rerun
authorStefan Metzmacher <metze@sernet.de>
Fri, 14 Mar 2008 12:03:59 +0000 (13:03 +0100)
committerStefan Metzmacher <metze@sernet.de>
Fri, 2 May 2008 14:13:44 +0000 (16:13 +0200)
source/librpc/gen_ndr/ndr_winbind_protocol.c
source/librpc/gen_ndr/ndr_winbind_protocol.h
source/librpc/gen_ndr/winbind_protocol.h

index 3bd6c858ac652820a0fa454561e2dcae95894b5e..36b6eccc54a8308e405f6ddcefeee3f81f6a4629 100644 (file)
@@ -146,6 +146,7 @@ _PUBLIC_ void ndr_print_winbind_auth_level(struct ndr_print *ndr, const char *na
 
        switch (r) {
                case WINBIND_AUTH_LEVEL_COMPAT_AUTH_PLAIN: val = "WINBIND_AUTH_LEVEL_COMPAT_AUTH_PLAIN"; break;
+               case WINBIND_AUTH_LEVEL_COMPAT_AUTH_RESPONSE: val = "WINBIND_AUTH_LEVEL_COMPAT_AUTH_RESPONSE"; break;
        }
        ndr_print_enum(ndr, name, "ENUM", val, r);
 }
@@ -518,6 +519,185 @@ _PUBLIC_ void ndr_print_STRUCT_winbind_auth_compat_auth_rep(struct ndr_print *nd
        ndr->depth--;
 }
 
+static enum ndr_err_code ndr_push_STRUCT_winbind_auth_compat_auth_response_req(struct ndr_push *ndr, int ndr_flags, const struct winbind_auth_compat_auth_response_req *r)
+{
+       uint32_t cntr_require_membership_of_sids_1;
+       if (ndr_flags & NDR_SCALARS) {
+               NDR_CHECK(ndr_push_align(ndr, 4));
+               NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, r->flags));
+               NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->account_name, CH_UTF8)));
+               NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, 0));
+               NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->account_name, CH_UTF8)));
+               NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->account_name, ndr_charset_length(r->account_name, CH_UTF8), sizeof(uint8_t), CH_UTF8));
+               NDR_CHECK(ndr_push_unique_ptr(ndr, r->domain_name));
+               NDR_CHECK(ndr_push_unique_ptr(ndr, r->workstation_name));
+               NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, r->num_require_membership_of_sids));
+               NDR_CHECK(ndr_push_unique_ptr(ndr, r->require_membership_of_sids));
+               NDR_CHECK(ndr_push_netr_LogonParameterControl(ndr, NDR_SCALARS, r->logon_parameters));
+               NDR_CHECK(ndr_push_array_uint8(ndr, NDR_SCALARS, r->challenge, 8));
+               NDR_CHECK(ndr_push_DATA_BLOB(ndr, NDR_SCALARS, r->lm_response));
+               NDR_CHECK(ndr_push_DATA_BLOB(ndr, NDR_SCALARS, r->nt_response));
+       }
+       if (ndr_flags & NDR_BUFFERS) {
+               if (r->domain_name) {
+                       NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->domain_name, CH_UTF8)));
+                       NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, 0));
+                       NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->domain_name, CH_UTF8)));
+                       NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->domain_name, ndr_charset_length(r->domain_name, CH_UTF8), sizeof(uint8_t), CH_UTF8));
+               }
+               if (r->workstation_name) {
+                       NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->workstation_name, CH_UTF8)));
+                       NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, 0));
+                       NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->workstation_name, CH_UTF8)));
+                       NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->workstation_name, ndr_charset_length(r->workstation_name, CH_UTF8), sizeof(uint8_t), CH_UTF8));
+               }
+               if (r->require_membership_of_sids) {
+                       NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, r->num_require_membership_of_sids));
+                       for (cntr_require_membership_of_sids_1 = 0; cntr_require_membership_of_sids_1 < r->num_require_membership_of_sids; cntr_require_membership_of_sids_1++) {
+                               NDR_CHECK(ndr_push_dom_sid(ndr, NDR_SCALARS, &r->require_membership_of_sids[cntr_require_membership_of_sids_1]));
+                       }
+                       for (cntr_require_membership_of_sids_1 = 0; cntr_require_membership_of_sids_1 < r->num_require_membership_of_sids; cntr_require_membership_of_sids_1++) {
+                               NDR_CHECK(ndr_push_dom_sid(ndr, NDR_BUFFERS, &r->require_membership_of_sids[cntr_require_membership_of_sids_1]));
+                       }
+               }
+       }
+       return NDR_ERR_SUCCESS;
+}
+
+static enum ndr_err_code ndr_pull_STRUCT_winbind_auth_compat_auth_response_req(struct ndr_pull *ndr, int ndr_flags, struct winbind_auth_compat_auth_response_req *r)
+{
+       uint32_t _ptr_domain_name;
+       TALLOC_CTX *_mem_save_domain_name_0;
+       uint32_t _ptr_workstation_name;
+       TALLOC_CTX *_mem_save_workstation_name_0;
+       uint32_t _ptr_require_membership_of_sids;
+       uint32_t cntr_require_membership_of_sids_1;
+       TALLOC_CTX *_mem_save_require_membership_of_sids_0;
+       TALLOC_CTX *_mem_save_require_membership_of_sids_1;
+       if (ndr_flags & NDR_SCALARS) {
+               NDR_CHECK(ndr_pull_align(ndr, 4));
+               NDR_CHECK(ndr_pull_uint32(ndr, NDR_SCALARS, &r->flags));
+               NDR_CHECK(ndr_pull_array_size(ndr, &r->account_name));
+               NDR_CHECK(ndr_pull_array_length(ndr, &r->account_name));
+               if (ndr_get_array_length(ndr, &r->account_name) > ndr_get_array_size(ndr, &r->account_name)) {
+                       return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->account_name), ndr_get_array_length(ndr, &r->account_name));
+               }
+               NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->account_name), sizeof(uint8_t)));
+               NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->account_name, ndr_get_array_length(ndr, &r->account_name), sizeof(uint8_t), CH_UTF8));
+               NDR_CHECK(ndr_pull_generic_ptr(ndr, &_ptr_domain_name));
+               if (_ptr_domain_name) {
+                       NDR_PULL_ALLOC(ndr, r->domain_name);
+               } else {
+                       r->domain_name = NULL;
+               }
+               NDR_CHECK(ndr_pull_generic_ptr(ndr, &_ptr_workstation_name));
+               if (_ptr_workstation_name) {
+                       NDR_PULL_ALLOC(ndr, r->workstation_name);
+               } else {
+                       r->workstation_name = NULL;
+               }
+               NDR_CHECK(ndr_pull_uint32(ndr, NDR_SCALARS, &r->num_require_membership_of_sids));
+               NDR_CHECK(ndr_pull_generic_ptr(ndr, &_ptr_require_membership_of_sids));
+               if (_ptr_require_membership_of_sids) {
+                       NDR_PULL_ALLOC(ndr, r->require_membership_of_sids);
+               } else {
+                       r->require_membership_of_sids = NULL;
+               }
+               NDR_CHECK(ndr_pull_netr_LogonParameterControl(ndr, NDR_SCALARS, &r->logon_parameters));
+               NDR_CHECK(ndr_pull_array_uint8(ndr, NDR_SCALARS, r->challenge, 8));
+               NDR_CHECK(ndr_pull_DATA_BLOB(ndr, NDR_SCALARS, &r->lm_response));
+               NDR_CHECK(ndr_pull_DATA_BLOB(ndr, NDR_SCALARS, &r->nt_response));
+       }
+       if (ndr_flags & NDR_BUFFERS) {
+               if (r->domain_name) {
+                       _mem_save_domain_name_0 = NDR_PULL_GET_MEM_CTX(ndr);
+                       NDR_PULL_SET_MEM_CTX(ndr, r->domain_name, 0);
+                       NDR_CHECK(ndr_pull_array_size(ndr, &r->domain_name));
+                       NDR_CHECK(ndr_pull_array_length(ndr, &r->domain_name));
+                       if (ndr_get_array_length(ndr, &r->domain_name) > ndr_get_array_size(ndr, &r->domain_name)) {
+                               return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->domain_name), ndr_get_array_length(ndr, &r->domain_name));
+                       }
+                       NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->domain_name), sizeof(uint8_t)));
+                       NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->domain_name, ndr_get_array_length(ndr, &r->domain_name), sizeof(uint8_t), CH_UTF8));
+                       NDR_PULL_SET_MEM_CTX(ndr, _mem_save_domain_name_0, 0);
+               }
+               if (r->workstation_name) {
+                       _mem_save_workstation_name_0 = NDR_PULL_GET_MEM_CTX(ndr);
+                       NDR_PULL_SET_MEM_CTX(ndr, r->workstation_name, 0);
+                       NDR_CHECK(ndr_pull_array_size(ndr, &r->workstation_name));
+                       NDR_CHECK(ndr_pull_array_length(ndr, &r->workstation_name));
+                       if (ndr_get_array_length(ndr, &r->workstation_name) > ndr_get_array_size(ndr, &r->workstation_name)) {
+                               return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->workstation_name), ndr_get_array_length(ndr, &r->workstation_name));
+                       }
+                       NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->workstation_name), sizeof(uint8_t)));
+                       NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->workstation_name, ndr_get_array_length(ndr, &r->workstation_name), sizeof(uint8_t), CH_UTF8));
+                       NDR_PULL_SET_MEM_CTX(ndr, _mem_save_workstation_name_0, 0);
+               }
+               if (r->require_membership_of_sids) {
+                       _mem_save_require_membership_of_sids_0 = NDR_PULL_GET_MEM_CTX(ndr);
+                       NDR_PULL_SET_MEM_CTX(ndr, r->require_membership_of_sids, 0);
+                       NDR_CHECK(ndr_pull_array_size(ndr, &r->require_membership_of_sids));
+                       NDR_PULL_ALLOC_N(ndr, r->require_membership_of_sids, ndr_get_array_size(ndr, &r->require_membership_of_sids));
+                       _mem_save_require_membership_of_sids_1 = NDR_PULL_GET_MEM_CTX(ndr);
+                       NDR_PULL_SET_MEM_CTX(ndr, r->require_membership_of_sids, 0);
+                       for (cntr_require_membership_of_sids_1 = 0; cntr_require_membership_of_sids_1 < r->num_require_membership_of_sids; cntr_require_membership_of_sids_1++) {
+                               NDR_CHECK(ndr_pull_dom_sid(ndr, NDR_SCALARS, &r->require_membership_of_sids[cntr_require_membership_of_sids_1]));
+                       }
+                       for (cntr_require_membership_of_sids_1 = 0; cntr_require_membership_of_sids_1 < r->num_require_membership_of_sids; cntr_require_membership_of_sids_1++) {
+                               NDR_CHECK(ndr_pull_dom_sid(ndr, NDR_BUFFERS, &r->require_membership_of_sids[cntr_require_membership_of_sids_1]));
+                       }
+                       NDR_PULL_SET_MEM_CTX(ndr, _mem_save_require_membership_of_sids_1, 0);
+                       NDR_PULL_SET_MEM_CTX(ndr, _mem_save_require_membership_of_sids_0, 0);
+               }
+               if (r->require_membership_of_sids) {
+                       NDR_CHECK(ndr_check_array_size(ndr, (void*)&r->require_membership_of_sids, r->num_require_membership_of_sids));
+               }
+       }
+       return NDR_ERR_SUCCESS;
+}
+
+_PUBLIC_ void ndr_print_STRUCT_winbind_auth_compat_auth_response_req(struct ndr_print *ndr, const char *name, const struct winbind_auth_compat_auth_response_req *r)
+{
+       uint32_t cntr_require_membership_of_sids_1;
+       ndr_print_struct(ndr, name, "winbind_auth_compat_auth_response_req");
+       ndr->depth++;
+       ndr_print_uint32(ndr, "flags", r->flags);
+       ndr_print_string(ndr, "account_name", r->account_name);
+       ndr_print_ptr(ndr, "domain_name", r->domain_name);
+       ndr->depth++;
+       if (r->domain_name) {
+               ndr_print_string(ndr, "domain_name", r->domain_name);
+       }
+       ndr->depth--;
+       ndr_print_ptr(ndr, "workstation_name", r->workstation_name);
+       ndr->depth++;
+       if (r->workstation_name) {
+               ndr_print_string(ndr, "workstation_name", r->workstation_name);
+       }
+       ndr->depth--;
+       ndr_print_uint32(ndr, "num_require_membership_of_sids", r->num_require_membership_of_sids);
+       ndr_print_ptr(ndr, "require_membership_of_sids", r->require_membership_of_sids);
+       ndr->depth++;
+       if (r->require_membership_of_sids) {
+               ndr->print(ndr, "%s: ARRAY(%d)", "require_membership_of_sids", r->num_require_membership_of_sids);
+               ndr->depth++;
+               for (cntr_require_membership_of_sids_1=0;cntr_require_membership_of_sids_1<r->num_require_membership_of_sids;cntr_require_membership_of_sids_1++) {
+                       char *idx_1=NULL;
+                       if (asprintf(&idx_1, "[%d]", cntr_require_membership_of_sids_1) != -1) {
+                               ndr_print_dom_sid(ndr, "require_membership_of_sids", &r->require_membership_of_sids[cntr_require_membership_of_sids_1]);
+                               free(idx_1);
+                       }
+               }
+               ndr->depth--;
+       }
+       ndr->depth--;
+       ndr_print_netr_LogonParameterControl(ndr, "logon_parameters", r->logon_parameters);
+       ndr_print_array_uint8(ndr, "challenge", r->challenge, 8);
+       ndr_print_DATA_BLOB(ndr, "lm_response", r->lm_response);
+       ndr_print_DATA_BLOB(ndr, "nt_response", r->nt_response);
+       ndr->depth--;
+}
+
 static enum ndr_err_code ndr_push_winbind_auth_req(struct ndr_push *ndr, int ndr_flags, const union winbind_auth_req *r)
 {
        if (ndr_flags & NDR_SCALARS) {
@@ -528,6 +708,10 @@ static enum ndr_err_code ndr_push_winbind_auth_req(struct ndr_push *ndr, int ndr
                                NDR_CHECK(ndr_push_STRUCT_winbind_auth_compat_auth_plain_req(ndr, NDR_SCALARS, &r->compat_auth_plain));
                        break; }
 
+                       case WINBIND_AUTH_LEVEL_COMPAT_AUTH_RESPONSE: {
+                               NDR_CHECK(ndr_push_STRUCT_winbind_auth_compat_auth_response_req(ndr, NDR_SCALARS, &r->compat_auth_response));
+                       break; }
+
                        default: {
                        break; }
 
@@ -540,6 +724,10 @@ static enum ndr_err_code ndr_push_winbind_auth_req(struct ndr_push *ndr, int ndr
                                NDR_CHECK(ndr_push_STRUCT_winbind_auth_compat_auth_plain_req(ndr, NDR_BUFFERS, &r->compat_auth_plain));
                        break;
 
+                       case WINBIND_AUTH_LEVEL_COMPAT_AUTH_RESPONSE:
+                               NDR_CHECK(ndr_push_STRUCT_winbind_auth_compat_auth_response_req(ndr, NDR_BUFFERS, &r->compat_auth_response));
+                       break;
+
                        default:
                        break;
 
@@ -563,6 +751,10 @@ static enum ndr_err_code ndr_pull_winbind_auth_req(struct ndr_pull *ndr, int ndr
                                NDR_CHECK(ndr_pull_STRUCT_winbind_auth_compat_auth_plain_req(ndr, NDR_SCALARS, &r->compat_auth_plain));
                        break; }
 
+                       case WINBIND_AUTH_LEVEL_COMPAT_AUTH_RESPONSE: {
+                               NDR_CHECK(ndr_pull_STRUCT_winbind_auth_compat_auth_response_req(ndr, NDR_SCALARS, &r->compat_auth_response));
+                       break; }
+
                        default: {
                        break; }
 
@@ -574,6 +766,10 @@ static enum ndr_err_code ndr_pull_winbind_auth_req(struct ndr_pull *ndr, int ndr
                                NDR_CHECK(ndr_pull_STRUCT_winbind_auth_compat_auth_plain_req(ndr, NDR_BUFFERS, &r->compat_auth_plain));
                        break;
 
+                       case WINBIND_AUTH_LEVEL_COMPAT_AUTH_RESPONSE:
+                               NDR_CHECK(ndr_pull_STRUCT_winbind_auth_compat_auth_response_req(ndr, NDR_BUFFERS, &r->compat_auth_response));
+                       break;
+
                        default:
                        break;
 
@@ -592,6 +788,10 @@ _PUBLIC_ void ndr_print_winbind_auth_req(struct ndr_print *ndr, const char *name
                        ndr_print_STRUCT_winbind_auth_compat_auth_plain_req(ndr, "compat_auth_plain", &r->compat_auth_plain);
                break;
 
+               case WINBIND_AUTH_LEVEL_COMPAT_AUTH_RESPONSE:
+                       ndr_print_STRUCT_winbind_auth_compat_auth_response_req(ndr, "compat_auth_response", &r->compat_auth_response);
+               break;
+
                default:
                break;
 
@@ -608,6 +808,10 @@ static enum ndr_err_code ndr_push_winbind_auth_rep(struct ndr_push *ndr, int ndr
                                NDR_CHECK(ndr_push_STRUCT_winbind_auth_compat_auth_rep(ndr, NDR_SCALARS, &r->compat_auth));
                        break; }
 
+                       case WINBIND_AUTH_LEVEL_COMPAT_AUTH_RESPONSE: {
+                               NDR_CHECK(ndr_push_STRUCT_winbind_auth_compat_auth_rep(ndr, NDR_SCALARS, &r->compat_auth));
+                       break; }
+
                        default: {
                        break; }
 
@@ -620,6 +824,10 @@ static enum ndr_err_code ndr_push_winbind_auth_rep(struct ndr_push *ndr, int ndr
                                NDR_CHECK(ndr_push_STRUCT_winbind_auth_compat_auth_rep(ndr, NDR_BUFFERS, &r->compat_auth));
                        break;
 
+                       case WINBIND_AUTH_LEVEL_COMPAT_AUTH_RESPONSE:
+                               NDR_CHECK(ndr_push_STRUCT_winbind_auth_compat_auth_rep(ndr, NDR_BUFFERS, &r->compat_auth));
+                       break;
+
                        default:
                        break;
 
@@ -643,6 +851,10 @@ static enum ndr_err_code ndr_pull_winbind_auth_rep(struct ndr_pull *ndr, int ndr
                                NDR_CHECK(ndr_pull_STRUCT_winbind_auth_compat_auth_rep(ndr, NDR_SCALARS, &r->compat_auth));
                        break; }
 
+                       case WINBIND_AUTH_LEVEL_COMPAT_AUTH_RESPONSE: {
+                               NDR_CHECK(ndr_pull_STRUCT_winbind_auth_compat_auth_rep(ndr, NDR_SCALARS, &r->compat_auth));
+                       break; }
+
                        default: {
                        break; }
 
@@ -654,6 +866,10 @@ static enum ndr_err_code ndr_pull_winbind_auth_rep(struct ndr_pull *ndr, int ndr
                                NDR_CHECK(ndr_pull_STRUCT_winbind_auth_compat_auth_rep(ndr, NDR_BUFFERS, &r->compat_auth));
                        break;
 
+                       case WINBIND_AUTH_LEVEL_COMPAT_AUTH_RESPONSE:
+                               NDR_CHECK(ndr_pull_STRUCT_winbind_auth_compat_auth_rep(ndr, NDR_BUFFERS, &r->compat_auth));
+                       break;
+
                        default:
                        break;
 
@@ -672,6 +888,10 @@ _PUBLIC_ void ndr_print_winbind_auth_rep(struct ndr_print *ndr, const char *name
                        ndr_print_STRUCT_winbind_auth_compat_auth_rep(ndr, "compat_auth", &r->compat_auth);
                break;
 
+               case WINBIND_AUTH_LEVEL_COMPAT_AUTH_RESPONSE:
+                       ndr_print_STRUCT_winbind_auth_compat_auth_rep(ndr, "compat_auth", &r->compat_auth);
+               break;
+
                default:
                break;
 
index 49531832bd22ad628c41d2121f760da4eb5b5fbb..d10ee54b9e65973ee3d3457a50894ce52a8bb39e 100644 (file)
@@ -95,6 +95,7 @@ void ndr_print_STRUCT_winbind_header(struct ndr_print *ndr, const char *name, co
 void ndr_print_winbind_auth_level(struct ndr_print *ndr, const char *name, enum winbind_auth_level r);
 void ndr_print_STRUCT_winbind_auth_compat_auth_plain_req(struct ndr_print *ndr, const char *name, const struct winbind_auth_compat_auth_plain_req *r);
 void ndr_print_STRUCT_winbind_auth_compat_auth_rep(struct ndr_print *ndr, const char *name, const struct winbind_auth_compat_auth_rep *r);
+void ndr_print_STRUCT_winbind_auth_compat_auth_response_req(struct ndr_print *ndr, const char *name, const struct winbind_auth_compat_auth_response_req *r);
 void ndr_print_winbind_auth_req(struct ndr_print *ndr, const char *name, const union winbind_auth_req *r);
 void ndr_print_winbind_auth_rep(struct ndr_print *ndr, const char *name, const union winbind_auth_rep *r);
 void ndr_print_winbind_trust_level(struct ndr_print *ndr, const char *name, enum winbind_trust_level r);
index 965b8f66fc734242634ffc1defe25f6d4c89c746..4e155f4b39bcd0a1af9b514d5e12cedf8e17b214 100644 (file)
@@ -64,11 +64,13 @@ struct winbind_header {
 enum winbind_auth_level
 #ifndef USE_UINT_ENUMS
  {
-       WINBIND_AUTH_LEVEL_COMPAT_AUTH_PLAIN=1
+       WINBIND_AUTH_LEVEL_COMPAT_AUTH_PLAIN=1,
+       WINBIND_AUTH_LEVEL_COMPAT_AUTH_RESPONSE=2
 }
 #else
  { __donnot_use_enum_winbind_auth_level=0x7FFFFFFF}
 #define WINBIND_AUTH_LEVEL_COMPAT_AUTH_PLAIN ( 1 )
+#define WINBIND_AUTH_LEVEL_COMPAT_AUTH_RESPONSE ( 2 )
 #endif
 ;
 
@@ -91,8 +93,22 @@ struct winbind_auth_compat_auth_rep {
        DATA_BLOB *afs_token;/* [unique] */
 };
 
+struct winbind_auth_compat_auth_response_req {
+       uint32_t flags;
+       const char *account_name;/* [charset(UTF8)] */
+       const char *domain_name;/* [unique,charset(UTF8)] */
+       const char *workstation_name;/* [unique,charset(UTF8)] */
+       uint32_t num_require_membership_of_sids;
+       struct dom_sid *require_membership_of_sids;/* [unique,size_is(num_require_membership_of_sids)] */
+       uint32_t logon_parameters;
+       uint8_t challenge[8];
+       DATA_BLOB lm_response;
+       DATA_BLOB nt_response;
+};
+
 union winbind_auth_req {
        struct winbind_auth_compat_auth_plain_req compat_auth_plain;/* [case(WINBIND_AUTH_LEVEL_COMPAT_AUTH_PLAIN)] */
+       struct winbind_auth_compat_auth_response_req compat_auth_response;/* [case(WINBIND_AUTH_LEVEL_COMPAT_AUTH_RESPONSE)] */
 }/* [switch_type(winbind_auth_level)] */;
 
 union winbind_auth_rep {