mirror of
https://github.com/samba-team/samba.git
synced 2025-02-04 17:47:26 +03:00
8087d844ef
names rather than our crazy naming scheme. So DES is now called des_crypt() rather than smbhash() - added the code from the solution of the ADS crypto challenge that allows Samba to correctly handle a 128 bit session key in all of the netr_ServerAuthenticateX() varients. A huge thanks to Luke Howard from PADL for solving this one! - restructured the server side rpc authentication to allow for other than NTLMSSP sign and seal. This commit just adds the structure, the next commit will add schannel server side support. - added 128 bit session key support to our client side code, and testing against w2k3 with smbtorture. Works well. (This used to be commit 729b2f41c924a0b435d44a14209e6dacc2304cee)
46 lines
1.4 KiB
C
46 lines
1.4 KiB
C
/*
|
|
Unix SMB/CIFS implementation.
|
|
|
|
code to manipulate domain credentials
|
|
|
|
Copyright (C) Andrew Tridgell 2004
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; either version 2 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program; if not, write to the Free Software
|
|
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
|
*/
|
|
|
|
struct creds_CredentialState {
|
|
uint32_t negotiate_flags;
|
|
uint8_t session_key[16];
|
|
uint32_t sequence;
|
|
struct netr_Credential seed;
|
|
struct netr_Credential client;
|
|
struct netr_Credential server;
|
|
};
|
|
|
|
|
|
#define NETLOGON_NEG_128BIT 0x4000
|
|
|
|
|
|
/* for the timebeing, use the same neg flags as Samba3. */
|
|
/* The 7 here seems to be required to get Win2k not to downgrade us
|
|
to NT4. Actually, anything other than 1ff would seem to do... */
|
|
#define NETLOGON_NEG_AUTH2_FLAGS 0x000701ff
|
|
|
|
/* these are the flags that ADS clients use */
|
|
#define NETLOGON_NEG_AUTH2_ADS_FLAGS 0x600fffff
|
|
|
|
#define NETLOGON_NEG_SCHANNEL 0x40000000
|
|
|