Interface NTLMConstants
-
- All Known Implementing Classes:
NTLMUtilities
public interface NTLMConstantsNTLMConstants.java - All NTLM constants.- Since:
- MINA 2.0.0-M3
- Author:
- Apache MINA Project
-
-
Field Summary
Fields Modifier and Type Field Description static intDEFAULT_FLAGSDefault minimal flag setstatic byte[]DEFAULT_OS_VERSIONVersion 5.1.2600 a Windows XP version (ex: Build 2600.xpsp_sp2_gdr.050301-1519 : Service Pack 2)static intFLAG_NEGOTIATE_128_BIT_ENCRYPTIONIndicates that 128-bit encryption is supportedstatic intFLAG_NEGOTIATE_56_BIT_ENCRYPTIONIndicates that 56-bit encryption is supportedstatic intFLAG_NEGOTIATE_ALWAYS_SIGNIndicates that authenticated communication between the client and server should be signed with a "dummy" signaturestatic intFLAG_NEGOTIATE_ANONYMOUSSent by the client in the Type 3 message to indicate that an anonymous context has been established.static intFLAG_NEGOTIATE_DATAGRAM_STYLEIndicates that datagram authentication is being usedstatic intFLAG_NEGOTIATE_DOMAIN_SUPPLIEDSent by the client in the Type 1 message to indicate that the name of the domain in which the client workstation has membership is included in the message.static intFLAG_NEGOTIATE_KEY_EXCHANGEIndicates that the client will provide an encrypted master key in the "Session Key" field of the Type 3 messagestatic intFLAG_NEGOTIATE_LAN_MANAGER_KEYIndicates that the Lan Manager Session Key should be used for signing and sealing authenticated communicationsstatic intFLAG_NEGOTIATE_LOCAL_CALLSent by the server to indicate that the server and client are on the same machine.static intFLAG_NEGOTIATE_NTLMIndicates that NTLM authentication is being usedstatic intFLAG_NEGOTIATE_NTLM2Indicates that the NTLM2 signing and sealing scheme should be used for protecting authenticated communications.static intFLAG_NEGOTIATE_OEMIndicates that OEM strings are supported for use in security buffer datastatic intFLAG_NEGOTIATE_SEALSpecifies that authenticated communication between the client and server should be encrypted (message confidentiality)static intFLAG_NEGOTIATE_SIGNSpecifies that authenticated communication between the client and server should carry a digital signature (message integrity)static intFLAG_NEGOTIATE_TARGET_INFOSent by the server in the Type 2 message to indicate that it is including a Target Information block in the message.static intFLAG_NEGOTIATE_UNICODEIndicates that Unicode strings are supported for use in security buffer datastatic intFLAG_NEGOTIATE_WORKSTATION_SUPPLIEDSent by the client in the Type 1 message to indicate that the client workstation's name is included in the message.static intFLAG_REQUEST_SERVER_AUTH_REALMRequests that the server's authentication realm be included in the Type 2 messagestatic intFLAG_TARGET_TYPE_DOMAINSent by the server in the Type 2 message to indicate that the target authentication realm is a domainstatic intFLAG_TARGET_TYPE_SERVERSent by the server in the Type 2 message to indicate that the target authentication realm is a serverstatic intFLAG_TARGET_TYPE_SHARESent by the server in the Type 2 message to indicate that the target authentication realm is a share.static intFLAG_UNIDENTIFIED_1WARN : These flags usage has not been identifiedstatic intFLAG_UNIDENTIFIED_10Undefinedstatic intFLAG_UNIDENTIFIED_11Undefinedstatic intFLAG_UNIDENTIFIED_2Negotiate Netware ??!static intFLAG_UNIDENTIFIED_3Undefinedstatic intFLAG_UNIDENTIFIED_4Request Init Response ??!static intFLAG_UNIDENTIFIED_5Request Accept Response ??!static intFLAG_UNIDENTIFIED_6Request Non-NT Session Key ??!static intFLAG_UNIDENTIFIED_7Undefinedstatic intFLAG_UNIDENTIFIED_8Undefinedstatic intFLAG_UNIDENTIFIED_9Undefinedstatic intMESSAGE_TYPE_1Type 1static intMESSAGE_TYPE_2Type 2static intMESSAGE_TYPE_3Type 3static byte[]NTLM_SIGNATURESignature "NTLMSSP"+{0}static shortTARGET_INFORMATION_SUBBLOCK_DNS_DOMAIN_NAME_TYPEDNS domain name (i.e., domain.com)static shortTARGET_INFORMATION_SUBBLOCK_DOMAIN_TYPEDomain namestatic shortTARGET_INFORMATION_SUBBLOCK_FQDNS_HOSTNAME_TYPEFully-qualified DNS host name (i.e., server.domain.com)static shortTARGET_INFORMATION_SUBBLOCK_PARENT_DNS_DOMAIN_NAME_TYPEApparently the "parent" DNS domain for servers in sub domainsstatic shortTARGET_INFORMATION_SUBBLOCK_SERVER_TYPEServer namestatic shortTARGET_INFORMATION_SUBBLOCK_TERMINATOR_TYPESub block terminator
-
-
-
Field Detail
-
NTLM_SIGNATURE
static final byte[] NTLM_SIGNATURE
Signature "NTLMSSP"+{0}
-
DEFAULT_OS_VERSION
static final byte[] DEFAULT_OS_VERSION
Version 5.1.2600 a Windows XP version (ex: Build 2600.xpsp_sp2_gdr.050301-1519 : Service Pack 2)
-
MESSAGE_TYPE_1
static final int MESSAGE_TYPE_1
Type 1- See Also:
- Constant Field Values
-
MESSAGE_TYPE_2
static final int MESSAGE_TYPE_2
Type 2- See Also:
- Constant Field Values
-
MESSAGE_TYPE_3
static final int MESSAGE_TYPE_3
Type 3- See Also:
- Constant Field Values
-
FLAG_NEGOTIATE_UNICODE
static final int FLAG_NEGOTIATE_UNICODE
Indicates that Unicode strings are supported for use in security buffer data- See Also:
- Constant Field Values
-
FLAG_NEGOTIATE_OEM
static final int FLAG_NEGOTIATE_OEM
Indicates that OEM strings are supported for use in security buffer data- See Also:
- Constant Field Values
-
FLAG_REQUEST_SERVER_AUTH_REALM
static final int FLAG_REQUEST_SERVER_AUTH_REALM
Requests that the server's authentication realm be included in the Type 2 message- See Also:
- Constant Field Values
-
FLAG_NEGOTIATE_SIGN
static final int FLAG_NEGOTIATE_SIGN
Specifies that authenticated communication between the client and server should carry a digital signature (message integrity)- See Also:
- Constant Field Values
-
FLAG_NEGOTIATE_SEAL
static final int FLAG_NEGOTIATE_SEAL
Specifies that authenticated communication between the client and server should be encrypted (message confidentiality)- See Also:
- Constant Field Values
-
FLAG_NEGOTIATE_DATAGRAM_STYLE
static final int FLAG_NEGOTIATE_DATAGRAM_STYLE
Indicates that datagram authentication is being used- See Also:
- Constant Field Values
-
FLAG_NEGOTIATE_LAN_MANAGER_KEY
static final int FLAG_NEGOTIATE_LAN_MANAGER_KEY
Indicates that the Lan Manager Session Key should be used for signing and sealing authenticated communications- See Also:
- Constant Field Values
-
FLAG_NEGOTIATE_NTLM
static final int FLAG_NEGOTIATE_NTLM
Indicates that NTLM authentication is being used- See Also:
- Constant Field Values
-
FLAG_NEGOTIATE_ANONYMOUS
static final int FLAG_NEGOTIATE_ANONYMOUS
Sent by the client in the Type 3 message to indicate that an anonymous context has been established. This also affects the response fields- See Also:
- Constant Field Values
-
FLAG_NEGOTIATE_DOMAIN_SUPPLIED
static final int FLAG_NEGOTIATE_DOMAIN_SUPPLIED
Sent by the client in the Type 1 message to indicate that the name of the domain in which the client workstation has membership is included in the message. This is used by the server to determine whether the client is eligible for local authentication- See Also:
- Constant Field Values
-
FLAG_NEGOTIATE_WORKSTATION_SUPPLIED
static final int FLAG_NEGOTIATE_WORKSTATION_SUPPLIED
Sent by the client in the Type 1 message to indicate that the client workstation's name is included in the message. This is used by the server to determine whether the client is eligible for local authentication- See Also:
- Constant Field Values
-
FLAG_NEGOTIATE_LOCAL_CALL
static final int FLAG_NEGOTIATE_LOCAL_CALL
Sent by the server to indicate that the server and client are on the same machine. Implies that the client may use the established local credentials for authentication instead of calculating a response to the challenge- See Also:
- Constant Field Values
-
FLAG_NEGOTIATE_ALWAYS_SIGN
static final int FLAG_NEGOTIATE_ALWAYS_SIGN
Indicates that authenticated communication between the client and server should be signed with a "dummy" signature- See Also:
- Constant Field Values
-
FLAG_TARGET_TYPE_DOMAIN
static final int FLAG_TARGET_TYPE_DOMAIN
Sent by the server in the Type 2 message to indicate that the target authentication realm is a domain- See Also:
- Constant Field Values
-
FLAG_TARGET_TYPE_SERVER
static final int FLAG_TARGET_TYPE_SERVER
Sent by the server in the Type 2 message to indicate that the target authentication realm is a server- See Also:
- Constant Field Values
-
FLAG_TARGET_TYPE_SHARE
static final int FLAG_TARGET_TYPE_SHARE
Sent by the server in the Type 2 message to indicate that the target authentication realm is a share. Presumably, this is for share-level authentication. Usage is unclear- See Also:
- Constant Field Values
-
FLAG_NEGOTIATE_NTLM2
static final int FLAG_NEGOTIATE_NTLM2
Indicates that the NTLM2 signing and sealing scheme should be used for protecting authenticated communications. Note that this refers to a particular session security scheme, and is not related to the use of NTLMv2 authentication. This flag can, however, have an effect on the response calculations- See Also:
- Constant Field Values
-
FLAG_NEGOTIATE_TARGET_INFO
static final int FLAG_NEGOTIATE_TARGET_INFO
Sent by the server in the Type 2 message to indicate that it is including a Target Information block in the message. The Target Information block is used in the calculation of the NTLMv2 response- See Also:
- Constant Field Values
-
FLAG_NEGOTIATE_128_BIT_ENCRYPTION
static final int FLAG_NEGOTIATE_128_BIT_ENCRYPTION
Indicates that 128-bit encryption is supported- See Also:
- Constant Field Values
-
FLAG_NEGOTIATE_KEY_EXCHANGE
static final int FLAG_NEGOTIATE_KEY_EXCHANGE
Indicates that the client will provide an encrypted master key in the "Session Key" field of the Type 3 message- See Also:
- Constant Field Values
-
FLAG_NEGOTIATE_56_BIT_ENCRYPTION
static final int FLAG_NEGOTIATE_56_BIT_ENCRYPTION
Indicates that 56-bit encryption is supported- See Also:
- Constant Field Values
-
FLAG_UNIDENTIFIED_1
static final int FLAG_UNIDENTIFIED_1
WARN : These flags usage has not been identified- See Also:
- Constant Field Values
-
FLAG_UNIDENTIFIED_2
static final int FLAG_UNIDENTIFIED_2
Negotiate Netware ??!- See Also:
- Constant Field Values
-
FLAG_UNIDENTIFIED_3
static final int FLAG_UNIDENTIFIED_3
Undefined- See Also:
- Constant Field Values
-
FLAG_UNIDENTIFIED_4
static final int FLAG_UNIDENTIFIED_4
Request Init Response ??!- See Also:
- Constant Field Values
-
FLAG_UNIDENTIFIED_5
static final int FLAG_UNIDENTIFIED_5
Request Accept Response ??!- See Also:
- Constant Field Values
-
FLAG_UNIDENTIFIED_6
static final int FLAG_UNIDENTIFIED_6
Request Non-NT Session Key ??!- See Also:
- Constant Field Values
-
FLAG_UNIDENTIFIED_7
static final int FLAG_UNIDENTIFIED_7
Undefined- See Also:
- Constant Field Values
-
FLAG_UNIDENTIFIED_8
static final int FLAG_UNIDENTIFIED_8
Undefined- See Also:
- Constant Field Values
-
FLAG_UNIDENTIFIED_9
static final int FLAG_UNIDENTIFIED_9
Undefined- See Also:
- Constant Field Values
-
FLAG_UNIDENTIFIED_10
static final int FLAG_UNIDENTIFIED_10
Undefined- See Also:
- Constant Field Values
-
FLAG_UNIDENTIFIED_11
static final int FLAG_UNIDENTIFIED_11
Undefined- See Also:
- Constant Field Values
-
DEFAULT_FLAGS
static final int DEFAULT_FLAGS
Default minimal flag set- See Also:
- Constant Field Values
-
TARGET_INFORMATION_SUBBLOCK_TERMINATOR_TYPE
static final short TARGET_INFORMATION_SUBBLOCK_TERMINATOR_TYPE
Sub block terminator- See Also:
- Constant Field Values
-
TARGET_INFORMATION_SUBBLOCK_SERVER_TYPE
static final short TARGET_INFORMATION_SUBBLOCK_SERVER_TYPE
Server name- See Also:
- Constant Field Values
-
TARGET_INFORMATION_SUBBLOCK_DOMAIN_TYPE
static final short TARGET_INFORMATION_SUBBLOCK_DOMAIN_TYPE
Domain name- See Also:
- Constant Field Values
-
TARGET_INFORMATION_SUBBLOCK_FQDNS_HOSTNAME_TYPE
static final short TARGET_INFORMATION_SUBBLOCK_FQDNS_HOSTNAME_TYPE
Fully-qualified DNS host name (i.e., server.domain.com)- See Also:
- Constant Field Values
-
TARGET_INFORMATION_SUBBLOCK_DNS_DOMAIN_NAME_TYPE
static final short TARGET_INFORMATION_SUBBLOCK_DNS_DOMAIN_NAME_TYPE
DNS domain name (i.e., domain.com)- See Also:
- Constant Field Values
-
TARGET_INFORMATION_SUBBLOCK_PARENT_DNS_DOMAIN_NAME_TYPE
static final short TARGET_INFORMATION_SUBBLOCK_PARENT_DNS_DOMAIN_NAME_TYPE
Apparently the "parent" DNS domain for servers in sub domains- See Also:
- Constant Field Values
-
-