Lines Matching refs:domain
32 def computeResponse(flags, serverChallenge, clientChallenge, serverName, domain, user, password, lmhash='', nthash='',
35 return computeResponseNTLMv2(flags, serverChallenge, clientChallenge, serverName, domain, user, password,
38 return computeResponseNTLMv1(flags, serverChallenge, clientChallenge, serverName, domain, user, password,
120 # If set, TargetName MUST be a domain name. The data corresponding to this flag is provided by the server in the
138 # If set, the domain name is provided (section 2.2.1.1).<25> An alternate name for this field is
559 def getNTLMSSPType1(workstation='', domain='', signingRequired = False, use_ntlmv2 = USE_NTLMv2):
570 domain.encode('utf-16le')
572 domain = domain.decode(encoding)
582 auth['domain_name'] = domain.encode('utf-16le')
585 def getNTLMSSPType3(type1, type2, user, password, domain, lmhash = '', nthash = '', use_ntlmv2 = USE_NTLMv2):
601 domain.encode('utf-16le')
603 domain = user.decode(encoding)
618 ntResponse, lmResponse, sessionBaseKey = computeResponse(ntlmChallenge['flags'], ntlmChallenge['challenge'], clientChallenge, serverName, domain, user, password, lmhash, nthash, use_ntlmv2 )
677 ntlmChallengeResponse['domain_name'] = domain.encode('utf-16le')
696 def computeResponseNTLMv1(flags, serverChallenge, clientChallenge, serverName, domain, user, password, lmhash='', nthash='', use_ntlmv2 = USE_NTLMv2):
879 def NTOWFv2( user, password, domain, hash = ''):
884 return hmac_md5(theHash, user.upper().encode('utf-16le') + domain.encode('utf-16le'))
886 def LMOWFv2( user, password, domain, lmhash = ''):
887 return NTOWFv2( user, password, domain, lmhash)
890 def computeResponseNTLMv2(flags, serverChallenge, clientChallenge, serverName, domain, user, password, lmhash = '', nthash = '', use_ntlmv2 = USE_NTLMv2):
894 responseKeyNT = NTOWFv2(user, password, domain, nthash)
895 responseKeyLM = LMOWFv2(user, password, domain, lmhash)