FileDocCategorySizeDatePackage
NtlmFlags.javaAPI DocJCIFS 1.3.17 API5563Tue Oct 18 15:26:24 BST 2011jcifs.ntlmssp

NtlmFlags

public interface NtlmFlags
Flags used during negotiation of NTLMSSP authentication.

Fields Summary
public static final int
NTLMSSP_NEGOTIATE_UNICODE
Indicates whether Unicode strings are supported or used.
public static final int
NTLMSSP_NEGOTIATE_OEM
Indicates whether OEM strings are supported or used.
public static final int
NTLMSSP_REQUEST_TARGET
Indicates whether the authentication target is requested from the server.
public static final int
NTLMSSP_NEGOTIATE_SIGN
Specifies that communication across the authenticated channel should carry a digital signature (message integrity).
public static final int
NTLMSSP_NEGOTIATE_SEAL
Specifies that communication across the authenticated channel should be encrypted (message confidentiality).
public static final int
NTLMSSP_NEGOTIATE_DATAGRAM_STYLE
Indicates datagram authentication.
public static final int
NTLMSSP_NEGOTIATE_LM_KEY
Indicates that the LAN Manager session key should be used for signing and sealing authenticated communication.
public static final int
NTLMSSP_NEGOTIATE_NETWARE
public static final int
NTLMSSP_NEGOTIATE_NTLM
Indicates support for NTLM authentication.
public static final int
NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED
Indicates whether the OEM-formatted domain name in which the client workstation has membership is supplied in the Type-1 message. This is used in the negotation of local authentication.
public static final int
NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED
Indicates whether the OEM-formatted workstation name is supplied in the Type-1 message. This is used in the negotiation of local authentication.
public static final int
NTLMSSP_NEGOTIATE_LOCAL_CALL
Sent by the server to indicate that the server and client are on the same machine. This implies that the server will include a local security context handle in the Type 2 message, for use in local authentication.
public static final int
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
Indicates that authenticated communication between the client and server should carry a "dummy" digital signature.
public static final int
NTLMSSP_TARGET_TYPE_DOMAIN
Sent by the server in the Type 2 message to indicate that the target authentication realm is a domain.
public static final int
NTLMSSP_TARGET_TYPE_SERVER
Sent by the server in the Type 2 message to indicate that the target authentication realm is a server.
public static final int
NTLMSSP_TARGET_TYPE_SHARE
Sent by the server in the Type 2 message to indicate that the target authentication realm is a share (presumably for share-level authentication).
public static final int
NTLMSSP_NEGOTIATE_NTLM2
Indicates that the NTLM2 signing and sealing scheme should be used for protecting authenticated communications. This refers to a particular session security scheme, and is not related to the use of NTLMv2 authentication.
public static final int
NTLMSSP_REQUEST_INIT_RESPONSE
public static final int
NTLMSSP_REQUEST_ACCEPT_RESPONSE
public static final int
NTLMSSP_REQUEST_NON_NT_SESSION_KEY
public static final int
NTLMSSP_NEGOTIATE_TARGET_INFO
Sent by the server in the Type 2 message to indicate that it is including a Target Information block in the message. The Target Information block is used in the calculation of the NTLMv2 response.
public static final int
NTLMSSP_NEGOTIATE_128
Indicates that 128-bit encryption is supported.
public static final int
NTLMSSP_NEGOTIATE_KEY_EXCH
public static final int
NTLMSSP_NEGOTIATE_56
Indicates that 56-bit encryption is supported.
Constructors Summary
Methods Summary