summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorLuke Leighton <lkcl@samba.org>1999-06-29 20:51:29 +0000
committerLuke Leighton <lkcl@samba.org>1999-06-29 20:51:29 +0000
commitc31d5972a832ecd7203e871084acbe49abc02055 (patch)
treea6111478fddb3d7e18d9e1e5584e2c104309e398
parent8e145947988d4ac8d025dcd876fae14c75db9527 (diff)
downloadsamba-c31d5972a832ecd7203e871084acbe49abc02055.tar.gz
samba-c31d5972a832ecd7203e871084acbe49abc02055.tar.bz2
samba-c31d5972a832ecd7203e871084acbe49abc02055.zip
removed old code/comments.
(This used to be commit bc8c46bc088298d6247830b673790032e59d7f6a)
-rw-r--r--source3/libsmb/smbencrypt.c66
1 files changed, 0 insertions, 66 deletions
diff --git a/source3/libsmb/smbencrypt.c b/source3/libsmb/smbencrypt.c
index abee4f3f19..b833cbd377 100644
--- a/source3/libsmb/smbencrypt.c
+++ b/source3/libsmb/smbencrypt.c
@@ -223,20 +223,6 @@ void SMBOWFencrypt_ntv2(const uchar kr[16],
#endif
}
-#if 0
-static char np_cli_chal[58] =
-{
- 0x01, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
- 0xf0, 0x20, 0xd0, 0xb6, 0xc2, 0x92, 0xBE, 0x01,
- 0x05, 0x83, 0x32, 0xec, 0xfa, 0xe4, 0xf3, 0x6d,
- 0x6f, 0x00, 0x6e, 0x00, 0x02, 0x00, 0x12, 0x00,
- 0x52, 0x00, 0x4f, 0x00, 0x43, 0x00, 0x4b, 0x00,
- 0x4e, 0x00, 0x52, 0x00, 0x4f, 0x00, 0x4c, 0x00,
- 0x4c, 0x00, 0x00, 0x00, 0x00, 0x00, 0x65, 0x00,
- 0x00, 0x00
-};
-#endif
-
void SMBgenclientchals(char *lm_cli_chal,
char *nt_cli_chal, int *nt_cli_chal_len,
const char *srv, const char *dom)
@@ -316,58 +302,6 @@ void ntv2_owf_gen(const uchar owf[16],
#endif
}
-#if 0
-static void main()
-{
- char *kr;
- int kr_len;
- char *cli_chal;
- int cli_chal_len;
- char *resp;
- int resp_len;
- char *k_x;
- int k_x_len;
-
- char k_u[16];
- int k_u_len = sizeof(k_u);
-
- char sesk[16];
- int sesk_len;
-
- char buf[1024];
-
- int flgs = NTLMSSP_NP | NTLMSSP_N2;
-
- gen_client_chal(flgs, "BROOKFIELDS1", "TEST1", &cli_chal, &cli_chal_len);
- gen_owf(flgs, "test", "ADMINISTRATOR", "BROOKFIELDS1", &kr, &kr_len);
- gen_resp(flgs, kr, kr_len, srv_chal, 8, cli_chal, cli_chal_len,
- &resp, &resp_len);
-
- gen_sesskey(flgs, kr, kr_len, resp, resp_len, &k_x, &k_x_len);
-
- printf("lm_resp:\n"); dump_data(lm_resp, 16); printf("\n");
- printf("np_resp:\n"); dump_data(np_resp, 16); printf("\n");
- printf("resp:\n"); dump_data(resp, 16); printf("\n");
-
-#if 0
- printf("np_sesk:\n"); dump_data(np_sess_key, 16); printf("\n");
- if (flgs & NTLMSSP_NP)
- {
- oem_hash(k_x, k_x_len, k_u, np_sess_key, k_u_len);
- sesk_len = k_u_len;
- }
- else
- {
- memcpy(sesk, k_x, k_x_len);
- sesk_len = k_x_len;
- }
-
- oem_hash(sesk, sesk_len, buf, cli_req, sizeof(cli_req));
- printf("cli_req:\n"); dump_data(buf, sizeof(cli_req)); printf("\n");
-#endif
-}
-#endif
-
/* Does the des encryption from the FIRST 8 BYTES of the NT or LM MD4 hash. */
void NTLMSSPOWFencrypt(uchar passwd[8], uchar *ntlmchalresp, uchar p24[24])
{