1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
|
#include "idl_types.h"
import "drsuapi.idl", "misc.idl", "samr.idl", "lsa.idl", "security.idl";
[
uuid("12345778-1234-abcd-0001-00000001"),
version(0.0),
pointer_default(unique),
helper("../librpc/ndr/ndr_drsblobs.h"),
helpstring("Active Directory Replication LDAP Blobs")
]
interface drsblobs {
typedef bitmap drsuapi_DrsOptions drsuapi_DrsOptions;
typedef [v1_enum] enum drsuapi_DsAttributeId drsuapi_DsAttributeId;
typedef [v1_enum] enum lsa_TrustAuthType lsa_TrustAuthType;
/*
* replPropertyMetaData
* w2k uses version 1
* w2k3 uses version 1
*
* Also equivalent to
* MS-DRSR 4.1.10.2.22 PROPERTY_META_DATA
*/
typedef [public] struct {
drsuapi_DsAttributeId attid;
uint32 version;
NTTIME_1sec originating_change_time;
GUID originating_invocation_id;
hyper originating_usn;
hyper local_usn;
} replPropertyMetaData1;
typedef struct {
uint32 count;
[value(0)] uint32 reserved;
replPropertyMetaData1 array[count];
} replPropertyMetaDataCtr1;
typedef [nodiscriminant] union {
[case(1)] replPropertyMetaDataCtr1 ctr1;
} replPropertyMetaDataCtr;
typedef [public] struct {
uint32 version;
[value(0)] uint32 reserved;
[switch_is(version)] replPropertyMetaDataCtr ctr;
} replPropertyMetaDataBlob;
/*
* replUpToDateVector
* w2k uses version 1
* w2k3 uses version 2
*/
typedef struct {
uint32 count;
[value(0)] uint32 reserved;
drsuapi_DsReplicaCursor cursors[count];
} replUpToDateVectorCtr1;
typedef struct {
uint32 count;
[value(0)] uint32 reserved;
drsuapi_DsReplicaCursor2 cursors[count];
} replUpToDateVectorCtr2;
typedef [nodiscriminant] union {
[case(1)] replUpToDateVectorCtr1 ctr1;
[case(2)] replUpToDateVectorCtr2 ctr2;
} replUpToDateVectorCtr;
typedef [public] struct {
uint32 version;
[value(0)] uint32 reserved;
[switch_is(version)] replUpToDateVectorCtr ctr;
} replUpToDateVectorBlob;
/*
* repsFrom/repsTo
* w2k uses version 1
* w2k3 uses version 1
* w2k8 uses version 2
*/
typedef [public,gensize] struct {
[value(strlen(dns_name)+1)] uint32 __dns_name_size;
[charset(DOS)] uint8 dns_name[__dns_name_size];
} repsFromTo1OtherInfo;
typedef [public,gensize,flag(NDR_PAHEX)] struct {
/* this includes the 8 bytes of the repsFromToBlob header */
[value(ndr_size_repsFromTo1(this, ndr->flags)+8)] uint32 blobsize;
uint32 consecutive_sync_failures;
NTTIME_1sec last_success;
NTTIME_1sec last_attempt;
WERROR result_last_attempt;
[relative] repsFromTo1OtherInfo *other_info;
[value(ndr_size_repsFromTo1OtherInfo(other_info, ndr->flags))] uint32 other_info_length;
drsuapi_DrsOptions replica_flags;
uint8 schedule[84];
[value(0)] uint32 reserved;
drsuapi_DsReplicaHighWaterMark highwatermark;
GUID source_dsa_obj_guid; /* the 'objectGuid' field of the CN=NTDS Settings object */
GUID source_dsa_invocation_id; /* the 'invocationId' field of the CN=NTDS Settings object */
GUID transport_guid;
} repsFromTo1;
typedef [public,relative_base,gensize] struct {
[value(ndr_size_repsFromTo2OtherInfo(this,ndr->flags))]
uint32 __ndr_size;
[relative] nstring *dns_name1;
uint32 unknown1;
[relative] nstring *dns_name2;
hyper unknown2;
} repsFromTo2OtherInfo;
typedef [public,gensize,flag(NDR_PAHEX)] struct {
/* this includes the 8 bytes of the repsFromToBlob header */
[value(ndr_size_repsFromTo2(this, ndr->flags)+8)] uint32 blobsize;
uint32 consecutive_sync_failures;
NTTIME_1sec last_success;
NTTIME_1sec last_attempt;
WERROR result_last_attempt;
[relative] repsFromTo2OtherInfo *other_info;
[value(ndr_size_repsFromTo2OtherInfo(other_info, ndr->flags))] uint32 other_info_length;
drsuapi_DrsOptions replica_flags;
uint8 schedule[84];
[value(0)] uint32 reserved;
drsuapi_DsReplicaHighWaterMark highwatermark;
GUID source_dsa_obj_guid; /* the 'objectGuid' field of the CN=NTDS Settings object */
GUID source_dsa_invocation_id; /* the 'invocationId' field of the CN=NTDS Settings object */
GUID transport_guid;
hyper unknown1;
} repsFromTo2;
typedef [nodiscriminant] union {
[case(1)] repsFromTo1 ctr1;
[case(2)] repsFromTo2 ctr2;
} repsFromTo;
typedef [public] struct {
uint32 version;
[value(0)] uint32 reserved;
[switch_is(version)] repsFromTo ctr;
} repsFromToBlob;
/* Replication schedule structures as defined in MS-ADTS 7.1.4.5
* Appears as attribute of NTDSConnection object
*/
typedef [public] struct {
[value(0)] uint32 type; /* always 0 */
uint32 offset;
} scheduleHeader;
typedef [public] struct {
uint8 slots[168];
} scheduleSlots;
typedef [public] struct {
uint32 size;
[value(0)] uint32 bandwidth; /* ignored */
uint32 numberOfSchedules; /* typically 1 */
scheduleHeader headerArray[numberOfSchedules];
scheduleSlots dataArray[numberOfSchedules];
} schedule;
/*
* partialAttributeSet
* w2k uses version 1
* w2k3 uses version 1
*/
typedef struct {
uint32 count;
drsuapi_DsAttributeId array[count];
} partialAttributeSetCtr1;
typedef [nodiscriminant] union {
[case(1)] partialAttributeSetCtr1 ctr1;
} partialAttributeSetCtr;
typedef [public] struct {
uint32 version;
[value(0)] uint32 reserved;
[switch_is(version)] partialAttributeSetCtr ctr;
} partialAttributeSetBlob;
/*
* schemaInfo attribute
*
* Used as an attribute on Schema.
* Also during replication as part of
* prefixMap to identify what revision
* of Schema source DC has
*/
typedef [public,flag(NDR_NOALIGN)] struct {
[value(0xFF)] uint8 marker;
[flag(NDR_BIG_ENDIAN)] uint32 revision;
GUID invocation_id;
} schemaInfoBlob;
/*
* MS w2k3 and w2k8 prefixMap format
* There is no version number. Format is:
* uint32 - number of entries in the map
* uint32 - total bytes that structure occupies
* ENTRIES:
* uint16 - prefix ID (OID's last sub-id encoded. see prefixMap)
* uint16 - number of bytes in prefix N
* uint8[N] - BER encoded prefix
*/
typedef [noprint,flag(NDR_NOALIGN)] struct {
uint16 entryID;
uint16 length;
uint8 binary_oid[length];
} drsuapi_MSPrefixMap_Entry;
typedef [public,gensize] struct {
uint32 num_entries;
[value(ndr_size_drsuapi_MSPrefixMap_Ctr(r, ndr->flags))] uint32 __ndr_size;
drsuapi_MSPrefixMap_Entry entries[num_entries];
} drsuapi_MSPrefixMap_Ctr;
/*
* prefixMap
* w2k unknown
* w2k3 unknown
* samba4 uses 0x44534442 'DSDB'
*
* as we windows don't return the prefixMap attribute when you ask for
* we don't know the format, but the attribute is not replicated
* so that we can choose our own format...
*/
typedef [v1_enum] enum {
PREFIX_MAP_VERSION_DSDB = 0x44534442
} prefixMapVersion;
typedef [nodiscriminant] union {
[case(PREFIX_MAP_VERSION_DSDB)] drsuapi_DsReplicaOIDMapping_Ctr dsdb;
} prefixMapCtr;
typedef [public] struct {
prefixMapVersion version;
[value(0)] uint32 reserved;
[switch_is(version)] prefixMapCtr ctr;
} prefixMapBlob;
/*
* the cookie for the LDAP dirsync control
*/
typedef [nodiscriminant,gensize] union {
[case(0)];
[default] replUpToDateVectorBlob uptodateness_vector;
} ldapControlDirSyncExtra;
typedef struct {
[value(3)] uint32 u1;
NTTIME time;
uint32 u2;
uint32 u3;
[value(ndr_size_ldapControlDirSyncExtra(&extra, extra.uptodateness_vector.version, 0))]
uint32 extra_length;
drsuapi_DsReplicaHighWaterMark highwatermark;
GUID guid1;
[switch_is(extra_length)] ldapControlDirSyncExtra extra;
} ldapControlDirSyncBlob;
typedef [public,relative_base] struct {
[charset(DOS),value("MSDS")] uint8 msds[4];
[subcontext(0)] ldapControlDirSyncBlob blob;
} ldapControlDirSyncCookie;
typedef [public] struct {
[value(2*strlen_m(name))] uint16 name_len;
[value(strlen(data))] uint16 data_len;
uint16 reserved; /* 2 for 'Packages', 1 for 'Primary:*', but should be ignored */
[charset(UTF16)] uint8 name[name_len];
/*
* the data field contains data as HEX strings
*
* 'Packages':
* data contains the list of packages
* as non termiated UTF16 strings with
* a UTF16 NULL byte as separator
*
* 'Primary:Kerberos-Newer-Keys':
* ...
*
* 'Primary:Kerberos':
* ...
*
* 'Primary:WDigest':
* ...
*
* 'Primary:CLEARTEXT':
* data contains the cleartext password
* as UTF16 string encoded as HEX string
*
* 'Primary:userPassword':
* ...
*
* 'Primary:SambaGPG':
* ...
*
* 'Primary:NTLM-Strong-NTOWF':
* ... Not yet implemented.
*
*/
[charset(DOS)] uint8 data[data_len];
} supplementalCredentialsPackage;
/* this are 0x30 (48) whitespaces (0x20) */
const string SUPPLEMENTAL_CREDENTIALS_PREFIX = " ";
typedef [flag(NDR_PAHEX),public] enum {
SUPPLEMENTAL_CREDENTIALS_SIGNATURE = 0x0050
} supplementalCredentialsSignature;
typedef [gensize,nopush,nopull] struct {
[value(SUPPLEMENTAL_CREDENTIALS_PREFIX),charset(UTF16)] uint16 prefix[0x30];
[value(SUPPLEMENTAL_CREDENTIALS_SIGNATURE)] supplementalCredentialsSignature signature;
uint16 num_packages;
supplementalCredentialsPackage packages[num_packages];
} supplementalCredentialsSubBlob;
typedef [public] struct {
[value(0)] uint32 unknown1;
[value(ndr_size_supplementalCredentialsSubBlob(&sub, ndr->flags))] uint32 __ndr_size;
[value(0)] uint32 unknown2;
[subcontext(0),subcontext_size(__ndr_size)] supplementalCredentialsSubBlob sub;
[value(0)] uint8 unknown3;
} supplementalCredentialsBlob;
typedef [public] struct {
[flag(STR_NOTERM|NDR_REMAINING)] string_array names;
} package_PackagesBlob;
typedef struct {
[value(2*strlen_m(string))] uint16 length;
[value(2*strlen_m(string))] uint16 size;
[relative,subcontext(0),subcontext_size(size),flag(STR_NOTERM|NDR_REMAINING)] string *string;
} package_PrimaryKerberosString;
typedef struct {
[value(0)] uint16 reserved1;
[value(0)] uint16 reserved2;
[value(0)] uint32 reserved3;
uint32 keytype;
[value((value?value->length:0))] uint32 value_len;
[relative,subcontext(0),subcontext_size(value_len),flag(NDR_REMAINING)] DATA_BLOB *value;
} package_PrimaryKerberosKey3;
typedef struct {
uint16 num_keys;
uint16 num_old_keys;
package_PrimaryKerberosString salt;
package_PrimaryKerberosKey3 keys[num_keys];
package_PrimaryKerberosKey3 old_keys[num_old_keys];
[value(0)] uint32 padding1;
[value(0)] uint32 padding2;
[value(0)] uint32 padding3;
[value(0)] uint32 padding4;
[value(0)] uint32 padding5;
} package_PrimaryKerberosCtr3;
typedef struct {
[value(0)] uint16 reserved1;
[value(0)] uint16 reserved2;
[value(0)] uint32 reserved3;
uint32 iteration_count;
uint32 keytype;
[value((value?value->length:0))] uint32 value_len;
[relative,subcontext(0),subcontext_size(value_len),flag(NDR_REMAINING)] DATA_BLOB *value;
} package_PrimaryKerberosKey4;
typedef struct {
uint16 num_keys;
[value(0)] uint16 num_service_keys;
uint16 num_old_keys;
uint16 num_older_keys;
package_PrimaryKerberosString salt;
uint32 default_iteration_count;
package_PrimaryKerberosKey4 keys[num_keys];
package_PrimaryKerberosKey4 service_keys[num_service_keys];
package_PrimaryKerberosKey4 old_keys[num_old_keys];
package_PrimaryKerberosKey4 older_keys[num_older_keys];
} package_PrimaryKerberosCtr4;
typedef [nodiscriminant] union {
[case(3)] package_PrimaryKerberosCtr3 ctr3;
[case(4)] package_PrimaryKerberosCtr4 ctr4;
} package_PrimaryKerberosCtr;
typedef [public] struct {
uint16 version;
[value(0)] uint16 flags;
[switch_is(version)] package_PrimaryKerberosCtr ctr;
} package_PrimaryKerberosBlob;
typedef [public] struct {
[flag(NDR_REMAINING)] DATA_BLOB cleartext;
} package_PrimaryCLEARTEXTBlob;
typedef [flag(NDR_PAHEX)] struct {
uint8 hash[16];
} package_PrimaryWDigestHash;
typedef [public] struct {
[value(0x31)] uint16 unknown1;
[value(0x01)] uint8 unknown2;
uint8 num_hashes;
[value(0)] uint32 unknown3;
[value(0)] udlong uuknown4;
package_PrimaryWDigestHash hashes[num_hashes];
} package_PrimaryWDigestBlob;
typedef [public] struct {
[flag(NDR_REMAINING)] DATA_BLOB gpg_blob;
} package_PrimarySambaGPGBlob;
/*
* Password hashes stored in a scheme compatible with
* OpenLDAP's userPassword attribute. The Package is named
* Primary:userPassword each calculated hash,
* which is typically caclulated via crypt(), the scheme is stored.
* The scheme name and the {scheme} format is re-used from OpenLDAP's
* use for userPassword to aid interopability when exported.
*
* The currently supported scheme so far is {CRYPT}, which may
* be specified multiple times if both CryptSHA256 ($5$) and
* CryptSHA512 ($6$) are in use.
*
* current_nt_hash is either the unicodePwd or the
* NTLM-Strong-NTOWF, to allow us to prove this password is
* a valid element.
*/
typedef struct {
[value(2*strlen_m(scheme))] uint16 scheme_len;
[charset(UTF16)] uint8 scheme[scheme_len];
[value((value?value->length:0))] uint32 value_len;
[relative,subcontext(0),subcontext_size(value_len),
flag(NDR_REMAINING)] DATA_BLOB *value;
} package_PrimaryUserPasswordValue;
typedef [public] struct {
samr_Password current_nt_hash;
uint16 num_hashes;
package_PrimaryUserPasswordValue hashes[num_hashes];
} package_PrimaryUserPasswordBlob;
typedef struct {
[value(0)] uint32 size;
} AuthInfoNone;
typedef struct {
[value(16)] uint32 size;
samr_Password password;
} AuthInfoNT4Owf;
/*
* the secret value is encoded as UTF16 if it's a string
* but depending the AuthType, it might also be krb5 trusts have random bytes here, so converting to UTF16
* mayfail...
*
* TODO: We should try handle the case of a random buffer in all places
* we deal with cleartext passwords from windows
*
* so we don't use this:
*
* uint32 value_len;
* [charset(UTF16)] uint8 value[value_len];
*/
typedef struct {
uint32 size;
uint8 password[size];
} AuthInfoClear;
typedef struct {
[value(4)] uint32 size;
uint32 version;
} AuthInfoVersion;
typedef [nodiscriminant] union {
[case(TRUST_AUTH_TYPE_NONE)] AuthInfoNone none;
[case(TRUST_AUTH_TYPE_NT4OWF)] AuthInfoNT4Owf nt4owf;
[case(TRUST_AUTH_TYPE_CLEAR)] AuthInfoClear clear;
[case(TRUST_AUTH_TYPE_VERSION)] AuthInfoVersion version;
} AuthInfo;
typedef [public] struct {
NTTIME LastUpdateTime;
lsa_TrustAuthType AuthType;
[switch_is(AuthType)] AuthInfo AuthInfo;
[flag(NDR_ALIGN4)] DATA_BLOB _pad;
} AuthenticationInformation;
/* count is not on the wire */
typedef [public,nopull,nopush,gensize] struct {
uint32 count;
AuthenticationInformation array[count];
} AuthenticationInformationArray;
/* we cannot use [relative] pointers here because Windows expects the
* previous_offset to match the total size of the struct in case
* the previous array is empty, see MS-LSAD 2.2.7.16 - gd */
typedef [public,gensize,nopush] struct {
uint32 count;
[value((count > 0) ? 12 : 0)] uint32 current_offset;
[value((count > 0) ? 12 + ndr_size_AuthenticationInformationArray(¤t, ndr->flags) : 0)] uint32 previous_offset;
[subcontext(0),subcontext_size((previous_offset)-(current_offset))] AuthenticationInformationArray current;
[subcontext(0)] [flag(NDR_REMAINING)] AuthenticationInformationArray previous;
} trustAuthInOutBlob;
typedef [public,nopull] struct {
uint8 confounder[512];
[subcontext(0),subcontext_size(outgoing_size)] trustAuthInOutBlob outgoing;
[subcontext(0),subcontext_size(incoming_size)] trustAuthInOutBlob incoming;
[value(ndr_size_trustAuthInOutBlob(&outgoing, ndr->flags))] uint32 outgoing_size;
[value(ndr_size_trustAuthInOutBlob(&incoming, ndr->flags))] uint32 incoming_size;
} trustDomainPasswords;
typedef [public] struct {
uint32 marker;
DATA_BLOB data;
} DsCompressedChunk;
typedef struct {
uint16 __size;
[size_is(__size),charset(DOS)] uint8 *string;
} ExtendedErrorAString;
typedef struct {
uint16 __size;
[size_is(__size),charset(UTF16)] uint16 *string;
} ExtendedErrorUString;
typedef struct {
uint16 length;
[size_is(length)] uint8 *data;
} ExtendedErrorBlob;
typedef enum {
EXTENDED_ERROR_COMPUTER_NAME_PRESENT = 1,
EXTENDED_ERROR_COMPUTER_NAME_NOT_PRESENT= 2
} ExtendedErrorComputerNamePresent;
typedef [switch_type(ExtendedErrorComputerNamePresent)] union {
[case(EXTENDED_ERROR_COMPUTER_NAME_PRESENT)] ExtendedErrorUString name;
[case(EXTENDED_ERROR_COMPUTER_NAME_NOT_PRESENT)];
} ExtendedErrorComputerNameU;
typedef struct {
ExtendedErrorComputerNamePresent present;
[switch_is(present)] ExtendedErrorComputerNameU n;
} ExtendedErrorComputerName;
typedef enum {
EXTENDED_ERROR_PARAM_TYPE_ASCII_STRING = 1,
EXTENDED_ERROR_PARAM_TYPE_UNICODE_STRING = 2,
EXTENDED_ERROR_PARAM_TYPE_UINT32 = 3,
EXTENDED_ERROR_PARAM_TYPE_UINT16 = 4,
EXTENDED_ERROR_PARAM_TYPE_UINT64 = 5,
EXTENDED_ERROR_PARAM_TYPE_NONE = 6,
EXTENDED_ERROR_PARAM_TYPE_BLOB = 7
} ExtendedErrorParamType;
typedef [switch_type(ExtendedErrorParamType)] union {
[case(EXTENDED_ERROR_PARAM_TYPE_ASCII_STRING)] ExtendedErrorAString a_string;
[case(EXTENDED_ERROR_PARAM_TYPE_UNICODE_STRING)] ExtendedErrorUString u_string;
[case(EXTENDED_ERROR_PARAM_TYPE_UINT32)] uint32 uint32;
[case(EXTENDED_ERROR_PARAM_TYPE_UINT16)] uint16 uint16;
[case(EXTENDED_ERROR_PARAM_TYPE_UINT64)] hyper uint64;
[case(EXTENDED_ERROR_PARAM_TYPE_NONE)];
[case(EXTENDED_ERROR_PARAM_TYPE_BLOB)] ExtendedErrorBlob blob;
} ExtendedErrorParamU;
typedef struct {
ExtendedErrorParamType type;
[switch_is(type)] ExtendedErrorParamU p;
} ExtendedErrorParam;
typedef [public] struct {
[max_recursion(20000)] ExtendedErrorInfo *next;
ExtendedErrorComputerName computer_name;
hyper pid;
NTTIME time;
uint32 generating_component;
WERROR status;
uint16 detection_location;
uint16 flags;
uint16 num_params;
[size_is(num_params)] ExtendedErrorParam params[];
} ExtendedErrorInfo;
typedef struct {
[unique] ExtendedErrorInfo *info;
} ExtendedErrorInfoPtr;
/* MS-ADTS 7.1.6.9.3 msDS-TrustForestTrustInfo Attribute */
typedef struct {
[value(strlen_m(string))] uint32 size;
[charset(UTF8)] uint8 string[size];
} ForestTrustString;
typedef [flag(NDR_NOALIGN)] struct {
[value(ndr_size_dom_sid0(&sid, ndr->flags))] uint32 sid_size;
[subcontext(0),subcontext_size(sid_size)] dom_sid sid;
ForestTrustString dns_name;
ForestTrustString netbios_name;
} ForestTrustDataDomainInfo;
typedef [flag(NDR_NOALIGN)] struct {
uint32 size;
uint8 data[size];
} ForestTrustDataBinaryData;
typedef [nodiscriminant] union {
[case(FOREST_TRUST_TOP_LEVEL_NAME)] ForestTrustString name;
[case(FOREST_TRUST_TOP_LEVEL_NAME_EX)] ForestTrustString name;
[case(FOREST_TRUST_DOMAIN_INFO)] ForestTrustDataDomainInfo info;
[default] ForestTrustDataBinaryData data;
} ForestTrustData;
/* same as lsa_ForestTrustRecordType, but only 8 bit */
typedef [enum8bit] enum {
FOREST_TRUST_TOP_LEVEL_NAME = LSA_FOREST_TRUST_TOP_LEVEL_NAME,
FOREST_TRUST_TOP_LEVEL_NAME_EX = LSA_FOREST_TRUST_TOP_LEVEL_NAME_EX,
FOREST_TRUST_DOMAIN_INFO = LSA_FOREST_TRUST_DOMAIN_INFO
} ForestTrustInfoRecordType;
/* meaning of flags depends on record type and values are
the same as in lsa.idl, see collision record types */
typedef [public,gensize,flag(NDR_NOALIGN)] struct {
lsa_ForestTrustRecordFlags flags;
NTTIME timestamp;
ForestTrustInfoRecordType type;
[switch_is(type)] ForestTrustData data;
} ForestTrustInfoRecord;
typedef [flag(NDR_NOALIGN)] struct {
[value(ndr_size_ForestTrustInfoRecord(&record, ndr->flags))] uint32 record_size;
ForestTrustInfoRecord record;
} ForestTrustInfoRecordArmor;
typedef [public,flag(NDR_NOALIGN)] struct {
uint32 version;
uint32 count;
ForestTrustInfoRecordArmor records[count];
} ForestTrustInfo;
typedef enum {
ENC_SECRET_AES_128_AEAD = 1
} EncryptedSecretAlgorithm;
const uint32 ENCRYPTED_SECRET_MAGIC_VALUE = 0xCA5CADED;
typedef [public] struct {
DATA_BLOB cleartext;
} PlaintextSecret;
/* The AEAD routines uses this as the additional authenticated data */
typedef [public] struct {
uint32 magic;
uint32 version;
uint32 algorithm;
uint32 flags;
} EncryptedSecretHeader;
typedef [public] struct {
/*
* The iv is before the header to ensure that the first bytes of
* the encrypted values are not predictable.
* We do this so that if the decryption gets disabled, we don't
* end up with predictable unicodePasswords.
*/
DATA_BLOB iv;
EncryptedSecretHeader header;
[flag(NDR_REMAINING)] DATA_BLOB encrypted;
} EncryptedSecret;
}
|