Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 6 of 6 for nTOWFv2 (0.03 sec)

  1. src/test/java/jcifs/smb/NtlmUtilTest.java

        }
    
        @Test
        @DisplayName("nTOWFv2: overloads produce same result and domain affects key")
        void testNTOWFv2_overloadsAndDomainSensitivity() {
            // Arrange
            String domain = "Domain";
            String user = "User";
            String password = "password";
    
            // Act
            byte[] viaHash = NtlmUtil.nTOWFv2(domain, user, NtlmUtil.getNTHash(password));
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 30 05:58:03 UTC 2025
    - 12K bytes
    - Viewed (0)
  2. src/main/java/jcifs/smb/NtlmUtil.java

            return ret;
        }
    
        /**
         * Generates the NTOWFv2 hash for the given domain, username, and password.
         *
         * @param domain the authentication domain
         * @param username the username
         * @param password the password
         *
         * @return the calculated mac
         */
        public static byte[] nTOWFv2(final String domain, final String username, final String password) {
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 30 05:58:03 UTC 2025
    - 15.1K bytes
    - Viewed (0)
  3. src/test/java/jcifs/smb1/smb1/NtlmPasswordAuthenticationTest.java

            byte[] hash = NtlmPasswordAuthentication.nTOWFv1("password");
            assertNotNull(hash);
            assertEquals(16, hash.length);
        }
    
        // Test nTOWFv2
        @Test
        void testNTOWFv2() {
            byte[] hash = NtlmPasswordAuthentication.nTOWFv2("DOMAIN", "user", "password");
            assertNotNull(hash);
            assertEquals(16, hash.length);
        }
    
        // Test unescape method
        @ParameterizedTest
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 9.7K bytes
    - Viewed (0)
  4. src/main/java/jcifs/smb1/smb1/NtlmPasswordAuthentication.java

            }
        }
    
        /**
         * Generates the NTOWFv2 hash for the given domain, username, and password.
         *
         * @param domain the authentication domain
         * @param username the username
         * @param password the password
         * @return the NTOWFv2 hash bytes
         */
        public static byte[] nTOWFv2(final String domain, final String username, final String password) {
            try {
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 26.7K bytes
    - Viewed (0)
  5. src/main/java/jcifs/smb1/ntlmssp/Type3Message.java

                setLMResponse(nt);
                setNTResponse(nt);
                break;
            case 3:
            case 4:
            case 5:
                final byte[] responseKeyNT = NtlmPasswordAuthentication.nTOWFv2(domain, user, password);
    
                final byte[] clientChallenge = new byte[8];
                RANDOM.nextBytes(clientChallenge);
                setLMResponse(getLMv2Response(type2, domain, user, password, clientChallenge));
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 24.1K bytes
    - Viewed (0)
  6. src/main/java/jcifs/ntlmssp/Type3Message.java

                    // make sure to set the TARGET_INFO flag as we are sending
                    setFlag(NtlmFlags.NTLMSSP_NEGOTIATE_TARGET_INFO, true);
                }
    
                final byte[] responseKeyNT = NtlmUtil.nTOWFv2(domain, user, passwordHash);
                final byte[] ntlmClientChallenge = new byte[8];
                tc.getConfig().getRandom().nextBytes(ntlmClientChallenge);
    
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 32.7K bytes
    - Viewed (0)
Back to top