Home | History | Annotate | Download | only in ntlm

Lines Matching refs:ntlm

1 /*	$NetBSD: ntlm.c,v 1.5 2023/06/19 21:41:45 christos Exp $	*/
62 /*! \mainpage Heimdal NTLM library
66 * Heimdal libheimntlm library is a implementation of the NTLM
71 * NTLM is a protocol for mutual authentication, its still used in
78 * services to authenticate users w/o direct access to the users ntlm
81 * More information about the NTLM protocol can found here
82 * http://davenport.sourceforge.net/ntlm.html .
86 * @section ntlm_example NTLM Example
92 * Example how to use the NTLM primitives.
96 /** @defgroup ntlm_core Heimdal NTLM library
98 * The NTLM core functions implement the string2key generation
191 * heim_ntlm_free_buf frees the ntlm buffer
546 * Decodes an NTLM targetinfo message
548 * @param data input data buffer with the encode NTLM targetinfo message
641 CHECK(krb5_store_uint8(out, 0x0f), 0); /* ntlm version 15 */
968 heim_ntlm_free_buf(&data->ntlm);
992 struct sec_buffer lm, ntlm, target, username, sessionkey, ws;
1012 CHECK(ret_sec_buffer(in, &ntlm), 0);
1013 if (ntlm.allocated)
1014 min_offset = min(min_offset, ntlm.offset);
1038 CHECK(ret_buf(in, &ntlm, &type3->ntlm), 0);
1071 struct sec_buffer lm, ntlm, target, username, sessionkey, ws;
1078 memset(&ntlm, 0, sizeof(ntlm));
1115 ntlm.offset = lm.offset + lm.allocated;
1116 ntlm.length = type3->ntlm.length;
1117 ntlm.allocated = ntlm.length;
1119 sessionkey.offset = ntlm.offset + ntlm.allocated;
1133 CHECK(store_sec_buffer(out, &ntlm), 0);
1154 CHECK(put_buf(out, &type3->ntlm), 0);
1212 * Calculate the NTLM key, the password is assumed to be in UTF8.
1260 * @param key the ntlm v1 key
1421 * @param key the ntlm v1 key
1550 * @param key the ntlm key
1633 * @param key the ntlm key
1639 * @param answer ntlm response answer, should be freed with heim_ntlm_free_buf().
1681 * @param key the ntlm key
1688 * @param answer ntlm response answer, should be freed with heim_ntlm_free_buf().
1887 * @param key the ntlm key
1893 * @param answer ntlm response answer, should be freed with heim_ntlm_free_buf().
1944 * @param ntlm2_hash ntlm hash
1946 * @param ntlm The NTLM response, should be freed with heim_ntlm_free_buf().
1959 struct ntlm_buf *ntlm)
1977 ntlm->data = malloc(24);
1978 if (ntlm->data == NULL) {
1983 ntlm->length = 24;
1992 resp = ntlm->data;
2006 * @param hash The NTLM session verifier