Skip to content

Latest commit

 

History

History
178 lines (115 loc) · 10.7 KB

ne-ntsecapi-msv1_0_protocol_message_type.md

File metadata and controls

178 lines (115 loc) · 10.7 KB
UID title description helpviewer_keywords old-location tech.root ms.assetid ms.date ms.keywords req.header req.include-header req.target-type req.target-min-winverclnt req.target-min-winversvr req.kmdf-ver req.umdf-ver req.ddi-compliance req.unicode-ansi req.idl req.max-support req.namespace req.assembly req.type-library req.lib req.dll req.irql targetos req.typenames req.redist ms.custom f1_keywords dev_langs topic_type api_type api_location api_name
NE:ntsecapi._MSV1_0_PROTOCOL_MESSAGE_TYPE
MSV1_0_PROTOCOL_MESSAGE_TYPE (ntsecapi.h)
Lists the types of messages that can be sent to the MSV1_0 Authentication Package by calling the LsaCallAuthenticationPackage function.
*PMSV1_0_PROTOCOL_MESSAGE_TYPE
MSV1_0_PROTOCOL_MESSAGE_TYPE
MSV1_0_PROTOCOL_MESSAGE_TYPE enumeration [Security]
MsV1_0CacheLogon
MsV1_0CacheLookup
MsV1_0CacheLookupEx
MsV1_0ChangeCachedPassword
MsV1_0ChangePassword
MsV1_0ClearCachedCredentials
MsV1_0ConfigLocalAliases
MsV1_0DeriveCredential
MsV1_0EnumerateUsers
MsV1_0GenericPassthrough
MsV1_0GetCredentialKey
MsV1_0GetUserInfo
MsV1_0Lm20ChallengeRequest
MsV1_0Lm20GetChallengeResponse
MsV1_0LookupToken
MsV1_0ReLogonUsers
MsV1_0SetProcessOption
MsV1_0SetThreadOption
MsV1_0SubAuth
MsV1_0ValidateAuth
PMSV1_0_PROTOCOL_MESSAGE_TYPE
PMSV1_0_PROTOCOL_MESSAGE_TYPE enumeration pointer [Security]
_lsa_msv1_0_protocol_message_type
ntsecapi/MSV1_0_PROTOCOL_MESSAGE_TYPE
ntsecapi/MsV1_0CacheLogon
ntsecapi/MsV1_0CacheLookup
ntsecapi/MsV1_0CacheLookupEx
ntsecapi/MsV1_0ChangeCachedPassword
ntsecapi/MsV1_0ChangePassword
ntsecapi/MsV1_0ClearCachedCredentials
ntsecapi/MsV1_0ConfigLocalAliases
ntsecapi/MsV1_0DeriveCredential
ntsecapi/MsV1_0EnumerateUsers
ntsecapi/MsV1_0GenericPassthrough
ntsecapi/MsV1_0GetCredentialKey
ntsecapi/MsV1_0GetUserInfo
ntsecapi/MsV1_0Lm20ChallengeRequest
ntsecapi/MsV1_0Lm20GetChallengeResponse
ntsecapi/MsV1_0LookupToken
ntsecapi/MsV1_0ReLogonUsers
ntsecapi/MsV1_0SetProcessOption
ntsecapi/MsV1_0SetThreadOption
ntsecapi/MsV1_0SubAuth
ntsecapi/MsV1_0ValidateAuth
ntsecapi/PMSV1_0_PROTOCOL_MESSAGE_TYPE
security.msv1_0_protocol_message_type
security\msv1_0_protocol_message_type.htm
security
9498558c-8daf-4dfb-aa1c-0598154ca8c4
12/05/2018
*PMSV1_0_PROTOCOL_MESSAGE_TYPE, MSV1_0_PROTOCOL_MESSAGE_TYPE, MSV1_0_PROTOCOL_MESSAGE_TYPE enumeration [Security], MsV1_0CacheLogon, MsV1_0CacheLookup, MsV1_0CacheLookupEx, MsV1_0ChangeCachedPassword, MsV1_0ChangePassword, MsV1_0ClearCachedCredentials, MsV1_0ConfigLocalAliases, MsV1_0DeriveCredential, MsV1_0EnumerateUsers, MsV1_0GenericPassthrough, MsV1_0GetCredentialKey, MsV1_0GetUserInfo, MsV1_0Lm20ChallengeRequest, MsV1_0Lm20GetChallengeResponse, MsV1_0LookupToken, MsV1_0ReLogonUsers, MsV1_0SetProcessOption, MsV1_0SetThreadOption, MsV1_0SubAuth, MsV1_0ValidateAuth, PMSV1_0_PROTOCOL_MESSAGE_TYPE, PMSV1_0_PROTOCOL_MESSAGE_TYPE enumeration pointer [Security], _lsa_msv1_0_protocol_message_type, ntsecapi/MSV1_0_PROTOCOL_MESSAGE_TYPE, ntsecapi/MsV1_0CacheLogon, ntsecapi/MsV1_0CacheLookup, ntsecapi/MsV1_0CacheLookupEx, ntsecapi/MsV1_0ChangeCachedPassword, ntsecapi/MsV1_0ChangePassword, ntsecapi/MsV1_0ClearCachedCredentials, ntsecapi/MsV1_0ConfigLocalAliases, ntsecapi/MsV1_0DeriveCredential, ntsecapi/MsV1_0EnumerateUsers, ntsecapi/MsV1_0GenericPassthrough, ntsecapi/MsV1_0GetCredentialKey, ntsecapi/MsV1_0GetUserInfo, ntsecapi/MsV1_0Lm20ChallengeRequest, ntsecapi/MsV1_0Lm20GetChallengeResponse, ntsecapi/MsV1_0LookupToken, ntsecapi/MsV1_0ReLogonUsers, ntsecapi/MsV1_0SetProcessOption, ntsecapi/MsV1_0SetThreadOption, ntsecapi/MsV1_0SubAuth, ntsecapi/MsV1_0ValidateAuth, ntsecapi/PMSV1_0_PROTOCOL_MESSAGE_TYPE, security.msv1_0_protocol_message_type
ntsecapi.h
Windows
Windows XP [desktop apps only]
Windows Server 2003 [desktop apps only]
Windows
MSV1_0_PROTOCOL_MESSAGE_TYPE, *PMSV1_0_PROTOCOL_MESSAGE_TYPE
19H1
_MSV1_0_PROTOCOL_MESSAGE_TYPE
ntsecapi/_MSV1_0_PROTOCOL_MESSAGE_TYPE
PMSV1_0_PROTOCOL_MESSAGE_TYPE
ntsecapi/PMSV1_0_PROTOCOL_MESSAGE_TYPE
MSV1_0_PROTOCOL_MESSAGE_TYPE
ntsecapi/MSV1_0_PROTOCOL_MESSAGE_TYPE
c++
APIRef
kbSyntax
HeaderDef
Ntsecapi.h
MSV1_0_PROTOCOL_MESSAGE_TYPE

MSV1_0_PROTOCOL_MESSAGE_TYPE enumeration

-description

The MSV1_0_PROTOCOL_MESSAGE_TYPE enumeration lists the types of messages that can be sent to the MSV1_0 Authentication Package by calling the LsaCallAuthenticationPackage function.

Each message corresponds to a dispatch routine and causes the MSV1_0 authentication package to perform a different task.

-enum-fields

-field MsV1_0Lm20ChallengeRequest:0

This dispatch routine serves as the first half of an NTLM version 2.0 protocol logon. The challenge returned by this call may be delivered to the initiating NTLM 2.0 node. When that node responds with a challenge response, a MsV1_0Lm20Logon message to the LsaLogonUser function is used to complete the logon. For more information, see MSV1_0_LOGON_SUBMIT_TYPE.

-field MsV1_0Lm20GetChallengeResponse

This dispatch routine is used by the NTLM redirector to determine the challenge response to pass to a server when trying to establish a connection to the server.

This routine is passed a challenge from the server. It then encrypts the challenge with either the specified password or with the password implied by the specified logon identifier. Two challenge responses are returned. One is based on the Unicode password as given to the authentication package. The other is based on that password converted to a multiple-byte character set (for example, ASCII) and uppercase. The redirector should use either (or both) formats of challenge responses as it needs them. The redirector should use the returned challenge responses exactly as returned. No zero byte should be added. A challenge response is binary data and might contain zero bytes within the string.

This routine may indicate that a NULL session is to be used. If the redirector specifies all the RETURN_PRIMARY_DOMAINNAME, RETURN_PRIMARY_USERNAME, and USE_PRIMARY_PASSWORD flags, and the logon ID does not correspond to any interactive logon session, this function returns an empty string for the user name and both challenge responses.

-field MsV1_0EnumerateUsers

This value is obsolete.

-field MsV1_0GetUserInfo

This value is obsolete.

-field MsV1_0ReLogonUsers

This value is not supported.

-field MsV1_0ChangePassword

This dispatch routine changes the password of an account.

-field MsV1_0ChangeCachedPassword

This dispatch routine changes a password in the logon cache. This is used when the password is changed on the domain controller using some other mechanism and the locally cached version needs to be updated to match the new value. For example, RAS handles changing the passwords on the domain but then needs to update the cached copy so the user can still access servers.

-field MsV1_0GenericPassthrough

This dispatch routine passes any of the other dispatch routines to the domain controller. The authentication package on the domain controller may choose to reject certain dispatch requests.

-field MsV1_0CacheLogon

This dispatch routine caches logon information in the logon cache.

-field MsV1_0SubAuth

This dispatch routine is called to submit a buffer to a subauthentication package. If the subauthentication is local, use this dispatch routine. If the subauthentication needs to be processed on the domain controller, use the MsV1_0GenericPassthrough dispatch routine with MSV1_0_SUBAUTH_REQUEST and MSV1_0_SUBAUTH_RESPONSE buffers.

-field MsV1_0DeriveCredential

This dispatch routine gets the HMAC_SHA1 hash of the one-way function password of the current logon session.

-field MsV1_0CacheLookup

Reserved. Do not use.

-field MsV1_0SetProcessOption

This dispatch routine sets the password policy. The SeTcbPrivilege is required.

-field MsV1_0ConfigLocalAliases

This dispatch routine adds, deletes, or enumerates registered local aliases. The caller must be a service to use this message type.

Windows Server 2003 and Windows XP:  Not supported.

-field MsV1_0ClearCachedCredentials

This dispatch routine clears the credentials in the local NTLM logon cache. The SeTcbPrivilege is required.

Windows Server 2003 and Windows XP:  Not supported.

-field MsV1_0LookupToken

This dispatch routine looks up the authentication token. The SeTcbPrivilege is required.

Windows Server 2003 with SP2, Windows Vista, Windows Server 2003 and Windows XP:  Not supported.

-field MsV1_0ValidateAuth

This dispatch routine validates the logon authentication. The SeTcbPrivilege is required.

Windows Server 2008, Windows Vista with SP1, Windows Server 2003 with SP2, Windows Vista, Windows Server 2003 and Windows XP:  Not supported.

-field MsV1_0CacheLookupEx

This dispatch routine looks up the local logon in the cache. The SeTcbPrivilege is required.

Windows Server 2008, Windows Vista with SP1, Windows Server 2003 with SP2, Windows Vista, Windows Server 2003 and Windows XP:  Not supported.

-field MsV1_0GetCredentialKey

This dispatch routine gets the credential key of the authentication packet. The SeTcbPrivilege is required.

Windows Server 2008, Windows Vista with SP1, Windows Server 2003 with SP2, Windows Vista, Windows Server 2003 and Windows XP:  Not supported.

-field MsV1_0SetThreadOption

This dispatch routine sets the features and permissions on the calling thread. Thread options take precedence over process options and should be used in place of NTLM process options. The SeTcbPrivilege is required.

Windows Server 2008, Windows Vista with SP1, Windows Server 2003 with SP2, Windows Vista, Windows Server 2003 and Windows XP:  Not supported.

-field MsV1_0DecryptDpapiMasterKey

-field MsV1_0GetStrongCredentialKey

-field MsV1_0TransferCred

-field MsV1_0ProvisionTbal

-field MsV1_0DeleteTbalSecrets