summaryrefslogtreecommitdiff
path: root/source/rpc_client
diff options
context:
space:
mode:
authorGünther Deschner <gd@samba.org>2008-02-17 02:50:11 +0100
committerGünther Deschner <gd@samba.org>2008-02-17 02:50:11 +0100
commitead1f11dd21b1df9a595295b3513c5f6088397c9 (patch)
treeefb5e30dab8c4e49955147ace3215892abe93987 /source/rpc_client
parent7bbd64c16f8dda85275ddca0fd00849f890c6e4f (diff)
downloadsamba-ead1f11dd21b1df9a595295b3513c5f6088397c9.tar.gz
Remove unused marshalling for NET_SAM_LOGON_EX and finally NET_USER_INFO_3.
Guenther
Diffstat (limited to 'source/rpc_client')
-rw-r--r--source/rpc_client/init_netlogon.c11
1 files changed, 11 insertions, 0 deletions
diff --git a/source/rpc_client/init_netlogon.c b/source/rpc_client/init_netlogon.c
index f63c54999f6..62f1fac6262 100644
--- a/source/rpc_client/init_netlogon.c
+++ b/source/rpc_client/init_netlogon.c
@@ -158,6 +158,17 @@ void init_netr_IdentityInfo(struct netr_IdentityInfo *r,
/*******************************************************************
inits a structure.
+ This is a network logon packet. The log_id parameters
+ are what an NT server would generate for LUID once the
+ user is logged on. I don't think we care about them.
+
+ Note that this has no access to the NT and LM hashed passwords,
+ so it forwards the challenge, and the NT and LM responses (24
+ bytes each) over the secure channel to the Domain controller
+ for it to say yea or nay. This is the preferred method of
+ checking for a logon as it doesn't export the password
+ hashes to anyone who has compromised the secure channel. JRA.
+
********************************************************************/
void init_netr_NetworkInfo(struct netr_NetworkInfo *r,