Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

141 lines
3.6 KiB

//****************************************************************************
//
// Microsoft Remote Access Service
//
// Copyright (C) Microsoft Corporation
//
// Description: This file contains all structure and constant definitions for
// the subauthentication package used by ARAP, MD5 and SFM
//
//****************************************************************************
#ifndef _RASSFMSUBAUTH_
#define _RASSFMSUBAUTH_
//
// Get id for our subauthentication package - MSV1_0_SUBAUTHENTICATION_DLL_RAS
//
#include <ntmsv1_0.h>
//
// Defines for those protocols that need subauthentication at the PDC
//
enum RAS_SUBAUTH_PROTO
{
RAS_SUBAUTH_PROTO_ARAP = 1,
RAS_SUBAUTH_PROTO_MD5CHAP = 2,
RAS_SUBAUTH_PROTO_MD5CHAP_EX = 3,
RAS_SUBAUTH_PROTO_UNKNOWN = 99
};
typedef enum RAS_SUBAUTH_PROTO RAS_SUBAUTH_PROTO;
typedef struct _RAS_SUBAUTH_INFO
{
RAS_SUBAUTH_PROTO ProtocolType;
DWORD DataSize;
UCHAR Data[1];
} RAS_SUBAUTH_INFO, *PRAS_SUBAUTH_INFO;
#define CHAP_RESPONSE_SIZE 16
//
// The RAS_SUBAUTH_INFO 'Data' for ProtocolType RAS_SUBAUTH_PROTO_MD5CHAP.
//
typedef struct
_MD5CHAP_SUBAUTH_INFO
{
// The packet sequence number of the challenge sent to peer. PPP CHAP
// includes this in the hashed information.
//
UCHAR uchChallengeId;
// The challenge sent to peer.
//
UCHAR uchChallenge[ 16 ];
// The challenge response received from peer.
//
UCHAR uchResponse[CHAP_RESPONSE_SIZE];
}
MD5CHAP_SUBAUTH_INFO;
//
// The RAS_SUBAUTH_INFO 'Data' for ProtocolType RAS_SUBAUTH_PROTO_MD5CHAP_EX.
//
typedef struct _MD5CHAP_EX_SUBAUTH_INFO
{
// The packet sequence number of the challenge sent to peer. PPP CHAP
// includes this in the hashed information.
//
UCHAR uchChallengeId;
// The challenge response received from peer.
//
UCHAR uchResponse[CHAP_RESPONSE_SIZE];
// The challenge sent to peer.
//
UCHAR uchChallenge[ 1 ];
} MD5CHAP_EX_SUBAUTH_INFO;
#define MAX_ARAP_USER_NAMELEN 32
#define MAX_MAC_PWD_LEN 8
#define ARAP_SUBAUTH_LOGON_PKT 1
#define ARAP_SUBAUTH_CHGPWD_PKT 2
#define SFM_SUBAUTH_CHGPWD_PKT 3
#define SFM_SUBAUTH_LOGON_PKT 4
#define SFM_2WAY_SUBAUTH_LOGON_PKT ARAP_SUBAUTH_LOGON_PKT
typedef struct _ARAP_CHALLENGE
{
DWORD high;
DWORD low;
} ARAP_CHALLENGE, *PARAP_CHALLENGE;
typedef struct _ARAP_SUBAUTH_REQ
{
DWORD PacketType;
union
{
struct
{
DWORD fGuestLogon;
DWORD NTChallenge1;
DWORD NTChallenge2;
DWORD MacResponse1;
DWORD MacResponse2;
DWORD MacChallenge1;
DWORD MacChallenge2;
DWORD NTResponse1;
DWORD NTResponse2;
LARGE_INTEGER PasswdCreateDate;
LARGE_INTEGER PasswdExpireDate;
} Logon;
struct
{
WCHAR UserName[MAX_ARAP_USER_NAMELEN+1];
UCHAR OldMunge[MAX_ARAP_USER_NAMELEN+1];
UCHAR NewMunge[MAX_ARAP_USER_NAMELEN+1];
} ChgPwd;
};
} ARAP_SUBAUTH_REQ, *PARAP_SUBAUTH_REQ;
//
// NOTE: make sure this structure size doesn't exceed 16 because of our
// workaround in using SessionKey of MSV1_0_VALIDATION_INFO structure
//
typedef struct _ARAP_SUBAUTH_RESP
{
DWORD Result;
ARAP_CHALLENGE Response;
} ARAP_SUBAUTH_RESP, *PARAP_SUBAUTH_RESP;
#endif