package
1.1.1
Repository: https://github.com/oiweiwei/go-msrpc.git
Documentation: pkg.go.dev

# Functions

The CRC32 checksum.
The HMAC-MD5 checksum.
No description provided by the author
No description provided by the author
No description provided by the author
NewConfig function returns the configuration for the NTLM SSP.
NewConfigFromAuthLevel function returns new configuration for the NTLM based on the authentication levels.
RC4K performs XOR key stream on bytes `src` once.
TimeToFiletime function converts the time.Time to filetime.

# Constants

Indicates to the client that the account authentication is constrained.
If set, the connection SHOULD be anonymous.
A channel bindings hash.
The fully qualified domain name (FQDN) of the computer.
The FQDN of the domain.
The FQDN of the forest.
Indicates that this is the last AV_PAIR in the list.
A 32-bit value indicating server or client configuration.
The server's NetBIOS computer name.
The server's NetBIOS domain name.
A SingleHostData structure.
The SPN of the target server.
A FILETIME structure in little-endian byte order that contains the server local time.
Client devices use LM and NTLM authentication, and they never use NTLMv2 session security.
Client devices use LM and NTLM authentication, and they use NTLMv2 session security if the server supports it.
Authenticate Message.
Challenge Message.
Negotiate Message.
None.
Indicates that the client is providing message integrity in the MIC field in the AuthenticateMessage.
If set, requests 128-bit session key negotiation.
If set, requests 56-bit encryption.
If set, a session key is generated regardless of the states of NegotiateSign and NegotiateSeal.
If set, requests connectionless authentication.
If set, requests usage of the NTLM v2 session security.
If set, requests an identify level token.
If set, requests an explicit key exchange.
If set, requests LAN Manager (LM) session key computation.
If set, requests usage of the NTLM v1 session security protocol.
If set, requests OEM character set encoding.
If set, the domain name is provided.
This flag indicates whether the Workstation field is present.
If set, requests session key negotiation for message confidentiality.
If set, requests session key negotiation for message signatures.
If set, indicates that the TargetInfo fields in the ChallengeMessage are populated.
If set, requests Unicode character set encoding.
If set, requests the protocol version number.
No description provided by the author
Client devices use NTLMv1 authentication, and they use NTLMv2 session security if the server supports it.
No description provided by the author
Client devices use NTLMv2 authentication, and they use NTLMv2 session security if the server supports it.
This bit is unused and MUST be zero.
This bit is unused and MUST be zero.
This bit is unused and MUST be zero.
This bit is unused and MUST be zero.
This bit is unused and MUST be zero.
This bit is unused and MUST be zero.
This bit is unused and MUST be zero.
This bit is unused and MUST be zero.
This bit is unused and MUST be zero.
This bit is unused and MUST be zero.
If set, requests the usage of the LMOWF.
If set, a TargetName field of the ChallengeMessage MUST be supplied.
NTLMSSP_REVISION_W2K3.
The signature version.
Indicates that the client is providing a target SPN generated from an untrusted source.
If set, TargetName MUST be a domain name.
If set, TargetName MUST be a server name.
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author

# Variables

The list of allowed attributes.
No description provided by the author
Err128BitEncryptionNotAvailable.
ErrConfidentialityNotAvailable.
No description provided by the author
ErrIntegrityNotAvailable.
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
The default NTLM signature.
Windows 10.
Windows 7.
Windows 8.
Windows 8.1.
Windows Server 2003.
Windows Server 2008.
Windows Server 2008 R2.
WindowsServer 2012.
Windows Server 2012 R2.
Windows Server 2016/2019.
Windows Vista.
Windows XP ServicePack 2.

# Structs

The AuthenticateMessage defines an NTLM authenticate message that is sent from the client to the server after the ChallengeMessage is processed by the client.
The NTLM Authentifier.
The ChallengeMessage defines an NTLM challenge message that is sent from the server to the client.
The computed challenge response.
No description provided by the author
The NTLM configuration.
The LMv1Respons structure defines the NTLM v1 authentication LmChallengeResponse in the AuthenticateMessage.
The LMv2Response structure defines the NTLM v2 authentication LmChallengeResponse in the AuthenticateMessage.
The NTLMSSP GSS API Mechanism.
The NegotiateMessage defines an NTLM negotiate message that is sent from the client to the server.
The NTLMv2ClientChallenge structure defines the client challenge in the AuthenticateMessage.
The NTLMv2Response structure defines the NTLMv2 authentication NtChallengeResponse in the AuthenticateMessage.
No description provided by the author
No description provided by the author
The authentifier state structure represents the negotiated authentication state.
No description provided by the author
The Single_Host_Data structure allows a client to send machine-specific information within an authentication exchange to services on the same machine.
No description provided by the author
No description provided by the author
The attribute value.
No description provided by the author

# Interfaces

The NTLM authentification version.

# Type aliases

A 32-bit value indicating server or client configuration.
The attribute-value pair identifier.
AttrValues represents the map of attribute-value pairs.
The authentication level.
Use password credential.
No description provided by the author
The negotiation flag.
A 256-bit random number created at computer startup to identify the calling machine.
The NTLM message type.
The NTLMv1 Response.
An 8-bit unsigned integer that contains a value indicating the revision of the NTLMSSP in use.