3 import
"drsuapi.idl", "misc.idl", "samr.idl", "lsa.idl", "security.idl";
6 uuid("12345778-1234-abcd-0001-00000001"),
8 pointer_default(unique),
9 helper
("../librpc/ndr/ndr_drsblobs.h"),
10 helpstring("Active Directory Replication LDAP Blobs")
13 typedef bitmap drsuapi_DrsOptions drsuapi_DrsOptions
;
14 typedef [v1_enum] enum drsuapi_DsAttributeId drsuapi_DsAttributeId
;
15 typedef [v1_enum] enum lsa_TrustAuthType lsa_TrustAuthType
;
17 * replPropertyMetaData
22 drsuapi_DsAttributeId attid
;
24 NTTIME_1sec originating_change_time
;
25 GUID originating_invocation_id
;
26 hyper originating_usn
;
28 } replPropertyMetaData1
;
32 [value
(0)] uint32 reserved
;
33 replPropertyMetaData1 array
[count
];
34 } replPropertyMetaDataCtr1
;
36 typedef [nodiscriminant
] union {
37 [case(1)] replPropertyMetaDataCtr1 ctr1
;
38 } replPropertyMetaDataCtr
;
40 typedef [public] struct {
42 [value
(0)] uint32 reserved
;
43 [switch_is(version)] replPropertyMetaDataCtr ctr
;
44 } replPropertyMetaDataBlob
;
46 void decode_replPropertyMetaData
(
47 [in] replPropertyMetaDataBlob blob
57 [value
(0)] uint32 reserved
;
58 drsuapi_DsReplicaCursor cursors
[count
];
59 } replUpToDateVectorCtr1
;
63 [value
(0)] uint32 reserved
;
64 drsuapi_DsReplicaCursor2 cursors
[count
];
65 } replUpToDateVectorCtr2
;
67 typedef [nodiscriminant
] union {
68 [case(1)] replUpToDateVectorCtr1 ctr1
;
69 [case(2)] replUpToDateVectorCtr2 ctr2
;
70 } replUpToDateVectorCtr
;
72 typedef [public] struct {
74 [value
(0)] uint32 reserved
;
75 [switch_is(version)] replUpToDateVectorCtr ctr
;
76 } replUpToDateVectorBlob
;
78 void decode_replUpToDateVector
(
79 [in] replUpToDateVectorBlob blob
88 typedef [public,gensize
] struct {
89 [value
(strlen
(dns_name
)+1)] uint32 __dns_name_size
;
90 [charset
(DOS
)] uint8 dns_name
[__dns_name_size
];
91 } repsFromTo1OtherInfo
;
93 typedef [public,gensize
,flag
(NDR_PAHEX
)] struct {
94 /* this includes the 8 bytes of the repsFromToBlob header */
95 [value
(ndr_size_repsFromTo1
(this
, ndr
->flags
)+8)] uint32 blobsize
;
96 uint32 consecutive_sync_failures
;
97 NTTIME_1sec last_success
;
98 NTTIME_1sec last_attempt
;
99 WERROR result_last_attempt
;
100 [relative
] repsFromTo1OtherInfo
*other_info
;
101 [value
(ndr_size_repsFromTo1OtherInfo
(other_info
, ndr
->flags
))] uint32 other_info_length
;
102 drsuapi_DrsOptions replica_flags
;
104 [value
(0)] uint32 reserved
;
105 drsuapi_DsReplicaHighWaterMark highwatermark
;
106 GUID source_dsa_obj_guid
; /* the 'objectGuid' field of the CN=NTDS Settings object */
107 GUID source_dsa_invocation_id
; /* the 'invocationId' field of the CN=NTDS Settings object */
111 typedef [public,relative_base
,gensize
] struct {
112 [value
(ndr_size_repsFromTo2OtherInfo
(this
,ndr
->flags
))]
114 [relative
] nstring
*dns_name1
;
116 [relative
] nstring
*dns_name2
;
118 } repsFromTo2OtherInfo
;
120 typedef [public,gensize
,flag
(NDR_PAHEX
)] struct {
121 /* this includes the 8 bytes of the repsFromToBlob header */
122 [value
(ndr_size_repsFromTo2
(this
, ndr
->flags
)+8)] uint32 blobsize
;
123 uint32 consecutive_sync_failures
;
124 NTTIME_1sec last_success
;
125 NTTIME_1sec last_attempt
;
126 WERROR result_last_attempt
;
127 [relative
] repsFromTo2OtherInfo
*other_info
;
128 [value
(ndr_size_repsFromTo2OtherInfo
(other_info
, ndr
->flags
))] uint32 other_info_length
;
129 drsuapi_DrsOptions replica_flags
;
131 [value
(0)] uint32 reserved
;
132 drsuapi_DsReplicaHighWaterMark highwatermark
;
133 GUID source_dsa_obj_guid
; /* the 'objectGuid' field of the CN=NTDS Settings object */
134 GUID source_dsa_invocation_id
; /* the 'invocationId' field of the CN=NTDS Settings object */
139 typedef [nodiscriminant
] union {
140 [case(1)] repsFromTo1 ctr1
;
141 [case(2)] repsFromTo2 ctr2
;
144 typedef [public] struct {
146 [value
(0)] uint32 reserved
;
147 [switch_is(version)] repsFromTo ctr
;
150 void decode_repsFromTo
(
151 [in] repsFromToBlob blob
154 /* Replication schedule structures as defined in MS-ADTS 7.1.4.5
155 * Appears as attribute of NTDSConnection object
157 typedef [public] struct {
158 [value
(0)] uint32 type
; /* always 0 */
162 typedef [public] struct {
166 typedef [public] struct {
168 [value
(0)] uint32 bandwidth
; /* ignored */
169 [value
(1)] uint32 numberOfSchedules
; /* always 1 */
170 scheduleHeader headerArray
[numberOfSchedules
];
171 scheduleSlots dataArray
[numberOfSchedules
];
175 * partialAttributeSet
177 * w2k3 uses version 1
181 drsuapi_DsAttributeId array
[count
];
182 } partialAttributeSetCtr1
;
184 typedef [nodiscriminant
] union {
185 [case(1)] partialAttributeSetCtr1 ctr1
;
186 } partialAttributeSetCtr
;
188 typedef [public] struct {
190 [value
(0)] uint32 reserved
;
191 [switch_is(version)] partialAttributeSetCtr ctr
;
192 } partialAttributeSetBlob
;
194 void decode_partialAttributeSet
(
195 [in] partialAttributeSetBlob blob
200 * schemaInfo attribute
202 * Used as an attribute on Schema.
203 * Also during replication as part of
204 * prefixMap to identify what revision
205 * of Schema source DC has
207 typedef [public,flag
(NDR_NOALIGN
)] struct {
208 [value
(0xFF)] uint8 marker
;
209 [flag
(NDR_BIG_ENDIAN
)] uint32 revision
;
215 * MS w2k3 and w2k8 prefixMap format
216 * There is no version number. Format is:
217 * uint32 - number of entries in the map
218 * uint32 - total bytes that structure occupies
220 * uint16 - prefix ID (OID's last sub-id encoded. see prefixMap)
221 * uint16 - number of bytes in prefix N
222 * uint8[N] - BER encoded prefix
224 typedef [noprint
,flag
(NDR_NOALIGN
)] struct {
227 uint8 binary_oid
[length
];
228 } drsuapi_MSPrefixMap_Entry
;
230 typedef [public,gensize
] struct {
232 [value
(ndr_size_drsuapi_MSPrefixMap_Ctr
(r
, ndr
->flags
))] uint32 __ndr_size
;
233 drsuapi_MSPrefixMap_Entry entries
[num_entries
];
234 } drsuapi_MSPrefixMap_Ctr
;
240 * samba4 uses 0x44534442 'DSDB'
242 * as we windows don't return the prefixMap attribute when you ask for
243 * we don't know the format, but the attribute is not replicated
244 * so that we can choose our own format...
246 typedef [v1_enum] enum {
247 PREFIX_MAP_VERSION_DSDB
= 0x44534442
250 typedef [nodiscriminant
] union {
251 [case(PREFIX_MAP_VERSION_DSDB
)] drsuapi_DsReplicaOIDMapping_Ctr dsdb
;
254 typedef [public] struct {
255 prefixMapVersion
version;
256 [value
(0)] uint32 reserved
;
257 [switch_is(version)] prefixMapCtr ctr
;
260 void decode_prefixMap
(
261 [in] prefixMapBlob blob
266 * the cookie for the LDAP dirsync control
268 typedef [nodiscriminant
,gensize
] union {
270 [default] replUpToDateVectorBlob uptodateness_vector
;
271 } ldapControlDirSyncExtra
;
274 [value
(3)] uint32 u1
;
278 [value
(ndr_size_ldapControlDirSyncExtra
(&extra
, extra.uptodateness_vector.
version, 0))]
280 drsuapi_DsReplicaHighWaterMark highwatermark
;
282 [switch_is(extra_length
)] ldapControlDirSyncExtra extra
;
283 } ldapControlDirSyncBlob
;
285 typedef [public,relative_base
] struct {
286 [charset
(DOS
),value
("MSDS")] uint8 msds
[4];
287 [subcontext
(0)] ldapControlDirSyncBlob blob
;
288 } ldapControlDirSyncCookie
;
290 void decode_ldapControlDirSync
(
291 [in] ldapControlDirSyncCookie cookie
295 [value
(2*strlen_m
(name
))] uint16 name_len
;
296 [value
(strlen
(data
))] uint16 data_len
;
297 uint16 reserved
; /* 2 for 'Packages', 1 for 'Primary:*', but should be ignored */
298 [charset
(UTF16
)] uint8 name
[name_len
];
300 * the data field contains data as HEX strings
303 * data contains the list of packages
304 * as non termiated UTF16 strings with
305 * a UTF16 NULL byte as separator
307 * 'Primary:Kerberos-Newer-Keys':
310 * 'Primary:Kerberos':
316 * 'Primary:CLEARTEXT':
317 * data contains the cleartext password
318 * as UTF16 string encoded as HEX string
320 [charset
(DOS
)] uint8 data
[data_len
];
321 } supplementalCredentialsPackage
;
323 /* this are 0x30 (48) whitespaces (0x20) */
324 const string SUPPLEMENTAL_CREDENTIALS_PREFIX
= " ";
326 typedef [flag
(NDR_PAHEX
)] enum {
327 SUPPLEMENTAL_CREDENTIALS_SIGNATURE
= 0x0050
328 } supplementalCredentialsSignature
;
330 typedef [gensize
] struct {
331 [value
(SUPPLEMENTAL_CREDENTIALS_PREFIX
),charset
(UTF16
)] uint16 prefix
[0x30];
332 [value
(SUPPLEMENTAL_CREDENTIALS_SIGNATURE
)] supplementalCredentialsSignature signature
;
334 supplementalCredentialsPackage packages
[num_packages
];
335 } supplementalCredentialsSubBlob
;
337 typedef [public] struct {
338 [value
(0)] uint32 unknown1
;
339 [value
(ndr_size_supplementalCredentialsSubBlob
(&sub
, ndr
->flags
))] uint32 __ndr_size
;
340 [value
(0)] uint32 unknown2
;
341 [subcontext
(0),subcontext_size
(__ndr_size
)] supplementalCredentialsSubBlob sub
;
342 [value
(0)] uint8 unknown3
;
343 } supplementalCredentialsBlob
;
345 void decode_supplementalCredentials
(
346 [in] supplementalCredentialsBlob blob
349 typedef [public] struct {
350 [flag
(STR_NOTERM|NDR_REMAINING
)] string_array names
;
351 } package_PackagesBlob
;
353 void decode_Packages
(
354 [in] package_PackagesBlob blob
358 [value
(2*strlen_m
(string))] uint16 length
;
359 [value
(2*strlen_m
(string))] uint16 size
;
360 [relative
,subcontext
(0),subcontext_size
(size
),flag
(STR_NOTERM|NDR_REMAINING
)] string *string;
361 } package_PrimaryKerberosString
;
364 [value
(0)] uint16 reserved1
;
365 [value
(0)] uint16 reserved2
;
366 [value
(0)] uint32 reserved3
;
368 [value
((value?value
->length
:0))] uint32 value_len
;
369 [relative
,subcontext
(0),subcontext_size
(value_len
),flag
(NDR_REMAINING
)] DATA_BLOB
*value
;
370 } package_PrimaryKerberosKey3
;
375 package_PrimaryKerberosString salt
;
376 package_PrimaryKerberosKey3 keys
[num_keys
];
377 package_PrimaryKerberosKey3 old_keys
[num_old_keys
];
378 [value
(0)] uint32 padding1
;
379 [value
(0)] uint32 padding2
;
380 [value
(0)] uint32 padding3
;
381 [value
(0)] uint32 padding4
;
382 [value
(0)] uint32 padding5
;
383 } package_PrimaryKerberosCtr3
;
386 [value
(0)] uint16 reserved1
;
387 [value
(0)] uint16 reserved2
;
388 [value
(0)] uint32 reserved3
;
389 uint32 iteration_count
;
391 [value
((value?value
->length
:0))] uint32 value_len
;
392 [relative
,subcontext
(0),subcontext_size
(value_len
),flag
(NDR_REMAINING
)] DATA_BLOB
*value
;
393 } package_PrimaryKerberosKey4
;
397 [value
(0)] uint16 num_service_keys
;
399 uint16 num_older_keys
;
400 package_PrimaryKerberosString salt
;
401 uint32 default_iteration_count
;
402 package_PrimaryKerberosKey4 keys
[num_keys
];
403 package_PrimaryKerberosKey4 service_keys
[num_service_keys
];
404 package_PrimaryKerberosKey4 old_keys
[num_old_keys
];
405 package_PrimaryKerberosKey4 older_keys
[num_older_keys
];
406 } package_PrimaryKerberosCtr4
;
408 typedef [nodiscriminant
] union {
409 [case(3)] package_PrimaryKerberosCtr3 ctr3
;
410 [case(4)] package_PrimaryKerberosCtr4 ctr4
;
411 } package_PrimaryKerberosCtr
;
413 typedef [public] struct {
415 [value
(0)] uint16 flags
;
416 [switch_is(version)] package_PrimaryKerberosCtr ctr
;
417 } package_PrimaryKerberosBlob
;
419 void decode_PrimaryKerberos
(
420 [in] package_PrimaryKerberosBlob blob
423 typedef [public] struct {
424 [flag
(NDR_REMAINING
)] DATA_BLOB cleartext
;
425 } package_PrimaryCLEARTEXTBlob
;
427 void decode_PrimaryCLEARTEXT
(
428 [in] package_PrimaryCLEARTEXTBlob blob
431 typedef [flag
(NDR_PAHEX
)] struct {
433 } package_PrimaryWDigestHash
;
435 typedef [public] struct {
436 [value
(0x31)] uint16 unknown1
;
437 [value
(0x01)] uint8 unknown2
;
439 [value
(0)] uint32 unknown3
;
440 [value
(0)] udlong uuknown4
;
441 package_PrimaryWDigestHash hashes
[num_hashes
];
442 } package_PrimaryWDigestBlob
;
444 void decode_PrimaryWDigest
(
445 [in] package_PrimaryWDigestBlob blob
449 [value
(0)] uint32 size
;
453 [value
(16)] uint32 size
;
454 samr_Password password
;
458 * the secret value is encoded as UTF16 if it's a string
459 * but depending the AuthType, it might also be krb5 trusts have random bytes here, so converting to UTF16
462 * TODO: We should try handle the case of a random buffer in all places
463 * we deal with cleartext passwords from windows
465 * so we don't use this:
468 * [charset(UTF16)] uint8 value[value_len];
473 uint8 password
[size
];
477 [value
(4)] uint32 size
;
481 typedef [nodiscriminant
] union {
482 [case(TRUST_AUTH_TYPE_NONE
)] AuthInfoNone none
;
483 [case(TRUST_AUTH_TYPE_NT4OWF
)] AuthInfoNT4Owf nt4owf
;
484 [case(TRUST_AUTH_TYPE_CLEAR
)] AuthInfoClear clear
;
485 [case(TRUST_AUTH_TYPE_VERSION
)] AuthInfoVersion
version;
488 typedef [public] struct {
489 NTTIME LastUpdateTime
;
490 lsa_TrustAuthType AuthType
;
491 [switch_is(AuthType
)] AuthInfo AuthInfo
;
492 [flag
(NDR_ALIGN4
)] DATA_BLOB _pad
;
493 } AuthenticationInformation
;
495 /* count is not on the wire */
496 typedef [public,nopull
,nopush
,gensize
] struct {
498 AuthenticationInformation array
[count
];
499 } AuthenticationInformationArray
;
501 /* we cannot use [relative] pointers here because Windows expects the
502 * previous_offset to match the total size of the struct in case
503 * the previous array is empty, see MS-LSAD 2.2.7.16 - gd */
504 typedef [public,gensize
,nopush
] struct {
506 [value
((count
> 0) ?
12 : 0)] uint32 current_offset
;
507 [value
((count
> 0) ?
12 + ndr_size_AuthenticationInformationArray
(¤t
, ndr
->flags
) : 0)] uint32 previous_offset
;
508 [subcontext
(0),subcontext_size
((previous_offset
)-(current_offset
))] AuthenticationInformationArray current
;
509 [subcontext
(0)] [flag
(NDR_REMAINING
)] AuthenticationInformationArray previous
;
510 } trustAuthInOutBlob
;
512 [nopython
] void decode_trustAuthInOut
(
513 [in] trustAuthInOutBlob blob
516 typedef [public,nopull
] struct {
517 uint8 confounder
[512];
518 [subcontext
(0),subcontext_size
(outgoing_size
)] trustAuthInOutBlob outgoing
;
519 [subcontext
(0),subcontext_size
(incoming_size
)] trustAuthInOutBlob incoming
;
520 [value
(ndr_size_trustAuthInOutBlob
(&outgoing
, ndr
->flags
))] uint32 outgoing_size
;
521 [value
(ndr_size_trustAuthInOutBlob
(&incoming
, ndr
->flags
))] uint32 incoming_size
;
522 } trustDomainPasswords
;
524 [nopython
] void decode_trustDomainPasswords
(
525 [in] trustDomainPasswords blob
528 typedef [public] struct {
535 [size_is(__size
),charset
(DOS
)] uint8
*string;
536 } ExtendedErrorAString
;
540 [size_is(__size
),charset
(UTF16
)] uint16
*string;
541 } ExtendedErrorUString
;
545 [size_is(length
)] uint8
*data
;
549 EXTENDED_ERROR_COMPUTER_NAME_PRESENT
= 1,
550 EXTENDED_ERROR_COMPUTER_NAME_NOT_PRESENT
= 2
551 } ExtendedErrorComputerNamePresent
;
553 typedef [switch_type(ExtendedErrorComputerNamePresent
)] union {
554 [case(EXTENDED_ERROR_COMPUTER_NAME_PRESENT
)] ExtendedErrorUString name
;
555 [case(EXTENDED_ERROR_COMPUTER_NAME_NOT_PRESENT
)];
556 } ExtendedErrorComputerNameU
;
559 ExtendedErrorComputerNamePresent present
;
560 [switch_is(present
)] ExtendedErrorComputerNameU n
;
561 } ExtendedErrorComputerName
;
564 EXTENDED_ERROR_PARAM_TYPE_ASCII_STRING
= 1,
565 EXTENDED_ERROR_PARAM_TYPE_UNICODE_STRING
= 2,
566 EXTENDED_ERROR_PARAM_TYPE_UINT32
= 3,
567 EXTENDED_ERROR_PARAM_TYPE_UINT16
= 4,
568 EXTENDED_ERROR_PARAM_TYPE_UINT64
= 5,
569 EXTENDED_ERROR_PARAM_TYPE_NONE
= 6,
570 EXTENDED_ERROR_PARAM_TYPE_BLOB
= 7
571 } ExtendedErrorParamType
;
573 typedef [switch_type(ExtendedErrorParamType
)] union {
574 [case(EXTENDED_ERROR_PARAM_TYPE_ASCII_STRING
)] ExtendedErrorAString a_string
;
575 [case(EXTENDED_ERROR_PARAM_TYPE_UNICODE_STRING
)] ExtendedErrorUString u_string
;
576 [case(EXTENDED_ERROR_PARAM_TYPE_UINT32
)] uint32 uint32
;
577 [case(EXTENDED_ERROR_PARAM_TYPE_UINT16
)] uint16 uint16
;
578 [case(EXTENDED_ERROR_PARAM_TYPE_UINT64
)] hyper uint64
;
579 [case(EXTENDED_ERROR_PARAM_TYPE_NONE
)];
580 [case(EXTENDED_ERROR_PARAM_TYPE_BLOB
)] ExtendedErrorBlob blob
;
581 } ExtendedErrorParamU
;
584 ExtendedErrorParamType type
;
585 [switch_is(type
)] ExtendedErrorParamU p
;
586 } ExtendedErrorParam
;
588 typedef [public] struct {
589 ExtendedErrorInfo
*next
;
590 ExtendedErrorComputerName computer_name
;
593 uint32 generating_component
;
595 uint16 detection_location
;
598 [size_is(num_params
)] ExtendedErrorParam params
[];
602 [unique] ExtendedErrorInfo
*info
;
603 } ExtendedErrorInfoPtr
;
605 [nopython
] void decode_ExtendedErrorInfo
(
606 [in,subcontext
(0xFFFFFC01)] ExtendedErrorInfoPtr
ptr
609 /* MS-ADTS 7.1.6.9.3 msDS-TrustForestTrustInfo Attribute */
612 [value
(strlen_m
(string))] uint32 size
;
613 [charset
(UTF8
)] uint8
string[size
];
616 typedef [flag
(NDR_NOALIGN
)] struct {
617 [value
(ndr_size_dom_sid0
(&sid
, ndr
->flags
))] uint32 sid_size
;
618 [subcontext
(0),subcontext_size
(sid_size
)] dom_sid sid
;
619 ForestTrustString dns_name
;
620 ForestTrustString netbios_name
;
621 } ForestTrustDataDomainInfo
;
623 typedef [flag
(NDR_NOALIGN
)] struct {
626 } ForestTrustDataBinaryData
;
628 typedef [nodiscriminant
] union {
629 [case(FOREST_TRUST_TOP_LEVEL_NAME
)] ForestTrustString name
;
630 [case(FOREST_TRUST_TOP_LEVEL_NAME_EX
)] ForestTrustString name
;
631 [case(FOREST_TRUST_DOMAIN_INFO
)] ForestTrustDataDomainInfo info
;
632 [default] ForestTrustDataBinaryData data
;
635 /* same as lsa_ForestTrustRecordType */
636 typedef [enum8bit
] enum {
637 FOREST_TRUST_TOP_LEVEL_NAME
= 0,
638 FOREST_TRUST_TOP_LEVEL_NAME_EX
= 1,
639 FOREST_TRUST_DOMAIN_INFO
= 2
640 } ForestTrustInfoRecordType
;
642 /* meaning of flags depends on record type and values are
643 the same as in lsa.idl, see collision record types */
644 typedef [public,gensize
,flag
(NDR_NOALIGN
)] struct {
647 ForestTrustInfoRecordType type
;
648 [switch_is(type
)] ForestTrustData data
;
649 } ForestTrustInfoRecord
;
651 typedef [flag
(NDR_NOALIGN
)] struct {
652 [value
(ndr_size_ForestTrustInfoRecord
(&record
, ndr
->flags
))] uint32 record_size
;
653 ForestTrustInfoRecord record
;
654 } ForestTrustInfoRecordArmor
;
656 typedef [public,flag
(NDR_NOALIGN
)] struct {
659 ForestTrustInfoRecordArmor records
[count
];
662 [nopython
] void decode_ForestTrustInfo
(
663 [in] ForestTrustInfo blob