summaryrefslogtreecommitdiff
path: root/source3/include
diff options
context:
space:
mode:
authorGerald Carter <jerry@samba.org>2003-10-01 21:18:32 +0000
committerGerald Carter <jerry@samba.org>2003-10-01 21:18:32 +0000
commitcbe69f65f69b0c7b7c2d0d32005da488b50e52ba (patch)
tree8ce2562d6dc6ecf8b8283224dc47993934f0393d /source3/include
parent27ef4dbc76199ef0f282a1303045e4f5eede4995 (diff)
downloadsamba-cbe69f65f69b0c7b7c2d0d32005da488b50e52ba.tar.gz
samba-cbe69f65f69b0c7b7c2d0d32005da488b50e52ba.tar.bz2
samba-cbe69f65f69b0c7b7c2d0d32005da488b50e52ba.zip
commit sign only patch from Andrew; bug 167; tested using 2k & XP clientspreviously joined to the Samba domain
(This used to be commit 3802f5895ee18507c6f467bd11db0b1147a6fdfd)
Diffstat (limited to 'source3/include')
-rw-r--r--source3/include/rpc_dce.h11
1 files changed, 9 insertions, 2 deletions
diff --git a/source3/include/rpc_dce.h b/source3/include/rpc_dce.h
index 2e4a418bb7..52fe08d875 100644
--- a/source3/include/rpc_dce.h
+++ b/source3/include/rpc_dce.h
@@ -61,8 +61,14 @@ enum RPC_PKT_TYPE
/* Netlogon schannel auth type and level */
#define NETSEC_AUTH_TYPE 0x44
-#define NETSEC_SIGNATURE { 0x77, 0x00, 0x7a, 0x00, 0xff, 0xff, 0x00, 0x00 }
+#define NETSEC_SIGN_SIGNATURE { 0x77, 0x00, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00 }
+#define NETSEC_SEAL_SIGNATURE { 0x77, 0x00, 0x7a, 0x00, 0xff, 0xff, 0x00, 0x00 }
#define RPC_AUTH_NETSEC_CHK_LEN 0x20
+
+/* The 7 here seems to be required to get Win2k not to downgrade us
+ to NT4. Actually, anything other than 1ff would seem to do... */
+#define NETLOGON_NEG_AUTH2_FLAGS 0x000701ff
+
#define NETLOGON_NEG_SCHANNEL 0x40000000
enum netsec_direction
@@ -239,13 +245,14 @@ typedef struct rpc_auth_netsec_chk_info
uint8 sig [8]; /* 77 00 7a 00 ff ff 00 00 */
uint8 packet_digest[8]; /* checksum over the packet, MD5'ed with session key */
uint8 seq_num[8]; /* verifier, seq num */
- uint8 data8[8]; /* random 8-byte nonce */
+ uint8 confounder[8]; /* random 8-byte nonce */
} RPC_AUTH_NETSEC_CHK;
struct netsec_auth_struct
{
uchar sess_key[16];
uint32 seq_num;
+ int auth_flags;
};
/* RPC_BIND_REQ - ms req bind */