{
int sock;
int ret;
+ uint32_t nt_version = NETLOGON_VERSION_5 | NETLOGON_VERSION_5EX;
sock = open_udp_socket(server, LDAP_PORT );
if (sock == -1) {
return False;
}
- ret = send_cldap_netlogon(sock, realm, global_myname(), 6);
+ ret = send_cldap_netlogon(sock, realm, global_myname(), nt_version);
if (ret != 0) {
close(sock);
return False;
fstring tmp_dc_name;
struct messaging_context *msg_ctx = msg_context(mem_ctx);
struct nbt_ntlogon_packet *reply = NULL;
+ uint32_t nt_version = NETLOGON_VERSION_1 |
+ NETLOGON_VERSION_5 |
+ NETLOGON_VERSION_5EX_WITH_IP;
if (flags & DS_PDC_REQUIRED) {
name_type = NBT_NAME_PDC;
if (send_getdc_request(mem_ctx, msg_ctx,
&dclist[i].ss, domain_name,
- NULL, 11))
+ NULL, nt_version))
{
int k;
smb_msleep(100);
fstring name )
{
struct ip_service ip_list;
+ uint32_t nt_version = NETLOGON_VERSION_1;
ip_list.ss = *pss;
ip_list.port = 0;
/* try GETDC requests next */
if (send_getdc_request(mem_ctx, winbind_messaging_context(),
- pss, domain->name, &domain->sid, 1)) {
+ pss, domain->name, &domain->sid,
+ nt_version)) {
const char *dc_name = NULL;
int i;
smb_msleep(100);