Displaying 7 results from an estimated 7 matches for "ntlm_response".
2004 Sep 30
1
[PATCH] NTLM2 support
...== NULL) && !auth->ntlm2_negotiated) {
passdb->lookup_credentials(auth_request,
PASSDB_CREDENTIALS_LANMAN,
lm_credentials_callback);
@@ -105,8 +106,16 @@ ntlm_credentials_callback(const char *cr
NTLMSSP_V2_RESPONSE_SIZE) == 0;
} else {
unsigned char ntlm_response[NTLMSSP_RESPONSE_SIZE];
+ const unsigned char *client_lm_response =
+ ntlmssp_buffer_data(auth->response, lm_response);
- ntlmssp_v1_response(hash, auth->challenge, ntlm_response);
+ if (auth->ntlm2_negotiated)
+ ntlmssp2_response(hash, auth->challenge,
+ client_lm_respon...
2004 Nov 10
0
[PATCH] NTLM update and crashfix
...ar *cr
buffer_t *hash_buffer;
int ret;
- if (credentials == NULL && !request->ntlm2_negotiated) {
- passdb->lookup_credentials(auth_request,
- PASSDB_CREDENTIALS_LANMAN,
- lm_credentials_callback);
+ response_length =
+ ntlmssp_buffer_length(request->response, ntlm_response);
+ client_response = ntlmssp_buffer_data(request->response, ntlm_response);
+
+ if ((credentials == NULL) || (response_length == 0)) {
+ /* We can't use LM authentication if NTLM2 was negotiated */
+ if (request->ntlm2_negotiated)
+ mech_auth_finish(auth_request, NULL, 0, FALSE);
+...
2004 Oct 29
1
[PATCH] yet another NTLM update
...-test51/src/auth/mech-ntlm.c 2004-10-29 14:54:38.000000000 +0400
@@ -74,7 +74,11 @@ ntlm_credentials_callback(const char *cr
buffer_t *hash_buffer;
int ret;
- if (credentials == NULL && !request->ntlm2_negotiated) {
+ response_length =
+ ntlmssp_buffer_length(request->response, ntlm_response);
+ client_response = ntlmssp_buffer_data(request->response, ntlm_response);
+
+ if ((credentials == NULL && !request->ntlm2_negotiated) || !response_length) {
passdb->lookup_credentials(auth_request,
PASSDB_CREDENTIALS_LANMAN,
lm_credentials_callback);
@@ -85,...
2004 Jul 27
3
[PATCH 0/10] NTLM patchset submission
Hello all,
as I promised some days ago here is NTLM (aka SPA, aka MSN) authentication
support patchset.
It contains common code in src/lib-ntlm directory, Samba compatible
NTLM password scheme and authentication mechanism itself.
All patches are against 1.0-test30.
Please take a look.
Best regards.
--
Andrey Panin | Linux and UNIX system administrator
pazke at donpac.ru | PGP key:
2004 Jan 01
1
[PATCH] Add winbind-backed NTLMSSP support to Cyrus-SASL
...20000
-#define NTLM_FLAGS_MASK 0x0ffff
-
-#define NTLM_NONCE_LENGTH 8
-#define NTLM_HASH_LENGTH 21
-#define NTLM_RESP_LENGTH 24
-#define NTLM_SESSKEY_LENGTH 16
-
-typedef unsigned short uint16;
-typedef unsigned int uint32;
-
-typedef enum {
- NTLM_REQUEST = 1,
- NTLM_CHALLENGE = 2,
- NTLM_RESPONSE = 3
-} ntlm_type_t;
-
-typedef struct {
- uint16 len;
- uint16 maxlen;
- uint32 offset;
-} ntlm_buffer_t;
-
-typedef struct {
- u_char sig[sizeof(NTLM_SIGNATURE)];
- uint32 type;
- uint32 flags;
- ntlm_buffer_t domain;
- ntlm_buffer_t wkstn;
- /* buffer data follows */
-...
2012 Apr 14
3
NT_STATUS_TRUSTED_RELATIONSHIP_FAILURE with Server 2008R2
...uct LM_RESPONSE
Response :
078e894cc35e1708df68607b51c47cd6fc4cd6febd7d4ca4
NtChallengeResponseLen : 0x0072 (114)
NtChallengeResponseMaxLen: 0x0072 (114)
NtChallengeResponse : *
NtChallengeResponse : union ntlmssp_NTLM_RESPONSE(case
114)
v2: struct NTLMv2_RESPONSE
Response : ff564e232df73299417995e0973dd4e3
Challenge: struct NTLMv2_CLIENT_CHALLENGE
RespType : 0x01 (1)
HiRespType : 0x01 (1...
2011 Jan 21
0
Can not set SPN errors (again)
...ct LM_RESPONSE
Response :
c9d5ed38c43e920200000000000000000000000000000000
NtChallengeResponseLen : 0x0018 (24)
NtChallengeResponseMaxLen: 0x0018 (4)
NtChallengeResponse : *
NtChallengeResponse : union ntlmssp_NTLM_RESPONSE(case
24)
v1: struct NTLM_RESPONSE
Response :
9aef94e899e80eb4bd12c77bba305d325ed9ef61ed93474
DomainNameLen : 0x0000 (0)
DomainNameMaLen : 0x0000 (0)
DomainName : *
DomainName...