Interface NTLMConstants

All Known Implementing Classes:
NTLMUtilities

public interface NTLMConstants
NTLMConstants.java - All NTLM constants.
Since:
MINA 2.0.0-M3
  • Field Details

    • NTLM_SIGNATURE

      static final byte[] NTLM_SIGNATURE
      Signature "NTLMSSP"+{0}
    • DEFAULT_OS_VERSION

      static final byte[] DEFAULT_OS_VERSION
      Version 5.1.2600 a Windows XP version (ex: Build 2600.xpsp_sp2_gdr.050301-1519 : Service Pack 2)
    • MESSAGE_TYPE_1

      static final int MESSAGE_TYPE_1
      Type 1
      See Also:
    • MESSAGE_TYPE_2

      static final int MESSAGE_TYPE_2
      Type 2
      See Also:
    • MESSAGE_TYPE_3

      static final int MESSAGE_TYPE_3
      Type 3
      See Also:
    • FLAG_NEGOTIATE_UNICODE

      static final int FLAG_NEGOTIATE_UNICODE
      Indicates that Unicode strings are supported for use in security buffer data
      See Also:
    • FLAG_NEGOTIATE_OEM

      static final int FLAG_NEGOTIATE_OEM
      Indicates that OEM strings are supported for use in security buffer data
      See Also:
    • FLAG_REQUEST_SERVER_AUTH_REALM

      static final int FLAG_REQUEST_SERVER_AUTH_REALM
      Requests that the server's authentication realm be included in the Type 2 message
      See Also:
    • FLAG_NEGOTIATE_SIGN

      static final int FLAG_NEGOTIATE_SIGN
      Specifies that authenticated communication between the client and server should carry a digital signature (message integrity)
      See Also:
    • FLAG_NEGOTIATE_SEAL

      static final int FLAG_NEGOTIATE_SEAL
      Specifies that authenticated communication between the client and server should be encrypted (message confidentiality)
      See Also:
    • FLAG_NEGOTIATE_DATAGRAM_STYLE

      static final int FLAG_NEGOTIATE_DATAGRAM_STYLE
      Indicates that datagram authentication is being used
      See Also:
    • FLAG_NEGOTIATE_LAN_MANAGER_KEY

      static final int FLAG_NEGOTIATE_LAN_MANAGER_KEY
      Indicates that the Lan Manager Session Key should be used for signing and sealing authenticated communications
      See Also:
    • FLAG_NEGOTIATE_NTLM

      static final int FLAG_NEGOTIATE_NTLM
      Indicates that NTLM authentication is being used
      See Also:
    • FLAG_NEGOTIATE_ANONYMOUS

      static final int FLAG_NEGOTIATE_ANONYMOUS
      Sent by the client in the Type 3 message to indicate that an anonymous context has been established. This also affects the response fields
      See Also:
    • FLAG_NEGOTIATE_DOMAIN_SUPPLIED

      static final int FLAG_NEGOTIATE_DOMAIN_SUPPLIED
      Sent by the client in the Type 1 message to indicate that the name of the domain in which the client workstation has membership is included in the message. This is used by the server to determine whether the client is eligible for local authentication
      See Also:
    • FLAG_NEGOTIATE_WORKSTATION_SUPPLIED

      static final int FLAG_NEGOTIATE_WORKSTATION_SUPPLIED
      Sent by the client in the Type 1 message to indicate that the client workstation's name is included in the message. This is used by the server to determine whether the client is eligible for local authentication
      See Also:
    • FLAG_NEGOTIATE_LOCAL_CALL

      static final int FLAG_NEGOTIATE_LOCAL_CALL
      Sent by the server to indicate that the server and client are on the same machine. Implies that the client may use the established local credentials for authentication instead of calculating a response to the challenge
      See Also:
    • FLAG_NEGOTIATE_ALWAYS_SIGN

      static final int FLAG_NEGOTIATE_ALWAYS_SIGN
      Indicates that authenticated communication between the client and server should be signed with a "dummy" signature
      See Also:
    • FLAG_TARGET_TYPE_DOMAIN

      static final int FLAG_TARGET_TYPE_DOMAIN
      Sent by the server in the Type 2 message to indicate that the target authentication realm is a domain
      See Also:
    • FLAG_TARGET_TYPE_SERVER

      static final int FLAG_TARGET_TYPE_SERVER
      Sent by the server in the Type 2 message to indicate that the target authentication realm is a server
      See Also:
    • FLAG_TARGET_TYPE_SHARE

      static final int FLAG_TARGET_TYPE_SHARE
      Sent by the server in the Type 2 message to indicate that the target authentication realm is a share. Presumably, this is for share-level authentication. Usage is unclear
      See Also:
    • FLAG_NEGOTIATE_NTLM2

      static final int FLAG_NEGOTIATE_NTLM2
      Indicates that the NTLM2 signing and sealing scheme should be used for protecting authenticated communications. Note that this refers to a particular session security scheme, and is not related to the use of NTLMv2 authentication. This flag can, however, have an effect on the response calculations
      See Also:
    • FLAG_NEGOTIATE_TARGET_INFO

      static final int FLAG_NEGOTIATE_TARGET_INFO
      Sent by the server in the Type 2 message to indicate that it is including a Target Information block in the message. The Target Information block is used in the calculation of the NTLMv2 response
      See Also:
    • FLAG_NEGOTIATE_128_BIT_ENCRYPTION

      static final int FLAG_NEGOTIATE_128_BIT_ENCRYPTION
      Indicates that 128-bit encryption is supported
      See Also:
    • FLAG_NEGOTIATE_KEY_EXCHANGE

      static final int FLAG_NEGOTIATE_KEY_EXCHANGE
      Indicates that the client will provide an encrypted master key in the "Session Key" field of the Type 3 message
      See Also:
    • FLAG_NEGOTIATE_56_BIT_ENCRYPTION

      static final int FLAG_NEGOTIATE_56_BIT_ENCRYPTION
      Indicates that 56-bit encryption is supported
      See Also:
    • FLAG_UNIDENTIFIED_1

      static final int FLAG_UNIDENTIFIED_1
      WARN : These flags usage has not been identified
      See Also:
    • FLAG_UNIDENTIFIED_2

      static final int FLAG_UNIDENTIFIED_2
      Negotiate Netware ??!
      See Also:
    • FLAG_UNIDENTIFIED_3

      static final int FLAG_UNIDENTIFIED_3
      Undefined
      See Also:
    • FLAG_UNIDENTIFIED_4

      static final int FLAG_UNIDENTIFIED_4
      Request Init Response ??!
      See Also:
    • FLAG_UNIDENTIFIED_5

      static final int FLAG_UNIDENTIFIED_5
      Request Accept Response ??!
      See Also:
    • FLAG_UNIDENTIFIED_6

      static final int FLAG_UNIDENTIFIED_6
      Request Non-NT Session Key ??!
      See Also:
    • FLAG_UNIDENTIFIED_7

      static final int FLAG_UNIDENTIFIED_7
      Undefined
      See Also:
    • FLAG_UNIDENTIFIED_8

      static final int FLAG_UNIDENTIFIED_8
      Undefined
      See Also:
    • FLAG_UNIDENTIFIED_9

      static final int FLAG_UNIDENTIFIED_9
      Undefined
      See Also:
    • FLAG_UNIDENTIFIED_10

      static final int FLAG_UNIDENTIFIED_10
      Undefined
      See Also:
    • FLAG_UNIDENTIFIED_11

      static final int FLAG_UNIDENTIFIED_11
      Undefined
      See Also:
    • DEFAULT_FLAGS

      static final int DEFAULT_FLAGS
      Default minimal flag set
      See Also:
    • TARGET_INFORMATION_SUBBLOCK_TERMINATOR_TYPE

      static final short TARGET_INFORMATION_SUBBLOCK_TERMINATOR_TYPE
      Sub block terminator
      See Also:
    • TARGET_INFORMATION_SUBBLOCK_SERVER_TYPE

      static final short TARGET_INFORMATION_SUBBLOCK_SERVER_TYPE
      Server name
      See Also:
    • TARGET_INFORMATION_SUBBLOCK_DOMAIN_TYPE

      static final short TARGET_INFORMATION_SUBBLOCK_DOMAIN_TYPE
      Domain name
      See Also:
    • TARGET_INFORMATION_SUBBLOCK_FQDNS_HOSTNAME_TYPE

      static final short TARGET_INFORMATION_SUBBLOCK_FQDNS_HOSTNAME_TYPE
      Fully-qualified DNS host name (i.e., server.domain.com)
      See Also:
    • TARGET_INFORMATION_SUBBLOCK_DNS_DOMAIN_NAME_TYPE

      static final short TARGET_INFORMATION_SUBBLOCK_DNS_DOMAIN_NAME_TYPE
      DNS domain name (i.e., domain.com)
      See Also:
    • TARGET_INFORMATION_SUBBLOCK_PARENT_DNS_DOMAIN_NAME_TYPE

      static final short TARGET_INFORMATION_SUBBLOCK_PARENT_DNS_DOMAIN_NAME_TYPE
      Apparently the "parent" DNS domain for servers in sub domains
      See Also: