xref: /titanic_52/usr/src/uts/common/smbsrv/ndl/netlogon.ndl (revision 12b65585e720714b31036daaa2b30eb76014048e)
1/*
2 * CDDL HEADER START
3 *
4 * The contents of this file are subject to the terms of the
5 * Common Development and Distribution License (the "License").
6 * You may not use this file except in compliance with the License.
7 *
8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9 * or http://www.opensolaris.org/os/licensing.
10 * See the License for the specific language governing permissions
11 * and limitations under the License.
12 *
13 * When distributing Covered Code, include this CDDL HEADER in each
14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15 * If applicable, add the following below this CDDL HEADER, with the
16 * fields enclosed by brackets "[]" replaced with your own identifying
17 * information: Portions Copyright [yyyy] [name of copyright owner]
18 *
19 * CDDL HEADER END
20 */
21/*
22 * Copyright 2008 Sun Microsystems, Inc.  All rights reserved.
23 * Use is subject to license terms.
24 *
25 * Copyright 2014 Nexenta Systems, Inc.  All rights reserved.
26 */
27
28#ifndef _MLSVC_NETR_NDL_
29#define _MLSVC_NETR_NDL_
30
31/*
32 ***********************************************************************
33 *
34 * NetLogon RPC (NETR) interface definition.
35 *
36 ***********************************************************************
37 */
38
39#include "ndrtypes.ndl"
40
41
42#define NETR_OPNUM_UasLogon			0x00
43#define NETR_OPNUM_UasLogoff			0x01
44#define NETR_OPNUM_SamLogon			0x02
45#define NETR_OPNUM_SamLogoff			0x03
46#define NETR_OPNUM_ServerReqChallenge		0x04
47#define NETR_OPNUM_ServerAuthenticate		0x05
48#define NETR_OPNUM_ServerPasswordSet		0x06
49#define NETR_OPNUM_DatabaseDeltas		0x07
50#define NETR_OPNUM_DatabaseSync			0x08
51#define NETR_OPNUM_AccountDeltas		0x09
52#define NETR_OPNUM_AccountSync			0x0a
53#define NETR_OPNUM_GetDCName			0x0b
54#define NETR_OPNUM_LogonControl			0x0c
55#define NETR_OPNUM_GetAnyDCName			0x0d
56#define NETR_OPNUM_LogonControl2		0x0E
57#define NETR_OPNUM_ServerAuthenticate2		0x0F
58#define NETR_OPNUM_DatabaseSync2		0x10
59#define NETR_OPNUM_DatabaseRedo			0x11
60#define NETR_OPNUM_LogonControl2Ex		0x12
61#define NETR_OPNUM_TrustDomainList		0x13
62#define NETR_OPNUM_DsrGetDcName			0x14
63#define NETR_OPNUM_LogonGetCapabilities		0x15
64#define NETR_OPNUM_LogonSetServiceBits		0x16
65#define NETR_OPNUM_LogonGetTrustRid		0x17
66#define NETR_OPNUM_LogonComputeServerDigest	0x18
67#define NETR_OPNUM_LogonComputeClientDigest	0x19
68#define NETR_OPNUM_ServerAuthenticate3		0x1A
69#define NETR_OPNUM_DsrGetDcNameEx		0x1B
70#define NETR_OPNUM_DsrGetSiteName		0x1C
71#define NETR_OPNUM_LogonGetDomainInfo		0x1D
72#define NETR_OPNUM_ServerPasswordSet2		0x1E
73
74/*
75 * This is not a real NETR OPNUM.  It's used to unpack the
76 * struct krb5_validation_info found in the Kerberos PAC.
77 */
78#define	NETR_OPNUM_decode_krb5_pac		1000
79
80
81struct netr_sid {
82	BYTE		Revision;
83	BYTE		SubAuthCount;
84	BYTE		Authority[6];
85  SIZE_IS(SubAuthCount)
86	DWORD		SubAuthority[ANY_SIZE_ARRAY];
87};
88
89
90struct netr_string {
91	WORD		length;
92	WORD		allosize;
93	LPTSTR		str;
94};
95typedef struct netr_string netr_string_t;
96
97
98/*
99 * Alternative varying/conformant string definition - for
100 * non-null terminated strings. This definition must match
101 * ndr_vcbuf_t.
102 */
103struct netr_vcs {
104	/*
105	 * size_is (actually a copy of length_is) will
106	 * be inserted here by the marshalling library.
107	 */
108	DWORD vc_first_is;
109	DWORD vc_length_is;
110  SIZE_IS(vc_length_is)
111	WORD buffer[ANY_SIZE_ARRAY];
112};
113
114struct netr_vcstr {
115	WORD wclen;
116	WORD wcsize;
117	struct netr_vcs *vcs;
118};
119typedef struct netr_vcstr netr_vcstr_t;
120
121struct netr_vcb {
122	/*
123	 * size_is (actually a copy of length_is) will
124	 * be inserted here by the marshalling library.
125	 */
126	DWORD vc_first_is;
127	DWORD vc_length_is;
128  SIZE_IS(vc_length_is)
129	BYTE buffer[ANY_SIZE_ARRAY];
130};
131
132struct netr_vcbuf {
133	WORD len;
134	WORD size;
135	struct netr_vcb *vcb;
136};
137typedef struct netr_vcbuf netr_vcbuf_t;
138
139struct netr_credential {
140	BYTE data[8];
141};
142
143struct netr_authenticator {
144	struct netr_credential credential;
145	DWORD timestamp;
146};
147typedef struct netr_authenticator netr_auth_t;
148
149
150struct OLD_LARGE_INTEGER {
151	DWORD LowPart;
152	DWORD HighPart;
153};
154typedef struct OLD_LARGE_INTEGER netr_int64_t;
155
156struct CYPHER_BLOCK {
157	BYTE data[8];
158};
159
160struct OWF_PASSWORD {
161	BYTE data[16];
162};
163typedef struct OWF_PASSWORD netr_owf_password_t;
164
165/*
166 * NL_TRUST_PASSWORD
167 * See also: samr_user_password
168 */
169#define NETR_TRUST_PWLEN	256
170struct netr_trust_password {
171	WORD	Buffer[NETR_TRUST_PWLEN];
172	DWORD	Length;
173};
174typedef struct netr_trust_password netr_trust_password_t;
175
176struct USER_SESSION_KEY {
177	struct CYPHER_BLOCK data[2];
178};
179
180
181
182
183/*
184 ***********************************************************************
185 * ServerReqChallenge
186 ***********************************************************************
187 */
188ALIGN(2)
189OPERATION(NETR_OPNUM_ServerReqChallenge)
190struct netr_ServerReqChallenge {
191	IN		LPTSTR servername;
192	IN REFERENCE	LPTSTR hostname;
193	IN		struct netr_credential client_challenge;
194	OUT		struct netr_credential server_challenge;
195	OUT		DWORD status;
196};
197
198
199/*
200 ***********************************************************************
201 * ServerAuthenticate2
202 ***********************************************************************
203 */
204ALIGN(2)
205OPERATION(NETR_OPNUM_ServerAuthenticate2)
206struct netr_ServerAuthenticate2 {
207	IN		LPTSTR servername;
208	IN REFERENCE	LPTSTR account_name;
209	IN		WORD account_type;
210	IN REFERENCE	LPTSTR hostname;
211	IN		struct netr_credential client_credential;
212	OUT		struct netr_credential server_credential;
213	INOUT	DWORD negotiate_flags;
214	OUT		DWORD status;
215};
216
217
218/*
219 ***********************************************************************
220 * ServerPasswordSet
221 ***********************************************************************
222 */
223ALIGN(2)
224OPERATION(NETR_OPNUM_ServerPasswordSet)
225struct netr_PasswordSet {
226	IN		LPTSTR servername;
227	IN REFERENCE	LPTSTR account_name;
228	IN		WORD sec_chan_type;
229	IN REFERENCE	LPTSTR hostname;
230	INOUT	struct netr_authenticator auth;
231	IN		netr_owf_password_t owf_password;
232	OUT		DWORD status;
233};
234
235OPERATION(NETR_OPNUM_ServerPasswordSet2)
236struct netr_PasswordSet2 {
237	IN		LPTSTR servername;
238	IN REFERENCE	LPTSTR account_name;
239	IN		WORD sec_chan_type;
240	IN REFERENCE	LPTSTR hostname;
241	INOUT	struct netr_authenticator auth;
242	IN		netr_trust_password_t trust_password;
243	OUT		DWORD status;
244};
245
246
247/*
248 ***********************************************************************
249 * SamLogon
250 ***********************************************************************
251 */
252
253/*
254 * The challenge-response data should always be 24 bytes.
255 */
256#define NETR_CR_PASSWORD_SIZE			24
257
258
259struct lm_challenge {
260	BYTE data[8];
261};
262typedef struct lm_challenge lm_challenge_t;
263
264/*
265 * Input data
266 */
267struct netr_logon_identity_info {
268	netr_vcstr_t domain_name;
269	DWORD parameter_control;
270	struct OLD_LARGE_INTEGER logon_id;
271	netr_vcstr_t username;
272	netr_vcstr_t workstation;
273};
274typedef struct netr_logon_identity_info netr_logon_id_t;
275
276
277/*
278 * Level 1: interactive logon
279 */
280struct netr_logon_info1 {
281	netr_logon_id_t identity;
282	netr_owf_password_t lm_owf_password;
283	netr_owf_password_t nt_owf_password;
284};
285
286
287/*
288 * Level 2: network logon.
289 */
290struct netr_logon_info2 {
291	netr_logon_id_t identity;
292	lm_challenge_t lm_challenge;
293	netr_vcbuf_t nt_response;
294	netr_vcbuf_t lm_response;
295};
296
297
298union netr_logon_info_u {
299	UNION_INFO_PTR(1,netr_logon_info);
300	UNION_INFO_PTR(2,netr_logon_info);
301	DEFAULT	DWORD nothing;
302};
303
304
305struct netr_login_info {
306	WORD logon_level;
307	WORD switch_value;
308  SWITCH(switch_value)
309	union netr_logon_info_u ru;
310};
311
312
313/*
314 * Output data
315 */
316struct netr_group_membership {
317	DWORD rid;
318	DWORD attributes;
319};
320
321
322struct netr_sid_and_attributes {
323	struct netr_sid *sid;
324	DWORD attributes;
325};
326
327
328struct netr_validation_info3 {
329	struct OLD_LARGE_INTEGER LogonTime;
330	struct OLD_LARGE_INTEGER LogoffTime;
331	struct OLD_LARGE_INTEGER KickOffTime;
332	struct OLD_LARGE_INTEGER PasswordLastSet;
333	struct OLD_LARGE_INTEGER PasswordCanChange;
334	struct OLD_LARGE_INTEGER PasswordMustChange;
335	netr_string_t EffectiveName;
336	netr_string_t FullName;
337	netr_string_t LogonScript;
338	netr_string_t ProfilePath;
339	netr_string_t HomeDirectory;
340	netr_string_t HomeDirectoryDrive;
341	WORD LogonCount;
342	WORD BadPasswordCount;
343	DWORD UserId;
344	DWORD PrimaryGroupId;
345	DWORD GroupCount;
346  SIZE_IS(GroupCount)
347	struct netr_group_membership *GroupIds;
348	DWORD UserFlags;
349	struct USER_SESSION_KEY UserSessionKey;
350	netr_string_t LogonServer;
351	netr_string_t LogonDomainName;
352	struct netr_sid *LogonDomainId;
353	DWORD ExpansionRoom[10];
354	DWORD SidCount;
355  SIZE_IS(SidCount)
356	struct netr_sid_and_attributes *ExtraSids;
357};
358
359/* NETR_OPNUM_decode_krb5_pac */
360struct krb5_validation_info {
361	struct netr_validation_info3 info3;
362	/* Kerberos PAC "resource group" stuff. */
363	struct netr_sid *rg_dom_sid;
364	DWORD rg_rid_cnt;
365  SIZE_IS(rg_rid_cnt)
366	struct netr_group_membership *rg_rids;
367};
368
369union netr_validation_u {
370	CASE(3) struct netr_validation_info3 *info3;
371	DEFAULT	DWORD nothing;
372};
373
374
375/*
376 * This structure needs to be declared, even though it can't be used
377 * in netr_SamLogon, in order to get the appropriate size to calculate
378 * the correct fixup offsets.  If ndrgen did the right thing,
379 * netr_validation_info would be one of the out parameters. However,
380 * if we do it that way, the switch_value isn't known early enough to
381 * do the fixup calculation. So it all has to go in netr_SamLogon.
382 */
383struct netr_validation_info {
384	WORD validation_level;
385  SWITCH(validation_level)
386	union netr_validation_u ru;
387};
388
389
390/*
391 * WARNING
392 *
393 * Validation_level is really a WORD and authoritative is really a
394 * BYTE. They are declared as DWORD here due to the way things are
395 * unmarshalled. NT does not clear out the unused bytes in the
396 * DWORD so they must be cast to get the correct value.
397 */
398OPERATION(NETR_OPNUM_SamLogon)
399struct netr_SamLogon {
400	IN		LPTSTR servername;
401	IN		LPTSTR hostname;
402	IN		struct netr_authenticator *auth;
403	INOUT	struct netr_authenticator *ret_auth;
404	IN		struct netr_login_info logon_info;
405	INOUT	WORD validation_level;
406  SWITCH(validation_level)
407	OUT		union netr_validation_u ru;
408	OUT		DWORD authoritative;
409	OUT		DWORD status;
410};
411
412
413/*
414 ***********************************************************************
415 * SamLogoff
416 ***********************************************************************
417 */
418OPERATION(NETR_OPNUM_SamLogoff)
419struct netr_SamLogoff {
420	IN		LPTSTR servername;
421	IN REFERENCE	LPTSTR hostname;
422	IN		struct netr_authenticator auth;
423	INOUT	struct netr_authenticator ret_auth;
424	IN		DWORD logon_level;
425  SWITCH(logon_level)
426	IN		union netr_logon_info_u ru;
427	OUT		DWORD status;
428};
429
430
431/*
432 ***********************************************************************
433 * The NETR interface definition.
434 ***********************************************************************
435 */
436INTERFACE(0)
437union netr_interface {
438	CASE(NETR_OPNUM_ServerReqChallenge)
439		struct netr_ServerReqChallenge		ServerReqChallenge;
440	CASE(NETR_OPNUM_ServerAuthenticate2)
441		struct netr_ServerAuthenticate2		ServerAuthenticate2;
442	CASE(NETR_OPNUM_SamLogon)
443		struct netr_SamLogon			SamLogon;
444	CASE(NETR_OPNUM_SamLogoff)
445		struct netr_SamLogoff			SamLogoff;
446	CASE(NETR_OPNUM_ServerPasswordSet)
447		struct netr_PasswordSet			PasswordSet;
448	CASE(NETR_OPNUM_ServerPasswordSet2)
449		struct netr_PasswordSet2		PasswordSet2;
450
451	/* Special, for smb_decode_krb5_pac() */
452	CASE(NETR_OPNUM_decode_krb5_pac)
453		struct krb5_validation_info		krb5pac;
454};
455typedef union netr_interface netr_interface_t;
456EXTERNTYPEINFO(netr_interface)
457
458#endif /* _MLSVC_NETR_NDL_ */
459