Searched refs:NTLMSSP_NEGOTIATE_128 (Results 1 - 2 of 2) sorted by relevance

/external/curl/tests/python_dependencies/impacket/
H A Dntlm.py61 # the client in the CHALLENGE_MESSAGE. Otherwise it is ignored. If both NTLMSSP_NEGOTIATE_56 and NTLMSSP_NEGOTIATE_128
62 # are requested and supported by the client and server, NTLMSSP_NEGOTIATE_56 and NTLMSSP_NEGOTIATE_128 will both be
72 # If set, requests 128-bit session key negotiation. An alternate name for this field is NTLMSSP_NEGOTIATE_128.
73 # If the client sends NTLMSSP_NEGOTIATE_128 to the server in the NEGOTIATE_MESSAGE, the server MUST return
74 # NTLMSSP_NEGOTIATE_128 to the client in the CHALLENGE_MESSAGE only if the client sets NTLMSSP_NEGOTIATE_SEAL or
75 # NTLMSSP_NEGOTIATE_SIGN. Otherwise it is ignored. If both NTLMSSP_NEGOTIATE_56 and NTLMSSP_NEGOTIATE_128 are
76 # requested and supported by the client and server, NTLMSSP_NEGOTIATE_56 and NTLMSSP_NEGOTIATE_128 will both be
77 # returned to the client. Clients and servers that set NTLMSSP_NEGOTIATE_SEAL SHOULD set NTLMSSP_NEGOTIATE_128 if it
78 # is supported. An alternate name for this field is NTLMSSP_NEGOTIATE_128
79 NTLMSSP_NEGOTIATE_128 variable
[all...]
H A Dsmbserver.py2270 if negotiateMessage['flags'] & ntlm.NTLMSSP_NEGOTIATE_128:
2271 ansFlags |= ntlm.NTLMSSP_NEGOTIATE_128
2613 if negotiateMessage['flags'] & ntlm.NTLMSSP_NEGOTIATE_128:
2614 ansFlags |= ntlm.NTLMSSP_NEGOTIATE_128

Completed in 419 milliseconds