Interface NTLMConstants
- All Known Implementing Classes:
NTLMUtilities
public interface NTLMConstants
NTLMConstants.java - All NTLM constants.
- Since:
- MINA 2.0.0-M3
-
Field Summary
FieldsModifier and TypeFieldDescriptionstatic final intDefault minimal flag setstatic final byte[]Version 5.1.2600 a Windows XP version (ex: Build 2600.xpsp_sp2_gdr.050301-1519 : Service Pack 2)static final intIndicates that 128-bit encryption is supportedstatic final intIndicates that 56-bit encryption is supportedstatic final intIndicates that authenticated communication between the client and server should be signed with a "dummy" signaturestatic final intSent by the client in the Type 3 message to indicate that an anonymous context has been established.static final intIndicates that datagram authentication is being usedstatic final intSent by the client in the Type 1 message to indicate that the name of the domain in which the client workstation has membership is included in the message.static final intIndicates that the client will provide an encrypted master key in the "Session Key" field of the Type 3 messagestatic final intIndicates that the Lan Manager Session Key should be used for signing and sealing authenticated communicationsstatic final intSent by the server to indicate that the server and client are on the same machine.static final intIndicates that NTLM authentication is being usedstatic final intIndicates that the NTLM2 signing and sealing scheme should be used for protecting authenticated communications.static final intIndicates that OEM strings are supported for use in security buffer datastatic final intSpecifies that authenticated communication between the client and server should be encrypted (message confidentiality)static final intSpecifies that authenticated communication between the client and server should carry a digital signature (message integrity)static final intSent by the server in the Type 2 message to indicate that it is including a Target Information block in the message.static final intIndicates that Unicode strings are supported for use in security buffer datastatic final intSent by the client in the Type 1 message to indicate that the client workstation's name is included in the message.static final intRequests that the server's authentication realm be included in the Type 2 messagestatic final intSent by the server in the Type 2 message to indicate that the target authentication realm is a domainstatic final intSent by the server in the Type 2 message to indicate that the target authentication realm is a serverstatic final intSent by the server in the Type 2 message to indicate that the target authentication realm is a share.static final intWARN : These flags usage has not been identifiedstatic final intUndefinedstatic final intUndefinedstatic final intNegotiate Netware ??!static final intUndefinedstatic final intRequest Init Response ??!static final intRequest Accept Response ??!static final intRequest Non-NT Session Key ??!static final intUndefinedstatic final intUndefinedstatic final intUndefinedstatic final intType 1static final intType 2static final intType 3static final byte[]Signature "NTLMSSP"+{0}static final shortDNS domain name (i.e., domain.com)static final shortDomain namestatic final shortFully-qualified DNS host name (i.e., server.domain.com)static final shortApparently the "parent" DNS domain for servers in sub domainsstatic final shortServer namestatic final shortSub block terminator
-
Field Details
-
NTLM_SIGNATURE
static final byte[] NTLM_SIGNATURESignature "NTLMSSP"+{0} -
DEFAULT_OS_VERSION
static final byte[] DEFAULT_OS_VERSIONVersion 5.1.2600 a Windows XP version (ex: Build 2600.xpsp_sp2_gdr.050301-1519 : Service Pack 2) -
MESSAGE_TYPE_1
static final int MESSAGE_TYPE_1Type 1- See Also:
-
MESSAGE_TYPE_2
static final int MESSAGE_TYPE_2Type 2- See Also:
-
MESSAGE_TYPE_3
static final int MESSAGE_TYPE_3Type 3- See Also:
-
FLAG_NEGOTIATE_UNICODE
static final int FLAG_NEGOTIATE_UNICODEIndicates that Unicode strings are supported for use in security buffer data- See Also:
-
FLAG_NEGOTIATE_OEM
static final int FLAG_NEGOTIATE_OEMIndicates that OEM strings are supported for use in security buffer data- See Also:
-
FLAG_REQUEST_SERVER_AUTH_REALM
static final int FLAG_REQUEST_SERVER_AUTH_REALMRequests that the server's authentication realm be included in the Type 2 message- See Also:
-
FLAG_NEGOTIATE_SIGN
static final int FLAG_NEGOTIATE_SIGNSpecifies that authenticated communication between the client and server should carry a digital signature (message integrity)- See Also:
-
FLAG_NEGOTIATE_SEAL
static final int FLAG_NEGOTIATE_SEALSpecifies that authenticated communication between the client and server should be encrypted (message confidentiality)- See Also:
-
FLAG_NEGOTIATE_DATAGRAM_STYLE
static final int FLAG_NEGOTIATE_DATAGRAM_STYLEIndicates that datagram authentication is being used- See Also:
-
FLAG_NEGOTIATE_LAN_MANAGER_KEY
static final int FLAG_NEGOTIATE_LAN_MANAGER_KEYIndicates that the Lan Manager Session Key should be used for signing and sealing authenticated communications- See Also:
-
FLAG_NEGOTIATE_NTLM
static final int FLAG_NEGOTIATE_NTLMIndicates that NTLM authentication is being used- See Also:
-
FLAG_NEGOTIATE_ANONYMOUS
static final int FLAG_NEGOTIATE_ANONYMOUSSent by the client in the Type 3 message to indicate that an anonymous context has been established. This also affects the response fields- See Also:
-
FLAG_NEGOTIATE_DOMAIN_SUPPLIED
static final int FLAG_NEGOTIATE_DOMAIN_SUPPLIEDSent by the client in the Type 1 message to indicate that the name of the domain in which the client workstation has membership is included in the message. This is used by the server to determine whether the client is eligible for local authentication- See Also:
-
FLAG_NEGOTIATE_WORKSTATION_SUPPLIED
static final int FLAG_NEGOTIATE_WORKSTATION_SUPPLIEDSent by the client in the Type 1 message to indicate that the client workstation's name is included in the message. This is used by the server to determine whether the client is eligible for local authentication- See Also:
-
FLAG_NEGOTIATE_LOCAL_CALL
static final int FLAG_NEGOTIATE_LOCAL_CALLSent by the server to indicate that the server and client are on the same machine. Implies that the client may use the established local credentials for authentication instead of calculating a response to the challenge- See Also:
-
FLAG_NEGOTIATE_ALWAYS_SIGN
static final int FLAG_NEGOTIATE_ALWAYS_SIGNIndicates that authenticated communication between the client and server should be signed with a "dummy" signature- See Also:
-
FLAG_TARGET_TYPE_DOMAIN
static final int FLAG_TARGET_TYPE_DOMAINSent by the server in the Type 2 message to indicate that the target authentication realm is a domain- See Also:
-
FLAG_TARGET_TYPE_SERVER
static final int FLAG_TARGET_TYPE_SERVERSent by the server in the Type 2 message to indicate that the target authentication realm is a server- See Also:
-
FLAG_TARGET_TYPE_SHARE
static final int FLAG_TARGET_TYPE_SHARESent by the server in the Type 2 message to indicate that the target authentication realm is a share. Presumably, this is for share-level authentication. Usage is unclear- See Also:
-
FLAG_NEGOTIATE_NTLM2
static final int FLAG_NEGOTIATE_NTLM2Indicates that the NTLM2 signing and sealing scheme should be used for protecting authenticated communications. Note that this refers to a particular session security scheme, and is not related to the use of NTLMv2 authentication. This flag can, however, have an effect on the response calculations- See Also:
-
FLAG_NEGOTIATE_TARGET_INFO
static final int FLAG_NEGOTIATE_TARGET_INFOSent by the server in the Type 2 message to indicate that it is including a Target Information block in the message. The Target Information block is used in the calculation of the NTLMv2 response- See Also:
-
FLAG_NEGOTIATE_128_BIT_ENCRYPTION
static final int FLAG_NEGOTIATE_128_BIT_ENCRYPTIONIndicates that 128-bit encryption is supported- See Also:
-
FLAG_NEGOTIATE_KEY_EXCHANGE
static final int FLAG_NEGOTIATE_KEY_EXCHANGEIndicates that the client will provide an encrypted master key in the "Session Key" field of the Type 3 message- See Also:
-
FLAG_NEGOTIATE_56_BIT_ENCRYPTION
static final int FLAG_NEGOTIATE_56_BIT_ENCRYPTIONIndicates that 56-bit encryption is supported- See Also:
-
FLAG_UNIDENTIFIED_1
static final int FLAG_UNIDENTIFIED_1WARN : These flags usage has not been identified- See Also:
-
FLAG_UNIDENTIFIED_2
static final int FLAG_UNIDENTIFIED_2Negotiate Netware ??!- See Also:
-
FLAG_UNIDENTIFIED_3
static final int FLAG_UNIDENTIFIED_3Undefined- See Also:
-
FLAG_UNIDENTIFIED_4
static final int FLAG_UNIDENTIFIED_4Request Init Response ??!- See Also:
-
FLAG_UNIDENTIFIED_5
static final int FLAG_UNIDENTIFIED_5Request Accept Response ??!- See Also:
-
FLAG_UNIDENTIFIED_6
static final int FLAG_UNIDENTIFIED_6Request Non-NT Session Key ??!- See Also:
-
FLAG_UNIDENTIFIED_7
static final int FLAG_UNIDENTIFIED_7Undefined- See Also:
-
FLAG_UNIDENTIFIED_8
static final int FLAG_UNIDENTIFIED_8Undefined- See Also:
-
FLAG_UNIDENTIFIED_9
static final int FLAG_UNIDENTIFIED_9Undefined- See Also:
-
FLAG_UNIDENTIFIED_10
static final int FLAG_UNIDENTIFIED_10Undefined- See Also:
-
FLAG_UNIDENTIFIED_11
static final int FLAG_UNIDENTIFIED_11Undefined- See Also:
-
DEFAULT_FLAGS
static final int DEFAULT_FLAGSDefault minimal flag set- See Also:
-
TARGET_INFORMATION_SUBBLOCK_TERMINATOR_TYPE
static final short TARGET_INFORMATION_SUBBLOCK_TERMINATOR_TYPESub block terminator- See Also:
-
TARGET_INFORMATION_SUBBLOCK_SERVER_TYPE
static final short TARGET_INFORMATION_SUBBLOCK_SERVER_TYPEServer name- See Also:
-
TARGET_INFORMATION_SUBBLOCK_DOMAIN_TYPE
static final short TARGET_INFORMATION_SUBBLOCK_DOMAIN_TYPEDomain name- See Also:
-
TARGET_INFORMATION_SUBBLOCK_FQDNS_HOSTNAME_TYPE
static final short TARGET_INFORMATION_SUBBLOCK_FQDNS_HOSTNAME_TYPEFully-qualified DNS host name (i.e., server.domain.com)- See Also:
-
TARGET_INFORMATION_SUBBLOCK_DNS_DOMAIN_NAME_TYPE
static final short TARGET_INFORMATION_SUBBLOCK_DNS_DOMAIN_NAME_TYPEDNS domain name (i.e., domain.com)- See Also:
-
TARGET_INFORMATION_SUBBLOCK_PARENT_DNS_DOMAIN_NAME_TYPE
static final short TARGET_INFORMATION_SUBBLOCK_PARENT_DNS_DOMAIN_NAME_TYPEApparently the "parent" DNS domain for servers in sub domains- See Also:
-