2 Unix SMB/CIFS implementation.
3 SMB parameters and setup
4 Copyright (C) Andrew Tridgell 1992-1997
5 Copyright (C) Luke Kenneth Casson Leighton 1996-1997
6 Copyright (C) Paul Ashton 1997
7 Copyright (C) Jean François Micouleau 2002
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 2 of the License, or
12 (at your option) any later version.
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
19 You should have received a copy of the GNU General Public License
20 along with this program; if not, write to the Free Software
21 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
24 #ifndef _RPC_NETLOGON_H /* _RPC_NETLOGON_H */
25 #define _RPC_NETLOGON_H
29 #define NET_SAMLOGON 0x02
30 #define NET_SAMLOGOFF 0x03
31 #define NET_REQCHAL 0x04
33 #define NET_SRVPWSET 0x06
34 #define NET_SAM_DELTAS 0x07
35 #define NET_LOGON_CTRL 0x0c
36 #define NET_GETDCNAME 0x0d
37 #define NET_AUTH2 0x0f
38 #define NET_LOGON_CTRL2 0x0e
39 #define NET_SAM_SYNC 0x10
40 #define NET_TRUST_DOM_LIST 0x13
41 #define NET_AUTH3 0x1a
43 /* Secure Channel types. used in NetrServerAuthenticate negotiation */
44 #define SEC_CHAN_WKSTA 2
45 #define SEC_CHAN_DOMAIN 4
46 #define SEC_CHAN_BDC 6
48 /* Returned delta types */
49 #define SAM_DELTA_DOMAIN_INFO 0x01
50 #define SAM_DELTA_GROUP_INFO 0x02
51 #define SAM_DELTA_RENAME_GROUP 0x04
52 #define SAM_DELTA_ACCOUNT_INFO 0x05
53 #define SAM_DELTA_RENAME_USER 0x07
54 #define SAM_DELTA_GROUP_MEM 0x08
55 #define SAM_DELTA_ALIAS_INFO 0x09
56 #define SAM_DELTA_RENAME_ALIAS 0x0b
57 #define SAM_DELTA_ALIAS_MEM 0x0c
58 #define SAM_DELTA_POLICY_INFO 0x0d
59 #define SAM_DELTA_TRUST_DOMS 0x0e
60 #define SAM_DELTA_PRIVS_INFO 0x10 /* DT_DELTA_ACCOUNTS */
61 #define SAM_DELTA_SECRET_INFO 0x12
62 #define SAM_DELTA_DELETE_GROUP 0x14
63 #define SAM_DELTA_DELETE_USER 0x15
64 #define SAM_DELTA_MODIFIED_COUNT 0x16
66 /* SAM database types */
67 #define SAM_DATABASE_DOMAIN 0x00 /* Domain users and groups */
68 #define SAM_DATABASE_BUILTIN 0x01 /* BUILTIN users and groups */
69 #define SAM_DATABASE_PRIVS 0x02 /* Privileges */
71 /* flags use when sending a NETLOGON_CONTROL request */
73 #define NETLOGON_CONTROL_SYNC 0x2
74 #define NETLOGON_CONTROL_REDISCOVER 0x5
75 #define NETLOGON_CONTROL_TC_QUERY 0x6
76 #define NETLOGON_CONTROL_TRANSPORT_NOTIFY 0x7
77 #define NETLOGON_CONTROL_SET_DBFLAG 0xfffe
79 /* Some flag values reverse engineered from NLTEST.EXE */
80 /* used in the NETLOGON_CONTROL[2] reply */
82 #define NL_CTRL_IN_SYNC 0x0000
83 #define NL_CTRL_REPL_NEEDED 0x0001
84 #define NL_CTRL_REPL_IN_PROGRESS 0x0002
85 #define NL_CTRL_FULL_SYNC 0x0004
87 #define LOGON_EXTRA_SIDS 0x0020
88 #define LOGON_RESOURCE_GROUPS 0x0200
90 #define SE_GROUP_MANDATORY 0x00000001
91 #define SE_GROUP_ENABLED_BY_DEFAULT 0x00000002
92 #define SE_GROUP_ENABLED 0x00000004
93 #define SE_GROUP_OWNER 0x00000008
94 #define SE_GROUP_USE_FOR_DENY_ONLY 0x00000010
95 #define SE_GROUP_LOGON_ID 0xC0000000
96 #define SE_GROUP_RESOURCE 0x20000000
98 /* Flags for controlling the behaviour of a particular logon */
99 #define MSV1_0_ALLOW_SERVER_TRUST_ACCOUNT ( 0x020 )
100 #define MSV1_0_ALLOW_WORKSTATION_TRUST_ACCOUNT ( 0x800 )
103 /* I think this is correct - it's what gets parsed on the wire. JRA. */
104 /* NET_USER_INFO_2 */
105 typedef struct net_user_info_2 {
106 uint32 ptr_user_info;
108 NTTIME logon_time; /* logon time */
109 NTTIME logoff_time; /* logoff time */
110 NTTIME kickoff_time; /* kickoff time */
111 NTTIME pass_last_set_time; /* password last set time */
112 NTTIME pass_can_change_time; /* password can change time */
113 NTTIME pass_must_change_time; /* password must change time */
115 UNIHDR hdr_user_name; /* username unicode string header */
116 UNIHDR hdr_full_name; /* user's full name unicode string header */
117 UNIHDR hdr_logon_script; /* logon script unicode string header */
118 UNIHDR hdr_profile_path; /* profile path unicode string header */
119 UNIHDR hdr_home_dir; /* home directory unicode string header */
120 UNIHDR hdr_dir_drive; /* home directory drive unicode string header */
122 uint16 logon_count; /* logon count */
123 uint16 bad_pw_count; /* bad password count */
125 uint32 user_id; /* User ID */
126 uint32 group_id; /* Group ID */
127 uint32 num_groups; /* num groups */
128 uint32 buffer_groups; /* undocumented buffer pointer to groups. */
129 uint32 user_flgs; /* user flags */
131 uint8 user_sess_key[16]; /* unused user session key */
133 UNIHDR hdr_logon_srv; /* logon server unicode string header */
134 UNIHDR hdr_logon_dom; /* logon domain unicode string header */
136 uint32 buffer_dom_id; /* undocumented logon domain id pointer */
137 uint8 padding[40]; /* unused padding bytes. expansion room */
139 UNISTR2 uni_user_name; /* username unicode string */
140 UNISTR2 uni_full_name; /* user's full name unicode string */
141 UNISTR2 uni_logon_script; /* logon script unicode string */
142 UNISTR2 uni_profile_path; /* profile path unicode string */
143 UNISTR2 uni_home_dir; /* home directory unicode string */
144 UNISTR2 uni_dir_drive; /* home directory drive unicode string */
146 uint32 num_groups2; /* num groups */
147 DOM_GID *gids; /* group info */
149 UNISTR2 uni_logon_srv; /* logon server unicode string */
150 UNISTR2 uni_logon_dom; /* logon domain unicode string */
152 DOM_SID2 dom_sid; /* domain SID */
154 uint32 num_other_groups; /* other groups */
155 DOM_GID *other_gids; /* group info */
156 DOM_SID2 *other_sids; /* undocumented - domain SIDs */
161 /* NET_USER_INFO_3 */
162 typedef struct net_user_info_3 {
163 uint32 ptr_user_info;
165 NTTIME logon_time; /* logon time */
166 NTTIME logoff_time; /* logoff time */
167 NTTIME kickoff_time; /* kickoff time */
168 NTTIME pass_last_set_time; /* password last set time */
169 NTTIME pass_can_change_time; /* password can change time */
170 NTTIME pass_must_change_time; /* password must change time */
172 UNIHDR hdr_user_name; /* username unicode string header */
173 UNIHDR hdr_full_name; /* user's full name unicode string header */
174 UNIHDR hdr_logon_script; /* logon script unicode string header */
175 UNIHDR hdr_profile_path; /* profile path unicode string header */
176 UNIHDR hdr_home_dir; /* home directory unicode string header */
177 UNIHDR hdr_dir_drive; /* home directory drive unicode string header */
179 uint16 logon_count; /* logon count */
180 uint16 bad_pw_count; /* bad password count */
182 uint32 user_rid; /* User RID */
183 uint32 group_rid; /* Group RID */
185 uint32 num_groups; /* num groups */
186 uint32 buffer_groups; /* undocumented buffer pointer to groups. */
187 uint32 user_flgs; /* user flags */
189 uint8 user_sess_key[16]; /* user session key */
191 UNIHDR hdr_logon_srv; /* logon server unicode string header */
192 UNIHDR hdr_logon_dom; /* logon domain unicode string header */
194 uint32 buffer_dom_id; /* undocumented logon domain id pointer */
195 uint8 lm_sess_key[8]; /* lm session key */
196 uint32 acct_flags; /* account flags */
197 uint32 unknown[7]; /* unknown */
199 uint32 num_other_sids; /* number of foreign/trusted domain sids */
200 uint32 buffer_other_sids;
202 /* The next three uint32 are not really part of user_info_3 but here
203 * for parsing convenience. They are only valid in Kerberos PAC
204 * parsing - Guenther */
205 uint32 ptr_res_group_dom_sid;
206 uint32 res_group_count;
207 uint32 ptr_res_groups;
209 UNISTR2 uni_user_name; /* username unicode string */
210 UNISTR2 uni_full_name; /* user's full name unicode string */
211 UNISTR2 uni_logon_script; /* logon script unicode string */
212 UNISTR2 uni_profile_path; /* profile path unicode string */
213 UNISTR2 uni_home_dir; /* home directory unicode string */
214 UNISTR2 uni_dir_drive; /* home directory drive unicode string */
216 uint32 num_groups2; /* num groups */
217 DOM_GID *gids; /* group info */
219 UNISTR2 uni_logon_srv; /* logon server unicode string */
220 UNISTR2 uni_logon_dom; /* logon domain unicode string */
222 DOM_SID2 dom_sid; /* domain SID */
224 DOM_SID2 *other_sids; /* foreign/trusted domain SIDs */
225 uint32 *other_sids_attrib;
229 /* NETLOGON_INFO_1 - pdc status info, i presume */
230 typedef struct netlogon_1_info {
231 uint32 flags; /* 0x0 - undocumented */
232 uint32 pdc_status; /* 0x0 - undocumented */
235 /* NETLOGON_INFO_2 - pdc status info, plus trusted domain info */
236 typedef struct netlogon_2_info {
237 uint32 flags; /* 0x0 - undocumented */
238 uint32 pdc_status; /* 0x0 - undocumented */
239 uint32 ptr_trusted_dc_name; /* pointer to trusted domain controller name */
241 UNISTR2 uni_trusted_dc_name; /* unicode string - trusted dc name */
244 /* NETLOGON_INFO_3 - logon status info, i presume */
245 typedef struct netlogon_3_info {
246 uint32 flags; /* 0x0 - undocumented */
247 uint32 logon_attempts; /* number of logon attempts */
248 uint32 reserved_1; /* 0x0 - undocumented */
249 uint32 reserved_2; /* 0x0 - undocumented */
250 uint32 reserved_3; /* 0x0 - undocumented */
251 uint32 reserved_4; /* 0x0 - undocumented */
252 uint32 reserved_5; /* 0x0 - undocumented */
255 /********************************************************
258 This is generated by a nltest /bdc_query:DOMAIN
260 query_level 0x1, function_code 0x1
262 ********************************************************/
264 /* NET_Q_LOGON_CTRL - LSA Netr Logon Control */
266 typedef struct net_q_logon_ctrl_info {
268 UNISTR2 uni_server_name;
269 uint32 function_code;
273 /* NET_R_LOGON_CTRL - LSA Netr Logon Control */
275 typedef struct net_r_logon_ctrl_info {
280 NETLOGON_INFO_1 info1;
287 typedef struct ctrl_data_info_5 {
288 uint32 function_code;
294 typedef struct ctrl_data_info_6 {
295 uint32 function_code;
302 /********************************************************
305 query_level 0x1 - pdc status
306 query_level 0x3 - number of logon attempts.
308 ********************************************************/
310 /* NET_Q_LOGON_CTRL2 - LSA Netr Logon Control 2 */
311 typedef struct net_q_logon_ctrl2_info {
312 uint32 ptr; /* undocumented buffer pointer */
313 UNISTR2 uni_server_name; /* server name, starting with two '\'s */
315 uint32 function_code;
318 CTRL_DATA_INFO_5 info5;
319 CTRL_DATA_INFO_6 info6;
323 /*******************************************************
324 Logon Control Response
326 switch_value is same as query_level in request
327 *******************************************************/
329 /* NET_R_LOGON_CTRL2 - response to LSA Logon Control2 */
330 typedef struct net_r_logon_ctrl2_info {
331 uint32 switch_value; /* 0x1, 0x3 */
336 NETLOGON_INFO_1 info1;
337 NETLOGON_INFO_2 info2;
338 NETLOGON_INFO_3 info3;
342 NTSTATUS status; /* return code */
345 /* NET_Q_GETDCNAME - Ask a DC for a trusted DC name */
347 typedef struct net_q_getdcname {
348 uint32 ptr_logon_server;
349 UNISTR2 uni_logon_server;
350 uint32 ptr_domainname;
351 UNISTR2 uni_domainname;
354 /* NET_R_GETDCNAME - Ask a DC for a trusted DC name */
356 typedef struct net_r_getdcname {
362 /* NET_Q_TRUST_DOM_LIST - LSA Query Trusted Domains */
363 typedef struct net_q_trust_dom_info {
364 uint32 ptr; /* undocumented buffer pointer */
365 UNISTR2 uni_server_name; /* server name, starting with two '\'s */
366 } NET_Q_TRUST_DOM_LIST;
368 #define MAX_TRUST_DOMS 1
370 /* NET_R_TRUST_DOM_LIST - response to LSA Trusted Domains */
371 typedef struct net_r_trust_dom_info {
372 UNISTR2 uni_trust_dom_name[MAX_TRUST_DOMS];
374 NTSTATUS status; /* return code */
375 } NET_R_TRUST_DOM_LIST;
379 typedef struct neg_flags_info {
380 uint32 neg_flags; /* negotiated flags */
385 typedef struct net_q_req_chal_info {
386 uint32 undoc_buffer; /* undocumented buffer pointer */
387 UNISTR2 uni_logon_srv; /* logon server unicode string */
388 UNISTR2 uni_logon_clnt; /* logon client unicode string */
389 DOM_CHAL clnt_chal; /* client challenge */
394 typedef struct net_r_req_chal_info {
395 DOM_CHAL srv_chal; /* server challenge */
396 NTSTATUS status; /* return code */
400 typedef struct net_q_auth_info {
401 DOM_LOG_INFO clnt_id; /* client identification info */
402 DOM_CHAL clnt_chal; /* client-calculated credentials */
406 typedef struct net_r_auth_info {
407 DOM_CHAL srv_chal; /* server-calculated credentials */
408 NTSTATUS status; /* return code */
412 typedef struct net_q_auth2_info {
413 DOM_LOG_INFO clnt_id; /* client identification info */
414 DOM_CHAL clnt_chal; /* client-calculated credentials */
416 NEG_FLAGS clnt_flgs; /* usually 0x0000 01ff */
421 typedef struct net_r_auth2_info {
422 DOM_CHAL srv_chal; /* server-calculated credentials */
423 NEG_FLAGS srv_flgs; /* usually 0x0000 01ff */
424 NTSTATUS status; /* return code */
428 typedef struct net_q_auth3_info {
429 DOM_LOG_INFO clnt_id; /* client identification info */
430 DOM_CHAL clnt_chal; /* client-calculated credentials */
431 NEG_FLAGS clnt_flgs; /* usually 0x6007 ffff */
435 typedef struct net_r_auth3_info {
436 DOM_CHAL srv_chal; /* server-calculated credentials */
437 NEG_FLAGS srv_flgs; /* usually 0x6007 ffff */
438 uint32 unknown; /* 0x0000045b */
439 NTSTATUS status; /* return code */
443 /* NET_Q_SRV_PWSET */
444 typedef struct net_q_srv_pwset_info {
445 DOM_CLNT_INFO clnt_id; /* client identification/authentication info */
446 uint8 pwd[16]; /* new password - undocumented. */
449 /* NET_R_SRV_PWSET */
450 typedef struct net_r_srv_pwset_info {
451 DOM_CRED srv_cred; /* server-calculated credentials */
453 NTSTATUS status; /* return code */
457 typedef struct net_network_info_2 {
458 uint32 ptr_id_info2; /* pointer to id_info_2 */
459 UNIHDR hdr_domain_name; /* domain name unicode header */
460 uint32 param_ctrl; /* param control (0x2) */
461 DOM_LOGON_ID logon_id; /* logon ID */
462 UNIHDR hdr_user_name; /* user name unicode header */
463 UNIHDR hdr_wksta_name; /* workstation name unicode header */
464 uint8 lm_chal[8]; /* lan manager 8 byte challenge */
465 STRHDR hdr_nt_chal_resp; /* nt challenge response */
466 STRHDR hdr_lm_chal_resp; /* lm challenge response */
468 UNISTR2 uni_domain_name; /* domain name unicode string */
469 UNISTR2 uni_user_name; /* user name unicode string */
470 UNISTR2 uni_wksta_name; /* workgroup name unicode string */
471 STRING2 nt_chal_resp; /* nt challenge response */
472 STRING2 lm_chal_resp; /* lm challenge response */
476 typedef struct id_info_1 {
477 uint32 ptr_id_info1; /* pointer to id_info_1 */
478 UNIHDR hdr_domain_name; /* domain name unicode header */
479 uint32 param_ctrl; /* param control */
480 DOM_LOGON_ID logon_id; /* logon ID */
481 UNIHDR hdr_user_name; /* user name unicode header */
482 UNIHDR hdr_wksta_name; /* workstation name unicode header */
483 OWF_INFO lm_owf; /* LM OWF Password */
484 OWF_INFO nt_owf; /* NT OWF Password */
485 UNISTR2 uni_domain_name; /* domain name unicode string */
486 UNISTR2 uni_user_name; /* user name unicode string */
487 UNISTR2 uni_wksta_name; /* workgroup name unicode string */
490 #define INTERACTIVE_LOGON_TYPE 1
491 #define NET_LOGON_TYPE 2
493 /* NET_ID_INFO_CTR */
494 typedef struct net_id_info_ctr_info {
498 NET_ID_INFO_1 id1; /* auth-level 1 - interactive user login */
499 NET_ID_INFO_2 id2; /* auth-level 2 - workstation referred login */
503 /* SAM_INFO - sam logon/off id structure */
504 typedef struct sam_info {
505 DOM_CLNT_INFO2 client;
506 uint32 ptr_rtn_cred; /* pointer to return credentials */
507 DOM_CRED rtn_cred; /* return credentials */
509 NET_ID_INFO_CTR *ctr;
512 /* NET_Q_SAM_LOGON */
513 typedef struct net_q_sam_logon_info {
515 uint16 validation_level;
518 /* NET_R_SAM_LOGON */
519 typedef struct net_r_sam_logon_info {
520 uint32 buffer_creds; /* undocumented buffer pointer */
521 DOM_CRED srv_creds; /* server credentials. server time stamp appears to be ignored. */
523 uint16 switch_value; /* 3 - indicates type of USER INFO */
524 NET_USER_INFO_3 *user;
526 uint32 auth_resp; /* 1 - Authoritative response; 0 - Non-Auth? */
528 NTSTATUS status; /* return code */
532 /* NET_Q_SAM_LOGOFF */
533 typedef struct net_q_sam_logoff_info {
537 /* NET_R_SAM_LOGOFF */
538 typedef struct net_r_sam_logoff_info {
539 uint32 buffer_creds; /* undocumented buffer pointer */
540 DOM_CRED srv_creds; /* server credentials. server time stamp appears to be ignored. */
541 NTSTATUS status; /* return code */
545 typedef struct net_q_sam_sync_info {
546 UNISTR2 uni_srv_name; /* \\PDC */
547 UNISTR2 uni_cli_name; /* BDC */
552 uint32 restart_state;
555 uint32 max_size; /* preferred maximum length */
559 typedef struct sam_delta_hdr_info {
560 uint16 type; /* type of structure attached */
569 typedef struct account_lockout_string {
573 /* uint16 *bindata; */
574 UINT64_S lockout_duration;
575 UINT64_S reset_count;
576 uint32 bad_attempt_lockout;
580 /* HDR_LOCKOUT_STRING */
581 typedef struct hdr_account_lockout_string {
585 } HDR_LOCKOUT_STRING;
587 /* SAM_DOMAIN_INFO (0x1) */
588 typedef struct sam_domain_info_info {
592 UINT64_S force_logoff;
594 uint16 pwd_history_len;
595 UINT64_S max_pwd_age;
596 UINT64_S min_pwd_age;
597 UINT64_S dom_mod_count;
598 NTTIME creation_time;
599 uint32 security_information;
601 BUFHDR4 hdr_sec_desc; /* security descriptor */
603 HDR_LOCKOUT_STRING hdr_account_lockout;
609 UNISTR2 uni_dom_name;
610 UNISTR2 buf_oem_info;
612 RPC_DATA_BLOB buf_sec_desc;
614 LOCKOUT_STRING account_lockout;
616 UNISTR2 buf_unknown2;
617 UNISTR2 buf_unknown3;
618 UNISTR2 buf_unknown4;
620 uint32 logon_chgpass;
626 /* SAM_GROUP_INFO (0x2) */
627 typedef struct sam_group_info_info {
631 BUFHDR2 hdr_sec_desc; /* security descriptor */
634 UNISTR2 uni_grp_name;
635 UNISTR2 uni_grp_desc;
636 RPC_DATA_BLOB buf_sec_desc;
640 typedef struct sam_passwd_info {
641 /* this structure probably contains password history */
642 /* this is probably a count of lm/nt pairs */
643 uint32 unk_0; /* 0x0000 0002 */
646 uint8 buf_lm_pwd[16];
649 uint8 buf_nt_pwd[16];
655 /* SAM_ACCOUNT_INFO (0x5) */
656 typedef struct sam_account_info_info {
657 UNIHDR hdr_acct_name;
658 UNIHDR hdr_full_name;
664 UNIHDR hdr_dir_drive;
665 UNIHDR hdr_logon_script;
666 UNIHDR hdr_acct_desc;
667 UNIHDR hdr_workstations;
672 uint32 logon_divs; /* 0xA8 */
673 uint32 ptr_logon_hrs;
675 uint16 bad_pwd_count;
677 NTTIME pwd_last_set_time;
678 NTTIME acct_expiry_time;
683 uint8 nt_pwd_present;
684 uint8 lm_pwd_present;
688 UNIHDR hdr_parameters;
692 BUFHDR2 hdr_sec_desc; /* security descriptor */
695 UNIHDR hdr_reserved[3]; /* space for more strings */
696 uint32 dw_reserved[4]; /* space for more data - first two seem to
699 UNISTR2 uni_acct_name;
700 UNISTR2 uni_full_name;
701 UNISTR2 uni_home_dir;
702 UNISTR2 uni_dir_drive;
703 UNISTR2 uni_logon_script;
704 UNISTR2 uni_acct_desc;
705 UNISTR2 uni_workstations;
707 uint32 unknown1; /* 0x4EC */
708 uint32 unknown2; /* 0 */
710 RPC_DATA_BLOB buf_logon_hrs;
712 UNISTR2 uni_parameters;
714 RPC_DATA_BLOB buf_sec_desc;
718 /* SAM_GROUP_MEM_INFO (0x8) */
719 typedef struct sam_group_mem_info_info {
731 } SAM_GROUP_MEM_INFO;
733 /* SAM_ALIAS_INFO (0x9) */
734 typedef struct sam_alias_info_info {
737 BUFHDR2 hdr_sec_desc; /* security descriptor */
741 UNISTR2 uni_als_name;
742 RPC_DATA_BLOB buf_sec_desc;
743 UNISTR2 uni_als_desc;
746 /* SAM_ALIAS_MEM_INFO (0xC) */
747 typedef struct sam_alias_mem_info_info {
755 } SAM_ALIAS_MEM_INFO;
758 /* SAM_DELTA_POLICY (0x0D) */
760 uint32 max_log_size; /* 0x5000 */
761 UINT64_S audit_retention_period; /* 0 */
762 uint32 auditing_mode; /* 0 */
768 uint32 paged_pool_limit; /* 0x02000000 */
769 uint32 non_paged_pool_limit; /* 0x00100000 */
770 uint32 min_workset_size; /* 0x00010000 */
771 uint32 max_workset_size; /* 0x0f000000 */
772 uint32 page_file_limit; /* 0 */
773 UINT64_S time_limit; /* 0 */
774 NTTIME modify_time; /* 0x3c*/
775 NTTIME create_time; /* a7080110 */
776 BUFHDR2 hdr_sec_desc;
778 uint32 num_event_audit_options;
779 uint32 event_audit_option;
784 RPC_DATA_BLOB buf_sec_desc;
787 /* SAM_DELTA_TRUST_DOMS */
803 } SAM_DELTA_TRUSTDOMS;
805 /* SAM_DELTA_PRIVS (0x10) */
812 uint32 priv_attr_ptr;
813 uint32 priv_name_ptr;
815 uint32 paged_pool_limit; /* 0x02000000 */
816 uint32 non_paged_pool_limit; /* 0x00100000 */
817 uint32 min_workset_size; /* 0x00010000 */
818 uint32 max_workset_size; /* 0x0f000000 */
819 uint32 page_file_limit; /* 0 */
820 UINT64_S time_limit; /* 0 */
821 uint32 system_flags; /* 1 */
822 BUFHDR2 hdr_sec_desc;
826 uint32 attribute_count;
829 uint32 privlist_count;
830 UNIHDR *hdr_privslist;
831 UNISTR2 *uni_privslist;
833 RPC_DATA_BLOB buf_sec_desc;
836 /* SAM_DELTA_SECRET */
854 uint32 unknow2; /* 0x0 12 times */
857 uint32 reserved1; /* 0 */
862 uint32 reserved2; /* 0 */
870 /* SAM_DELTA_MOD_COUNT (0x16) */
873 uint32 dom_mod_count_ptr;
874 UINT64_S dom_mod_count; /* domain mod count at last sync */
875 } SAM_DELTA_MOD_COUNT;
877 typedef union sam_delta_ctr_info {
878 SAM_DOMAIN_INFO domain_info ;
879 SAM_GROUP_INFO group_info ;
880 SAM_ACCOUNT_INFO account_info;
881 SAM_GROUP_MEM_INFO grp_mem_info;
882 SAM_ALIAS_INFO alias_info ;
883 SAM_ALIAS_MEM_INFO als_mem_info;
884 SAM_DELTA_POLICY policy_info;
885 SAM_DELTA_PRIVS privs_info;
886 SAM_DELTA_MOD_COUNT mod_count;
887 SAM_DELTA_TRUSTDOMS trustdoms_info;
888 SAM_DELTA_SECRET secret_info;
892 typedef struct net_r_sam_sync_info {
902 SAM_DELTA_HDR *hdr_deltas;
903 SAM_DELTA_CTR *deltas;
908 /* NET_Q_SAM_DELTAS */
909 typedef struct net_q_sam_deltas_info {
910 UNISTR2 uni_srv_name;
911 UNISTR2 uni_cli_name;
916 UINT64_S dom_mod_count; /* domain mod count at last sync */
918 uint32 max_size; /* preferred maximum length */
921 /* NET_R_SAM_DELTAS */
922 typedef struct net_r_sam_deltas_info {
925 UINT64_S dom_mod_count; /* new domain mod count */
931 SAM_DELTA_HDR *hdr_deltas;
932 SAM_DELTA_CTR *deltas;
937 #endif /* _RPC_NETLOGON_H */