005; 708 CASE(1006) struct mslm_NetShareInfo_1006 *info1006; 709 CASE(1501) struct mslm_NetShareInfo_1501 *info1501; 710 DEFAULT char *nullptr; 711}; 712 713 714struct mlsm_NetShareInfoRes { 715 DWORD switch_value; 716 SWITCH(switch_value) 717 union mlsm_NetShareInfoResUnion ru; 718}; 719 720 721OPERATION(SRVSVC_OPNUM_NetShareGetInfo) 722struct mlsm_NetShareGetInfo { 723 IN LPTSTR servername; 724 IN REFERENCE LPTSTR netname; 725 IN DWORD level; 726 OUT struct mlsm_NetShareInfoRes result; 727 OUT DWORD status; 728}; 729 730 731OPERATION(SRVSVC_OPNUM_NetShareSetInfo) 732struct mlsm_NetShareSetInfo { 733 IN LPTSTR servername; 734 IN REFERENCE LPTSTR netname; 735 IN DWORD level; 736 IN struct mlsm_NetShareInfoRes result; 737 INOUT DWORD *parm_err; 738 OUT DWORD status; 739}; 740 741 742/* 743 *********************************************************************** 744 * NetSessionEnum 745 * 746 * The NetSessionEnum function provides information about sessions 747 * established on a server. 748 * 749 * Only members of the Administrators or Account Operators local groups 750 * can successfully execute the NetSessionEnum function at level 1 or 751 * level 2. No special group membership is required for level 0 or level 752 * 10 calls. 753 * 754 * Windows NT/2000/XP: The parameter order is as follows. 755 * 756 * NET_API_STATUS NetSessionEnum(LPWSTR servername, 757 * LPWSTR UncClientName, 758 * LPWSTR username, 759 * DWORD level, 760 * LPBYTE *bufptr, 761 * DWORD prefmaxlen, 762 * LPDWORD entriesread, 763 * LPDWORD totalentries, 764 * LPDWORD resume_handle); 765 * 766 * Windows 95/98/Me: The calling application must use the cbBuffer parameter 767 * to specify the size, in bytes, of the information buffer pointed to by the 768 * pbBuffer parameter. (The cbBuffer parameter replaces the prefmaxlen 769 * parameter.) Neither a user name parameter nor a resume handle parameter is 770 * available on this platform. Therefore, the parameter list is as follows. 771 * 772 * API_FUNCTION NetSessionEnum(const char FAR *pszServer, 773 * short sLevel, 774 * char FAR *pbBuffer, 775 * unsigned short cbBuffer, 776 * unsigned short FAR *pcEntriesRead, 777 * unsigned short FAR *pcTotalAvail); 778 * 779 * Parameters 780 * 781 * servername 782 * [in] Pointer to a string that specifies the DNS or NetBIOS name of the 783 * remote server on which the function is to execute. If this parameter is 784 * NULL, the local computer is used. 785 * Windows NT 4.0 and earlier: This string must begin with \\. 786 * 787 * UncClientName 788 * [in] Pointer to a string that specifies the name of the computer session 789 * for which information is to be returned. If this parameter is NULL, 790 * NetSessionEnum returns information for all computer sessions on the server. 791 * 792 * username 793 * [in] Pointer to a string that specifies the name of the user for which 794 * information is to be returned. If this parameter is NULL, NetSessionEnum 795 * returns information for all users. 796 * 797 * level 798 * [in] Specifies the information level of the data. This parameter can be 799 * one of the following values. 800 * Windows NT/2000/XP: The following levels are valid. 801 * Value Meaning 802 * 0 Return the name of the computer that established the session. 803 * The bufptr parameter points to an array of SESSION_INFO_0 804 * structures. 805 * 1 Return the name of the computer, name of the user, and open files, 806 * pipes, and devices on the computer. The bufptr parameter points to 807 * an array of SESSION_INFO_1 structures. 808 * 2 In addition to the information indicated for level 1, return the 809 * type of client and how the user established the session. The bufptr 810 * parameter points to an array of SESSION_INFO_2 structures. 811 * 10 Return the name of the computer, name of the user, and active and 812 * idle times for the session. The bufptr parameter points to an array 813 * of SESSION_INFO_10 structures. 814 * 502 Return the name of the computer; name of the user; open files, 815 * pipes, and devices on the computer; and the name of the transport 816 * the client is using. The bufptr parameter points to an array of 817 * SESSION_INFO_502 structures. 818 * 819 * Windows 95/98/Me: The following level is valid. 820 * Value Meaning 821 * 50 Return the name of the computer, name of the user, open files on 822 * the computer, and the name of the transport protocol the client is 823 * using. The pbBuffer parameter points to an array of session_info_50 824 * structures. 825 * 826 * bufptr 827 * [out] Pointer to the buffer that receives the data. The format of this 828 * data depends on the value of the level parameter. 829 * Windows NT/2000/XP: This buffer is allocated by the system and must be 830 * freed using the NetApiBufferFree function. Note that you must free the 831 * buffer even if the function fails with ERROR_MORE_DATA. 832 * Windows 95/98/Me: The caller must allocate and deallocate this buffer. 833 * 834 * prefmaxlen 835 * [in] Specifies the preferred maximum length of returned data, in bytes. 836 * If you specify MAX_PREFERRED_LENGTH, the function allocates the amount 837 * of memory required for the data. If you specify another value in this 838 * parameter, it can restrict the number of bytes that the function returns. 839 * If the buffer size is insufficient to hold all entries, the function 840 * returns ERROR_MORE_DATA. For more information, see Network Management 841 * Function Buffers and Network Management Function Buffer Lengths. 842 * 843 * entriesread 844 * [out] Pointer to a value that receives the count of elements actually 845 * enumerated. 846 * 847 * totalentries 848 * [out] Pointer to a value that receives the total number of entries that 849 * could have been enumerated from the current resume position. 850 * 851 * resume_handle 852 * [in/out] Pointer to a value that contains a resume handle which is used 853 * to continue an existing session search. The handle should be zero on the 854 * first call and left unchanged for subsequent calls. If resume_handle is 855 * NULL, no resume handle is stored. 856 * 857 * 858 * SESSION_INFO_1 859 * ============== 860 * The SESSION_INFO_1 structure contains information about the session, 861 * including name of the computer; name of the user; and open files, pipes, 862 * and devices on the computer. 863 * 864 * Members 865 * 866 * sesi1_cname 867 * Pointer to a Unicode string specifying the name of the computer that 868 * established the session. 869 * 870 * sesi1_username 871 * Pointer to a Unicode string specifying the name of the user who established 872 * the session. 873 * 874 * sesi1_num_opens 875 * Specifies a DWORD value that contains the number of files, devices, 876 * and pipes opened during the session. 877 * 878 * sesi1_time 879 * Specifies a DWORD value that contains the number of seconds the session 880 * has been active. 881 * 882 * sesi1_idle_time 883 * Specifies a DWORD value that contains the number of seconds the session 884 * has been idle. 885 * 886 * sesi1_user_flags 887 * Specifies a DWORD value that describes how the user established the 888 * session. This member can be one of the following values: 889 * SESS_GUEST The user specified by the sesi1_username member 890 * established the session using a guest account. 891 * SESS_NOENCRYPTION The user specified by the sesi1_username member 892 * established the session without using password 893 * encryption. 894 *********************************************************************** 895 */ 896 897#define SESS_GUEST 0x00000001 898#define SESS_NOENCRYPTION 0x00000002 899 900struct mslm_SESSION_INFO_0 { 901 LPTSTR sesi0_cname; 902}; 903INFONRES_RESULT(mslm_SESSION_INFO, 0) 904 905struct mslm_SESSION_INFO_1 { 906 LPTSTR sesi1_cname; 907 LPTSTR sesi1_uname; 908 DWORD sesi1_nopens; 909 DWORD sesi1_time; 910 DWORD sesi1_itime; 911 DWORD sesi1_uflags; 912}; 913INFONRES_RESULT(mslm_SESSION_INFO, 1) 914 915struct mslm_SESSION_INFO_2 { 916 LPTSTR sesi2_cname; 917 LPTSTR sesi2_uname; 918 DWORD sesi2_nopens; 919 DWORD sesi2_time; 920 DWORD sesi2_itime; 921 DWORD sesi2_uflags; 922 LPTSTR sesi2_cltype_name; 923}; 924INFONRES_RESULT(mslm_SESSION_INFO, 2) 925 926struct mslm_SESSION_INFO_10 { 927 LPTSTR sesi10_cname; 928 LPTSTR sesi10_uname; 929 DWORD sesi10_time; 930 DWORD sesi10_itime; 931}; 932INFONRES_RESULT(mslm_SESSION_INFO, 10) 933 934struct mslm_SESSION_INFO_502 { 935 LPTSTR sesi502_cname; 936 LPTSTR sesi502_uname; 937 DWORD sesi502_nopens; 938 DWORD sesi502_time; 939 DWORD sesi502_itime; 940 DWORD sesi502_uflags; 941 LPTSTR sesi502_cltype_name; 942 LPTSTR sesi502_transport; 943}; 944INFONRES_RESULT(mslm_SESSION_INFO, 502) 945 946INFONRES_DEFINITION(mslm_NetSessionEnum, 947 INFONRES_UNION_ENTRY(mslm_SESSION_INFO, 0) 948 INFONRES_UNION_ENTRY(mslm_SESSION_INFO, 1) 949 INFONRES_UNION_ENTRY(mslm_SESSION_INFO, 2) 950 INFONRES_UNION_ENTRY(mslm_SESSION_INFO, 10) 951 INFONRES_UNION_ENTRY(mslm_SESSION_INFO, 502)) 952 953OPERATION(SRVSVC_OPNUM_NetSessionEnum) 954struct mslm_NetSessionEnum { 955 IN LPTSTR servername; 956 IN DWORD unc_clientname; 957 IN DWORD username; 958 INOUT DWORD level; 959 INOUT struct mslm_NetSessionEnum_result result; 960 IN DWORD pref_max_len; 961 OUT DWORD total_entries; 962 INOUT DWORD *resume_handle; 963 OUT DWORD status; 964}; 965 966 967/* 968 *********************************************************************** 969 * NetSessionDel (Platform SDK: Network Management) 970 * 971 * The NetSessionDel function ends a network session between a server 972 * and a workstation. 973 * 974 * Security Requirements 975 * Only members of the Administrators or Account Operators local group 976 * can successfully execute the NetSessionDel function. 977 * 978 * Windows NT/2000/XP: The parameter order is as follows. 979 * 980 * NET_API_STATUS NetSessionDel(LPWSTR servername, 981 * LPWSTR UncClientName, 982 * LPWSTR username); 983 * 984 * Windows 95/98/Me: The sReserved parameter replaces the username 985 * parameter. For more information, see the following Remarks section. 986 * The parameter list is as follows. 987 * 988 * API_FUNCTION NetSessionDel(const char FAR *pszServer, 989 * const char FAR *pszClientName, 990 * short sReserved); 991 * 992 * Parameters 993 * 994 * servername 995 * [in] Pointer to a string that specifies the DNS or NetBIOS name 996 * of the server. Servers should not validate this parameter. 997 * This parameter may be NULL and on Windows NT 4.0 and earlier it 998 * should begin with \\. 999 * 1000 * UncClientName 1001 * [in] Pointer to a string that specifies the name of the client 1002 * to disconnect. If UncClientName is NULL, all sessions associated 1003 * with the specified user will be disconnected. 1004 * 1005 * username 1006 * [in] Pointer to a string that specifies the name of the user whose 1007 * session is to be terminated. If username is NULL, all sessions 1008 * from the specified client will be disconnected. 1009 * 1010 * Remarks 1011 * Windows 95/98/Me: You must specify the session key in the sReserved 1012 * parameter when you call NetSessionDel. The session key is returned by 1013 * the NetSessionEnum function or the NetSessionGetInfo function in the 1014 * sesi50_key member of the session_info_50 structure. 1015 *********************************************************************** 1016 */ 1017 1018OPERATION(SRVSVC_OPNUM_NetSessionDel) 1019struct mslm_NetSessionDel { 1020 IN LPTSTR servername; 1021 IN LPTSTR unc_clientname; 1022 IN LPTSTR username; 1023 OUT DWORD status; 1024}; 1025 1026 1027/* 1028 * SRVSVC NetServerGetInfo ( 1029 * IN LPTSTR servername, 1030 * IN DWORD level, 1031 * OUT union switch(level) { 1032 * case 100: _SERVER_INFO_100 * p100; 1033 * case 101: _SERVER_INFO_101 * p101; 1034 * case 102: _SERVER_INFO_102 * p102; 1035 * } bufptr, 1036 * OUT DWORD status 1037 * ) 1038 */ 1039 1040/* for svX_platform */ 1041#define SV_PLATFORM_ID_DOS 300 1042#define SV_PLATFORM_ID_OS2 400 1043#define SV_PLATFORM_ID_NT 500 1044#define SV_PLATFORM_ID_OSF 600 1045#define SV_PLATFORM_ID_VMS 700 1046 1047/* Bit-mapped values for svX_type fields */ 1048#define SV_TYPE_WORKSTATION 0x00000001 1049#define SV_TYPE_SERVER 0x00000002 1050#define SV_TYPE_SQLSERVER 0x00000004 1051#define SV_TYPE_DOMAIN_CTRL 0x00000008 1052#define SV_TYPE_DOMAIN_BAKCTRL 0x00000010 1053#define SV_TYPE_TIME_SOURCE 0x00000020 1054#define SV_TYPE_AFP 0x00000040 1055#define SV_TYPE_NOVELL 0x00000080 1056#define SV_TYPE_DOMAIN_MEMBER 0x00000100 1057#define SV_TYPE_PRINTQ_SERVER 0x00000200 1058#define SV_TYPE_DIALIN_SERVER 0x00000400 1059#define SV_TYPE_XENIX_SERVER 0x00000800 1060#define SV_TYPE_SERVER_UNIX SV_TYPE_XENIX_SERVER 1061#define SV_TYPE_NT 0x00001000 /* NT Workstation */ 1062#define SV_TYPE_WFW 0x00002000 /* Windows for Workgroups */ 1063 1064#define SV_TYPE_SERVER_MFPN 0x00004000 1065#define SV_TYPE_SERVER_NT 0x00008000 /* NT Server */ 1066#define SV_TYPE_POTENTIAL_BROWSER 0x00010000 1067#define SV_TYPE_BACKUP_BROWSER 0x00020000 1068#define SV_TYPE_MASTER_BROWSER 0x00040000 1069#define SV_TYPE_DOMAIN_MASTER 0x00080000 1070#define SV_TYPE_SERVER_OSF 0x00100000 1071#define SV_TYPE_SERVER_VMS 0x00200000 1072#define SV_TYPE_WINDOWS 0x00400000 /* Windows95 and above */ 1073#define SV_TYPE_ALTERNATE_XPORT 0x20000000 /* Return alt transport list */ 1074#define SV_TYPE_LOCAL_LIST_ONLY 0x40000000 /* Return local list only */ 1075#define SV_TYPE_DOMAIN_ENUM 0x80000000 1076#define SV_TYPE_ALL 0xFFFFFFFF /* handy for NetServerEnum2 */ 1077 1078#define SV_TYPE_DEFAULT (SV_TYPE_WORKSTATION | SV_TYPE_SERVER | SV_TYPE_NT | \ 1079 SV_TYPE_SERVER_NT) 1080 1081/* Special value for sv102_disc that specifies infinite disconnect time */ 1082#define SV_NODISC (-1L) /* No autodisconnect timeout enforced */ 1083 1084/* Values of svX_security field */ 1085#define SV_USERSECURITY 1 1086#define SV_SHARESECURITY 0 1087 1088/* Values of svX_hidden field */ 1089#define SV_HIDDEN 1 1090#define SV_VISIBLE 0 1091 1092 1093struct mslm_SERVER_INFO_100 { 1094 DWORD sv100_platform_id; 1095 LPTSTR sv100_name; 1096}; 1097 1098struct mslm_SERVER_INFO_101 { 1099 DWORD sv101_platform_id; 1100 LPTSTR sv101_name; 1101 DWORD sv101_version_major; 1102 DWORD sv101_version_minor; 1103 DWORD sv101_type; 1104 LPTSTR sv101_comment; 1105}; 1106 1107struct mslm_SERVER_INFO_102 { 1108 DWORD sv102_platform_id; 1109 LPTSTR sv102_name; 1110 DWORD sv102_version_major; 1111 DWORD sv102_version_minor; 1112 DWORD sv102_type; 1113 LPTSTR sv102_comment; 1114 DWORD sv102_users; 1115 DWORD sv102_disc; 1116 DWORD sv102_hidden; /* BOOL */ 1117 DWORD sv102_announce; 1118 DWORD sv102_anndelta; 1119 DWORD sv102_licenses; 1120 LPTSTR sv102_userpath; 1121}; 1122 1123struct mslm_SERVER_INFO_502 { 1124 DWORD sv502_sessopens; 1125 DWORD sv502_sessvcs; 1126 DWORD sv502_opensearch; 1127 DWORD sv502_sizreqbuf; 1128 DWORD sv502_initworkitems; 1129 DWORD sv502_maxworkitems; 1130 DWORD sv502_rawworkitems; 1131 DWORD sv502_irpstacksize; 1132 DWORD sv502_maxrawbuflen; 1133 DWORD sv502_sessusers; 1134 DWORD sv502_sessconns; 1135 DWORD sv502_maxpagedmemoryusage; 1136 DWORD sv502_maxnonpagedmemoryusage; 1137 DWORD sv502_enablesoftcompat; 1138 DWORD sv502_enableforcedlogoff; 1139 DWORD sv502_timesource; 1140 DWORD sv502_acceptdownlevelapis; 1141 DWORD sv502_lmannounce; 1142}; 1143 1144struct mslm_SERVER_INFO_503 { 1145 DWORD sv503_sessopens; 1146 DWORD sv503_sessvcs; 1147 DWORD sv503_opensearch; 1148 DWORD sv503_sizreqbuf; 1149 DWORD sv503_initworkitems; 1150 DWORD sv503_maxworkitems; 1151 DWORD sv503_rawworkitems; 1152 DWORD sv503_irpstacksize; 1153 DWORD sv503_maxrawbuflen; 1154 DWORD sv503_sessusers; 1155 DWORD sv503_sessconns; 1156 DWORD sv503_maxpagedmemoryusage; 1157 DWORD sv503_maxnonpagedmemoryusage; 1158 DWORD sv503_enablesoftcompat; 1159 DWORD sv503_enableforcedlogoff; 1160 DWORD sv503_timesource; 1161 DWORD sv503_acceptdownlevelapis; 1162 DWORD sv503_lmannounce; 1163 LPTSTR sv503_domain; 1164 DWORD sv503_maxcopyreadlen; 1165 DWORD sv503_maxcopywritelen; 1166 DWORD sv503_minkeepsearch; 1167 DWORD sv503_maxkeepsearch; 1168 DWORD sv503_minkeepcomplsearch; 1169 DWORD sv503_maxkeepcomplsearch; 1170 DWORD sv503_threadcountadd; 1171 DWORD sv503_numblockthreads; 1172 DWORD sv503_scavtimeout; 1173 DWORD sv503_minrcvqueue; 1174 DWORD sv503_minfreeworkitems; 1175 DWORD sv503_xactmemsize; 1176 DWORD sv503_threadpriority; 1177 DWORD sv503_maxmpxct; 1178 DWORD sv503_oplockbreakwait; 1179 DWORD sv503_oplockbreakresponsewait; 1180 DWORD sv503_enableoplocks; 1181 DWORD sv503_enableoplockforceclose; 1182 DWORD sv503_enablefcbopens; 1183 DWORD sv503_enableraw; 1184 DWORD sv503_enablesharednetdrives; 1185 DWORD sv503_minfreeconnections; 1186 DWORD sv503_maxfreeconnections; 1187}; 1188 1189union mslm_NetServerGetInfo_ru { 1190 CASE(100) struct mslm_SERVER_INFO_100 *bufptr100; 1191 CASE(101) struct mslm_SERVER_INFO_101 *bufptr101; 1192 CASE(102) struct mslm_SERVER_INFO_102 *bufptr102; 1193 CASE(502) struct mslm_SERVER_INFO_502 *bufptr502; 1194 CASE(503) struct mslm_SERVER_INFO_503 *bufptr503; 1195 DEFAULT char *nullptr; 1196}; 1197 1198struct mslm_NetServerGetInfo_result { 1199 DWORD level; 1200 SWITCH(level) 1201 union mslm_NetServerGetInfo_ru bufptr; 1202}; 1203 1204 1205OPERATION(SRVSVC_OPNUM_NetServerGetInfo) 1206struct mslm_NetServerGetInfo { 1207 IN LPTSTR servername; 1208 IN DWORD level; 1209 OUT struct mslm_NetServerGetInfo_result result; 1210 OUT DWORD status; 1211}; 1212 1213/* 1214 * SRVSVC NetRemoteTOD ( 1215 * IN LPTSTR servername, 1216 * OUT _TIME_OF_DAY_INFO *bufptr, 1217 * OUT long status 1218 * ) 1219 */ 1220 1221struct mslm_TIME_OF_DAY_INFO { 1222 DWORD tod_elapsedt; 1223 DWORD tod_msecs; 1224 DWORD tod_hours; 1225 DWORD tod_mins; 1226 DWORD tod_secs; 1227 DWORD tod_hunds; 1228 DWORD tod_timezone; 1229 DWORD tod_tinterval; 1230 DWORD tod_day; 1231 DWORD tod_month; 1232 DWORD tod_year; 1233 DWORD tod_weekday; 1234}; 1235 1236OPERATION(SRVSVC_OPNUM_NetRemoteTOD) 1237struct mslm_NetRemoteTOD { 1238 IN LPTSTR servername; 1239 OUT struct mslm_TIME_OF_DAY_INFO *bufptr; 1240 OUT DWORD status; 1241}; 1242 1243#define NAMEFLAG_LM2 0x80000000 1244 1245#define NAMETYPE_USER 1 1246#define NAMETYPE_PASSWORD 2 1247#define NAMETYPE_GROUP 3 1248#define NAMETYPE_COMPUTER 4 1249#define NAMETYPE_EVENT 5 1250#define NAMETYPE_DOMAIN 6 1251#define NAMETYPE_SERVICE 7 1252#define NAMETYPE_NET 8 1253#define NAMETYPE_SHARE 9 1254#define NAMETYPE_MESSAGE 10 1255#define NAMETYPE_MESSAGEDEST 11 1256#define NAMETYPE_SHAREPASSWORD 12 1257#define NAMETYPE_WORKGROUP 13 1258 1259OPERATION(SRVSVC_OPNUM_NetNameValidate) 1260struct mslm_NetNameValidate { 1261 IN LPTSTR servername; 1262 IN REFERENCE LPTSTR pathname; 1263 IN DWORD type; 1264 IN DWORD flags; 1265 OUT DWORD status; 1266}; 1267 1268/* 1269 * SRVSVC NetShareEnum ( 1270 * IN LPTSTR servername, 1271 * IN DWORD level; 1272 * OUT union switch(level) { 1273 * case 0: struct { 1274 * DWORD entriesread; 1275 * [size_is(entriesread)] 1276 * _SHARE_INFO_0 *entries; 1277 * } *bufptr0; 1278 * case 1: struct { 1279 * DWORD entriesread; 1280 * [size_is(entriesread)] 1281 * _SHARE_INFO_1 *entries; 1282 * } *bufptr1; 1283 * ... 1284 * } bufptr, 1285 * IN DWORD prefmaxlen, 1286 * OUT DWORD totalentries, 1287 * IN OUT DWORD ?* resume_handle, 1288 * OUT DWORD status 1289 * ) 1290 */ 1291 1292/* 1293 * Share types for shiX_type fields - duplicated from smb.h 1294 */ 1295#ifndef _SHARE_TYPES_DEFINED_ 1296#define _SHARE_TYPES_DEFINED_ 1297#define STYPE_DISKTREE 0x00000000 1298#define STYPE_PRINTQ 0x00000001 1299#define STYPE_DEVICE 0x00000002 1300#define STYPE_IPC 0x00000003 1301#define STYPE_MASK 0x0000000F 1302#define STYPE_DFS 0x00000064 1303#define STYPE_HIDDEN 0x80000000 1304#define STYPE_SPECIAL 0x80000000 1305#endif /* _SHARE_TYPES_DEFINED_ */ 1306 1307/* Maximum uses for shiX_max_uses fields */ 1308#define SHI_USES_UNLIMITED (DWORD)-1 1309 1310INFONRES_RESULT(mslm_NetShareInfo,0) 1311INFONRES_RESULT(mslm_NetShareInfo,1) 1312INFONRES_RESULT(mslm_NetShareInfo,2) 1313INFONRES_RESULT(mslm_NetShareInfo,501) 1314INFONRES_RESULT(mslm_NetShareInfo,502) 1315 1316union mslm_NetShareAddInfo_u { 1317 CASE(2) struct mslm_NetShareInfo_2 *info2; 1318 CASE(502) struct mslm_NetShareInfo_502 *info502; 1319 DEFAULT char *nullptr; 1320}; 1321 1322struct mslm_NetShareAddInfo { 1323 DWORD switch_value; 1324 SWITCH(switch_value) 1325 union mslm_NetShareAddInfo_u un; 1326}; 1327 1328 1329OPERATION(SRVSVC_OPNUM_NetShareAdd) 1330struct mslm_NetShareAdd { 1331 IN LPTSTR servername; 1332 IN DWORD level; 1333 IN struct mslm_NetShareAddInfo info; 1334 INOUT DWORD *parm_err; 1335 OUT DWORD status; 1336}; 1337 1338 1339INFONRES_DEFINITION(mslm_NetShareEnum, 1340 INFONRES_UNION_ENTRY(mslm_NetShareInfo,0) 1341 INFONRES_UNION_ENTRY(mslm_NetShareInfo,1) 1342 INFONRES_UNION_ENTRY(mslm_NetShareInfo,2) 1343 INFONRES_UNION_ENTRY(mslm_NetShareInfo,501) 1344 INFONRES_UNION_ENTRY(mslm_NetShareInfo,502)) 1345 1346/* 1347 * NetShareEnum: enumerate all shares (see also NetShareEnumSticky). 1348 * Note: the server should ignore the content of servername. 1349 */ 1350OPERATION(SRVSVC_OPNUM_NetShareEnum) 1351struct mslm_NetShareEnum { 1352 IN LPTSTR servername; 1353 INOUT DWORD level; 1354 INOUT struct mslm_NetShareEnum_result result; 1355 IN DWORD prefmaxlen; 1356 OUT DWORD totalentries; 1357 INOUT DWORD *resume_handle; 1358 OUT DWORD status; 1359}; 1360 1361/* 1362 * Delete a share. The reserved field appears in netmon 1363 * but I've left it out in case it's not always present. 1364 * This won't affect RPC processing. 1365 */ 1366OPERATION(SRVSVC_OPNUM_NetShareDel) 1367struct mslm_NetShareDel { 1368 IN LPTSTR servername; 1369 IN REFERENCE LPTSTR netname; 1370 /* IN DWORD reserved; */ 1371 OUT DWORD status; 1372}; 1373 1374OPERATION(SRVSVC_OPNUM_NetShareCheck) 1375struct mslm_NetShareCheck { 1376 IN LPTSTR servername; 1377 IN REFERENCE LPTSTR path; 1378 OUT DWORD stype; 1379 OUT DWORD status; 1380}; 1381 1382/* 1383 * NetShareEnumSticky is the same as NetShareEnum except that 1384 * STYPE_SPECIAL (hidden or special) shares are not returned. 1385 * Note: the server should ignore the content of servername. 1386 */ 1387OPERATION(SRVSVC_OPNUM_NetShareEnumSticky) 1388struct mslm_NetShareEnumSticky { 1389 IN LPTSTR servername; 1390 INOUT DWORD level; 1391 INOUT struct mslm_NetShareEnum_result result; 1392 IN DWORD prefmaxlen; 1393 OUT DWORD totalentries; 1394 INOUT DWORD *resume_handle; 1395 OUT DWORD status; 1396}; 1397 1398/* 1399 * When you install Windows NT Server Tools on a Win95 client, 1400 * a security tab will be added to properties dialog box of files/folders. 1401 * Within this security tab, when you try to get/set permissions on a 1402 * file/folder the next two RPC calls are used. 1403 */ 1404OPERATION(SRVSVC_OPNUM_NetGetFileSecurity) 1405struct mslm_NetGetFileSecurity { 1406 IN LPTSTR servername; 1407 IN LPTSTR sharename; 1408 IN REFERENCE LPTSTR filename; 1409 IN DWORD securityinfo; 1410 1411 /* 1412 * Right now, we can't send back SD of the requested object 1413 * in RPC code, so we just reply with access denied error 1414 * code. Thus, this output declaration is only valid in this 1415 * case i.e., it's not complete. 1416 * It looks like: 1417 * 1418 * A Pointer 1419 * A Length 1420 * 1421 * A Pointer 1422 * A Length (equal to the prev length) 1423 * A buffer 1424 * 1425 * return value 1426 */ 1427 OUT DWORD length; 1428 OUT DWORD status; 1429}; 1430 1431/* 1432 * This is the request: 1433 * 1434 * R_SRVSVC: RPC Client call srvsvc:NetrpSetFileSecurity(..) 1435 * R_SRVSVC: SRVSVC_HANDLE ServerName = \\WK76-177 1436 * R_SRVSVC: LPWSTR ShareName = AFSHIN 1437 * R_SRVSVC: LPWSTR lpFileName = \salek.txt 1438 * R_SRVSVC: SECURITY_INFORMATION SecurityInformation = 4 (0x4) 1439 * -R_SRVSVC: PADT_SECURITY_DESCRIPTOR SecurityDescriptor {..} 1440 * R_SRVSVC: DWORD Length = 64 (0x40) 1441 * R_SRVSVC: LPBYTE Buffer = 4496048 (0x449AB0) 1442 * R_SRVSVC: LPBYTE Buffer [..] = 01 00 04 80 00 00 00 00 00 00 00 00 00 00 00 1443 * ... 1444 * 1445 * 000000A0 00 83 46 00 0B 00 00 00 00 00 00 00 0B 00 ..F........... 1446 * 000000B0 00 00 5C 00 5C 00 57 00 4B 00 37 00 36 00 2D 00 ..\.\.W.K.7.6.-. 1447 * 000000C0 31 00 37 00 37 00 00 00 08 00 16 83 46 00 07 00 1.7.7.......F... 1448 * 000000D0 00 00 00 00 00 00 07 00 00 00 41 00 46 00 53 00 ..........A.F.S. 1449 * 000000E0 48 00 49 00 4E 00 00 00 00 00 0B 00 00 00 00 00 H.I.N........... 1450 * 000000F0 00 00 0B 00 00 00 5C 00 73 00 61 00 6C 00 65 00 ......\.s.a.l.e. 1451 * 00000100 6B 00 2E 00 74 00 78 00 74 00 00 00 00 00 04 00 k...t.x.t....... 1452 * 00000110 00 00 40 00 00 00 B0 9A 44 00 40 00 00 00 01 00 ..@.....D.@..... 1453 * 00000120 04 80 00 00 00 00 00 00 00 00 00 00 00 00 14 00 ................ 1454 * 00000130 00 00 02 00 2C 00 01 00 00 00 00 00 24 00 00 00 ....,.......$... 1455 * 00000140 00 A0 01 05 00 00 00 00 00 05 15 00 00 00 1A 24 ...............$ 1456 * 00000150 44 38 90 00 0F 02 65 3A BE 4C FF 03 00 00 00 00 D8....e:.L...... 1457 * 00000160 00 00 00 00 00 00 00 00 00 00 .......... 1458 */ 1459OPERATION(SRVSVC_OPNUM_NetSetFileSecurity) 1460struct mslm_NetSetFileSecurity { 1461 IN LPTSTR servername; 1462 IN LPTSTR sharename; 1463 IN REFERENCE LPTSTR filename; 1464 IN DWORD securityinfo; 1465 /* 1466 * IN Security Descriptor (looks like): 1467 * Length1 1468 * Pointer 1469 * Length2 (== Length1) 1470 * buffer itself 1471 */ 1472 1473 OUT DWORD status; 1474}; 1475 1476/* 1477 * The SRVSVC already 1478 */ 1479INTERFACE(0) 1480union srvsvc_interface { 1481 CASE(SRVSVC_OPNUM_NetConnectEnum) 1482 struct mslm_NetConnectEnum NetConnectEnum; 1483 CASE(SRVSVC_OPNUM_NetFileEnum) 1484 struct mslm_NetFileEnum NetFileEnum; 1485 CASE(SRVSVC_OPNUM_NetFileClose) 1486 struct mslm_NetFileClose NetFileClose; 1487 CASE(SRVSVC_OPNUM_NetShareGetInfo) 1488 struct mlsm_NetShareGetInfo NetShareGetInfo; 1489 CASE(SRVSVC_OPNUM_NetShareSetInfo) 1490 struct mlsm_NetShareSetInfo NetShareSetInfo; 1491 CASE(SRVSVC_OPNUM_NetSessionDel) 1492 struct mslm_NetSessionDel NetSessionDel; 1493 CASE(SRVSVC_OPNUM_NetSessionEnum) 1494 struct mslm_NetSessionEnum NetSessionEnum; 1495 CASE(SRVSVC_OPNUM_NetServerGetInfo) 1496 struct mslm_NetServerGetInfo NetServerGetInfo; 1497 CASE(SRVSVC_OPNUM_NetRemoteTOD) 1498 struct mslm_NetRemoteTOD NetRemoteTOD; 1499 CASE(SRVSVC_OPNUM_NetNameValidate) 1500 struct mslm_NetNameValidate NetNameValidate; 1501 CASE(SRVSVC_OPNUM_NetShareAdd) 1502 struct mslm_NetShareAdd NetShareAdd; 1503 CASE(SRVSVC_OPNUM_NetShareDel) 1504 struct mslm_NetShareDel NetShareDel; 1505 CASE(SRVSVC_OPNUM_NetShareCheck) 1506 struct mslm_NetShareCheck NetShareCheck; 1507 CASE(SRVSVC_OPNUM_NetShareEnum) 1508 struct mslm_NetShareEnum NetShareEnum; 1509 CASE(SRVSVC_OPNUM_NetShareEnumSticky) 1510 struct mslm_NetShareEnumSticky NetShareEnumSticky; 1511 CASE(SRVSVC_OPNUM_NetGetFileSecurity) 1512 struct mslm_NetGetFileSecurity NetGetFileSecurity; 1513 CASE(SRVSVC_OPNUM_NetSetFileSecurity) 1514 struct mslm_NetSetFileSecurity NetSetFileSecurity; 1515}; 1516typedef union srvsvc_interface srvsvc_interface_t; 1517EXTERNTYPEINFO(srvsvc_interface) 1518 1519 1520 1521/* 1522 * WKSSVC - Workstation Service 1523 */ 1524 1525/* Windows NT */ 1526#define WKSSVC_OPNUM_NetWkstaGetInfo 0x00 1527#define WKSSVC_OPNUM_NetWkstaSetInfo 0x01 1528#define WKSSVC_OPNUM_NetWkstaUserEnum 0x02 1529#define WKSSVC_OPNUM_NetWkstaUserGetInfo 0x03 1530#define WKSSVC_OPNUM_NetWkstaUserSetInfo 0x04 1531#define WKSSVC_OPNUM_NetWkstaTransportEnum 0x05 1532#define WKSSVC_OPNUM_NetWkstaTransportAdd 0x06 1533#define WKSSVC_OPNUM_NetWkstaTransportDel 0x07 1534#define WKSSVC_OPNUM_NetUseAdd 0x08 1535#define WKSSVC_OPNUM_NetUseGetInfo 0x09 1536#define WKSSVC_OPNUM_NetUseDel 0x0a 1537#define WKSSVC_OPNUM_NetUseEnum 0x0b 1538#define WKSSVC_OPNUM_NetMessageBufferSend 0x0c 1539#define WKSSVC_OPNUM_NetWkstaStatisticsGet 0x0d 1540#define WKSSVC_OPNUM_NetLogonDomainNameAdd 0x0e 1541 1542/* Windows 2000 */ 1543#define WKSSVC_OPNUM_NetLogonDomainNameDel 0x0f 1544#define WKSSVC_OPNUM_NetJoinDomain 0x10 1545#define WKSSVC_OPNUM_NetUnjoinDomain 0x11 1546#define WKSSVC_OPNUM_NetValidateName 0x12 1547#define WKSSVC_OPNUM_NetRenameMachineInDomain 0x13 1548#define WKSSVC_OPNUM_NetGetJoinInformation 0x14 1549#define WKSSVC_OPNUM_NetGetJoinableOUs 0x15 1550#define WKSSVC_OPNUM_NetJoinDomain2 0x16 1551#define WKSSVC_OPNUM_NetUnjoinDomain2 0x17 1552#define WKSSVC_OPNUM_NetRenameMachineInDomain2 0x18 1553#define WKSSVC_OPNUM_NetValidateName2 0x19 1554#define WKSSVC_OPNUM_NetGetJoinableOUs2 0x1a 1555 1556/* Windows XP and Windows Server 2003 */ 1557#define WKSSVC_OPNUM_NetAddAlternateComputerName 0x1b 1558#define WKSSVC_OPNUM_NetRemoveAlternateComputerName 0x1c 1559#define WKSSVC_OPNUM_NetSetPrimaryComputerName 0x1d 1560#define WKSSVC_OPNUM_NetEnumerateComputerNames 0x1e 1561#define WKSSVC_OPNUM_NetWorkstationResetDfsCache 0x1f 1562 1563 1564struct mslm_WKSTA_INFO_100 { 1565 DWORD wki100_platform_id; 1566 LPTSTR wki100_computername; 1567 LPTSTR wki100_langroup; 1568 DWORD wki100_ver_major; 1569 DWORD wki100_ver_minor; 1570}; 1571 1572/* NetWkstaGetInfo only. System information - user access */ 1573struct mslm_WKSTA_INFO_101 { 1574 DWORD wki101_platform_id; 1575 LPTSTR wki101_computername; 1576 LPTSTR wki101_langroup; 1577 DWORD wki101_ver_major; 1578 DWORD wki101_ver_minor; 1579 LPTSTR wki101_lanroot; 1580}; 1581 1582/* NetWkstaGetInfo only. System information - admin or operator access */ 1583struct mslm_WKSTA_INFO_102 { 1584 DWORD wki102_platform_id; 1585 LPTSTR wki102_computername; 1586 LPTSTR wki102_langroup; 1587 DWORD wki102_ver_major; 1588 DWORD wki102_ver_minor; 1589 LPTSTR wki102_lanroot; 1590 DWORD wki102_logged_on_users; 1591}; 1592 1593struct mslm_WKSTA_INFO_502 { 1594 DWORD char_wait; 1595 DWORD collection_time; 1596 DWORD maximum_collection_count; 1597 DWORD keep_connection; 1598 DWORD max_commands; 1599 DWORD session_timeout; 1600 DWORD size_char_buf; 1601 DWORD max_threads; 1602 DWORD lock_quota; 1603 DWORD lock_increment; 1604 DWORD lock_maximum; 1605 DWORD pipe_increment; 1606 DWORD pipe_maximum; 1607 DWORD cache_file_timeout; 1608 DWORD dormant_file_limit; 1609 DWORD read_ahead_throughput; 1610 DWORD num_mailslot_buffers; 1611 DWORD num_srv_announce_buffers; 1612 DWORD max_illegal_dgram_events; 1613 DWORD dgram_event_reset_freq; 1614 DWORD log_election_packets; 1615 DWORD use_opportunistic_locking; 1616 DWORD use_unlock_behind; 1617 DWORD use_close_behind; 1618 DWORD buf_named_pipes; 1619 DWORD use_lock_read_unlock; 1620 DWORD utilize_nt_caching; 1621 DWORD use_raw_read; 1622 DWORD use_raw_write; 1623 DWORD use_write_raw_data; 1624 DWORD use_encryption; 1625 DWORD buf_files_deny_write; 1626 DWORD buf_read_only_files; 1627 DWORD force_core_create_mode; 1628 DWORD use_512_byte_max_transfer; 1629}; 1630 1631INFO1RES_DEFINITION(mslm_NetWkstaGetInfo, 1632 INFO1RES_UNION_ENTRY(mslm_WKSTA_INFO,100) 1633 INFO1RES_UNION_ENTRY(mslm_WKSTA_INFO,101) 1634 INFO1RES_UNION_ENTRY(mslm_WKSTA_INFO,102) 1635 INFO1RES_UNION_ENTRY(mslm_WKSTA_INFO,502)) 1636 1637INFO1RESBUF_DEFINITION(mslm_NetWkstaGetInfo, 1638 INFO1RESBUF_UNION_ENTRY(mslm_WKSTA_INFO,100) 1639 INFO1RESBUF_UNION_ENTRY(mslm_WKSTA_INFO,101) 1640 INFO1RESBUF_UNION_ENTRY(mslm_WKSTA_INFO,102) 1641 INFO1RESBUF_UNION_ENTRY(mslm_WKSTA_INFO,502)) 1642 1643 1644OPERATION(WKSSVC_OPNUM_NetWkstaGetInfo) 1645struct mslm_NetWkstaGetInfo { 1646 IN LPTSTR servername; 1647 IN DWORD level; 1648 OUT struct mslm_NetWkstaGetInfo_result result; 1649 OUT DWORD status; 1650}; 1651 1652/* 1653 *********************************************************************** 1654 * NetWkstaTransportEnum 1655 *********************************************************************** 1656 */ 1657 1658struct mslm_NetWkstaTransportInfo0 { 1659 DWORD quality_of_service; 1660 DWORD num_vcs; 1661 LPTSTR transport_name; 1662 LPTSTR transport_address; 1663 DWORD wan_ish; 1664}; 1665 1666struct mslm_NetWkstaTransportCtr0 { 1667 DWORD count; 1668 SIZE_IS(count) 1669 struct mslm_NetWkstaTransportInfo0 *ti0; 1670}; 1671 1672union mslm_NetWkstaTransportInfo_ru { 1673 CASE(0) struct mslm_NetWkstaTransportCtr0 *info0; 1674 DEFAULT char *nullptr; 1675}; 1676 1677struct mslm_NetWkstaTransportInfo { 1678 DWORD address; 1679 DWORD level; 1680 SWITCH(level) 1681 union mslm_NetWkstaTransportInfo_ru ru; 1682}; 1683 1684OPERATION(WKSSVC_OPNUM_NetWkstaTransportEnum) 1685struct mslm_NetWkstaTransportEnum { 1686 IN LPTSTR servername; 1687 INOUT struct mslm_NetWkstaTransportInfo info; 1688 IN DWORD pref_max_len; 1689 OUT DWORD total_entries; 1690 INOUT DWORD *resume_handle; 1691 OUT DWORD status; 1692}; 1693 1694/* 1695 * The WKSSVC already 1696 */ 1697INTERFACE(0) 1698union wkssvc_interface { 1699 CASE(WKSSVC_OPNUM_NetWkstaGetInfo) 1700 struct mslm_NetWkstaGetInfo NetWkstaGetInfo; 1701 CASE(WKSSVC_OPNUM_NetWkstaTransportEnum) 1702 struct mslm_NetWkstaTransportEnum NetWkstaTransportEnum; 1703}; 1704typedef union wkssvc_interface wkssvc_interface_t; 1705EXTERNTYPEINFO(wkssvc_interface) 1706 1707 1708#endif /* _MLSVC_LANMAN_NDL_ */ 1709