Fill in netr_NegotiateFlags.
authorGünther Deschner <gd@samba.org>
Fri, 28 Mar 2008 22:44:43 +0000 (23:44 +0100)
committerGünther Deschner <gd@samba.org>
Fri, 28 Mar 2008 22:44:43 +0000 (23:44 +0100)
Guenther
(This used to be commit 1cd1c27a0e5aa87682820c8dd81188b7bcc6551a)

source3/librpc/idl/netlogon.idl

index cbf78c779f2a26a53291d5cf129003d89c34b103..6ba342b6632dc667dbea3cee80ec278dba9c3adb 100644 (file)
@@ -865,16 +865,40 @@ interface netlogon
                );
 
 
-       /* If this flag is not set, then the passwords and LM session keys are
-        * encrypted with DES calls.  (And the user session key is
-        * unencrypted) */ 
-       const int NETLOGON_NEG_ARCFOUR  = 0x00000004;
-       const int NETLOGON_NEG_128BIT   = 0x00004000;
-       const int NETLOGON_NEG_SCHANNEL = 0x40000000;
+       /* If NETLOGON_NEG_ARCFOUR flag is not set, then the passwords and LM
+        * session keys are encrypted with DES calls.  (And the user session key
+        * is unencrypted) */
 
        /*****************/
        /* Function 0x0F */
 
+       typedef [bitmap32bit] bitmap {
+               NETLOGON_NEG_ACCOUNT_LOCKOUT            = 0x00000001,
+               NETLOGON_NEG_PERSISTENT_SAMREPL         = 0x00000002,
+               NETLOGON_NEG_ARCFOUR                    = 0x00000004,
+               NETLOGON_NEG_PROMOTION_COUNT            = 0x00000008,
+               NETLOGON_NEG_CHANGELOG_BDC              = 0x00000010,
+               NETLOGON_NEG_FULL_SYNC_REPL             = 0x00000020,
+               NETLOGON_NEG_MULTIPLE_SIDS              = 0x00000040,
+               NETLOGON_NEG_REDO                       = 0x00000080,
+               NETLOGON_NEG_PASSWORD_CHANGE_REFUSAL    = 0x00000100,
+               NETLOGON_NEG_SEND_PASSWORD_INFO_PDC     = 0x00000200,
+               NETLOGON_NEG_GENERIC_PASSTHROUGH        = 0x00000400,
+               NETLOGON_NEG_CONCURRENT_RPC             = 0x00000800,
+               NETLOGON_NEG_AVOID_ACCOUNT_DB_REPL      = 0x00001000,
+               NETLOGON_NEG_AVOID_SECURITYAUTH_DB_REPL = 0x00002000,
+               NETLOGON_NEG_128BIT                     = 0x00004000, /* STRONG_KEYS */
+               NETLOGON_NEG_TRANSITIVE_TRUSTS          = 0x00008000,
+               NETLOGON_NEG_DNS_DOMAIN_TRUSTS          = 0x00010000,
+               NETLOGON_NEG_PASSWORD_SET2              = 0x00020000,
+               NETLOGON_NEG_GETDOMAININFO              = 0x00040000,
+               NETLOGON_NEG_CROSS_FOREST_TRUSTS        = 0x00080000,
+               NETLOGON_NEG_NEUTRALIZE_NT4_EMULATION   = 0x00100000,
+               NETLOGON_NEG_RODC_PASSTHROUGH           = 0x00200000,
+               NETLOGON_NEG_AUTHENTICATED_RPC_LSASS    = 0x20000000,
+               NETLOGON_NEG_SCHANNEL                   = 0x40000000 /* AUTHENTICATED_RPC */
+       } netr_NegotiateFlags;
+
        NTSTATUS netr_ServerAuthenticate2(
                [in,unique]  [string,charset(UTF16)] uint16 *server_name,
                [in]         [string,charset(UTF16)] uint16 account_name[],
@@ -882,7 +906,7 @@ interface netlogon
                [in]         [string,charset(UTF16)] uint16 computer_name[],
                [in,ref]     netr_Credential *credentials,
                [out,ref]    netr_Credential *return_credentials,
-               [in,out,ref] uint32 *negotiate_flags
+               [in,out,ref] netr_NegotiateFlags *negotiate_flags
                );
 
 
@@ -1062,7 +1086,7 @@ interface netlogon
                [in]         netr_SchannelType secure_channel_type,
                [in]         [string,charset(UTF16)] uint16 computer_name[],
                [in,out,ref] netr_Credential *credentials,
-               [in,out,ref] uint32 *negotiate_flags,
+               [in,out,ref] netr_NegotiateFlags *negotiate_flags,
                [out,ref]    uint32 *rid
                );