Mercurial > hgrepos > Python2 > PyMuPDF
comparison mupdf-source/thirdparty/curl/lib/vauth/ntlm.h @ 2:b50eed0cc0ef upstream
ADD: MuPDF v1.26.7: the MuPDF source as downloaded by a default build of PyMuPDF 1.26.4.
The directory name has changed: no version number in the expanded directory now.
| author | Franz Glasner <fzglas.hg@dom66.de> |
|---|---|
| date | Mon, 15 Sep 2025 11:43:07 +0200 |
| parents | |
| children |
comparison
equal
deleted
inserted
replaced
| 1:1d09e1dec1d9 | 2:b50eed0cc0ef |
|---|---|
| 1 #ifndef HEADER_VAUTH_NTLM_H | |
| 2 #define HEADER_VAUTH_NTLM_H | |
| 3 /*************************************************************************** | |
| 4 * _ _ ____ _ | |
| 5 * Project ___| | | | _ \| | | |
| 6 * / __| | | | |_) | | | |
| 7 * | (__| |_| | _ <| |___ | |
| 8 * \___|\___/|_| \_\_____| | |
| 9 * | |
| 10 * Copyright (C) 1998 - 2018, Daniel Stenberg, <daniel@haxx.se>, et al. | |
| 11 * | |
| 12 * This software is licensed as described in the file COPYING, which | |
| 13 * you should have received as part of this distribution. The terms | |
| 14 * are also available at https://curl.haxx.se/docs/copyright.html. | |
| 15 * | |
| 16 * You may opt to use, copy, modify, merge, publish, distribute and/or sell | |
| 17 * copies of the Software, and permit persons to whom the Software is | |
| 18 * furnished to do so, under the terms of the COPYING file. | |
| 19 * | |
| 20 * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY | |
| 21 * KIND, either express or implied. | |
| 22 * | |
| 23 ***************************************************************************/ | |
| 24 | |
| 25 #include "curl_setup.h" | |
| 26 | |
| 27 #ifdef USE_NTLM | |
| 28 | |
| 29 /* NTLM buffer fixed size, large enough for long user + host + domain */ | |
| 30 #define NTLM_BUFSIZE 1024 | |
| 31 | |
| 32 /* Stuff only required for curl_ntlm_msgs.c */ | |
| 33 #ifdef BUILDING_CURL_NTLM_MSGS_C | |
| 34 | |
| 35 /* Flag bits definitions based on https://davenport.sourceforge.io/ntlm.html */ | |
| 36 | |
| 37 #define NTLMFLAG_NEGOTIATE_UNICODE (1<<0) | |
| 38 /* Indicates that Unicode strings are supported for use in security buffer | |
| 39 data. */ | |
| 40 | |
| 41 #define NTLMFLAG_NEGOTIATE_OEM (1<<1) | |
| 42 /* Indicates that OEM strings are supported for use in security buffer data. */ | |
| 43 | |
| 44 #define NTLMFLAG_REQUEST_TARGET (1<<2) | |
| 45 /* Requests that the server's authentication realm be included in the Type 2 | |
| 46 message. */ | |
| 47 | |
| 48 /* unknown (1<<3) */ | |
| 49 #define NTLMFLAG_NEGOTIATE_SIGN (1<<4) | |
| 50 /* Specifies that authenticated communication between the client and server | |
| 51 should carry a digital signature (message integrity). */ | |
| 52 | |
| 53 #define NTLMFLAG_NEGOTIATE_SEAL (1<<5) | |
| 54 /* Specifies that authenticated communication between the client and server | |
| 55 should be encrypted (message confidentiality). */ | |
| 56 | |
| 57 #define NTLMFLAG_NEGOTIATE_DATAGRAM_STYLE (1<<6) | |
| 58 /* Indicates that datagram authentication is being used. */ | |
| 59 | |
| 60 #define NTLMFLAG_NEGOTIATE_LM_KEY (1<<7) | |
| 61 /* Indicates that the LAN Manager session key should be used for signing and | |
| 62 sealing authenticated communications. */ | |
| 63 | |
| 64 #define NTLMFLAG_NEGOTIATE_NETWARE (1<<8) | |
| 65 /* unknown purpose */ | |
| 66 | |
| 67 #define NTLMFLAG_NEGOTIATE_NTLM_KEY (1<<9) | |
| 68 /* Indicates that NTLM authentication is being used. */ | |
| 69 | |
| 70 /* unknown (1<<10) */ | |
| 71 | |
| 72 #define NTLMFLAG_NEGOTIATE_ANONYMOUS (1<<11) | |
| 73 /* Sent by the client in the Type 3 message to indicate that an anonymous | |
| 74 context has been established. This also affects the response fields. */ | |
| 75 | |
| 76 #define NTLMFLAG_NEGOTIATE_DOMAIN_SUPPLIED (1<<12) | |
| 77 /* Sent by the client in the Type 1 message to indicate that a desired | |
| 78 authentication realm is included in the message. */ | |
| 79 | |
| 80 #define NTLMFLAG_NEGOTIATE_WORKSTATION_SUPPLIED (1<<13) | |
| 81 /* Sent by the client in the Type 1 message to indicate that the client | |
| 82 workstation's name is included in the message. */ | |
| 83 | |
| 84 #define NTLMFLAG_NEGOTIATE_LOCAL_CALL (1<<14) | |
| 85 /* Sent by the server to indicate that the server and client are on the same | |
| 86 machine. Implies that the client may use a pre-established local security | |
| 87 context rather than responding to the challenge. */ | |
| 88 | |
| 89 #define NTLMFLAG_NEGOTIATE_ALWAYS_SIGN (1<<15) | |
| 90 /* Indicates that authenticated communication between the client and server | |
| 91 should be signed with a "dummy" signature. */ | |
| 92 | |
| 93 #define NTLMFLAG_TARGET_TYPE_DOMAIN (1<<16) | |
| 94 /* Sent by the server in the Type 2 message to indicate that the target | |
| 95 authentication realm is a domain. */ | |
| 96 | |
| 97 #define NTLMFLAG_TARGET_TYPE_SERVER (1<<17) | |
| 98 /* Sent by the server in the Type 2 message to indicate that the target | |
| 99 authentication realm is a server. */ | |
| 100 | |
| 101 #define NTLMFLAG_TARGET_TYPE_SHARE (1<<18) | |
| 102 /* Sent by the server in the Type 2 message to indicate that the target | |
| 103 authentication realm is a share. Presumably, this is for share-level | |
| 104 authentication. Usage is unclear. */ | |
| 105 | |
| 106 #define NTLMFLAG_NEGOTIATE_NTLM2_KEY (1<<19) | |
| 107 /* Indicates that the NTLM2 signing and sealing scheme should be used for | |
| 108 protecting authenticated communications. */ | |
| 109 | |
| 110 #define NTLMFLAG_REQUEST_INIT_RESPONSE (1<<20) | |
| 111 /* unknown purpose */ | |
| 112 | |
| 113 #define NTLMFLAG_REQUEST_ACCEPT_RESPONSE (1<<21) | |
| 114 /* unknown purpose */ | |
| 115 | |
| 116 #define NTLMFLAG_REQUEST_NONNT_SESSION_KEY (1<<22) | |
| 117 /* unknown purpose */ | |
| 118 | |
| 119 #define NTLMFLAG_NEGOTIATE_TARGET_INFO (1<<23) | |
| 120 /* Sent by the server in the Type 2 message to indicate that it is including a | |
| 121 Target Information block in the message. */ | |
| 122 | |
| 123 /* unknown (1<24) */ | |
| 124 /* unknown (1<25) */ | |
| 125 /* unknown (1<26) */ | |
| 126 /* unknown (1<27) */ | |
| 127 /* unknown (1<28) */ | |
| 128 | |
| 129 #define NTLMFLAG_NEGOTIATE_128 (1<<29) | |
| 130 /* Indicates that 128-bit encryption is supported. */ | |
| 131 | |
| 132 #define NTLMFLAG_NEGOTIATE_KEY_EXCHANGE (1<<30) | |
| 133 /* Indicates that the client will provide an encrypted master key in | |
| 134 the "Session Key" field of the Type 3 message. */ | |
| 135 | |
| 136 #define NTLMFLAG_NEGOTIATE_56 (1<<31) | |
| 137 /* Indicates that 56-bit encryption is supported. */ | |
| 138 | |
| 139 #endif /* BUILDING_CURL_NTLM_MSGS_C */ | |
| 140 | |
| 141 #endif /* USE_NTLM */ | |
| 142 | |
| 143 #endif /* HEADER_VAUTH_NTLM_H */ |
