diff options
author | Luke Leighton <lkcl@samba.org> | 1999-06-29 20:51:29 +0000 |
---|---|---|
committer | Luke Leighton <lkcl@samba.org> | 1999-06-29 20:51:29 +0000 |
commit | c31d5972a832ecd7203e871084acbe49abc02055 (patch) | |
tree | a6111478fddb3d7e18d9e1e5584e2c104309e398 | |
parent | 8e145947988d4ac8d025dcd876fae14c75db9527 (diff) | |
download | samba-c31d5972a832ecd7203e871084acbe49abc02055.tar.gz samba-c31d5972a832ecd7203e871084acbe49abc02055.tar.bz2 samba-c31d5972a832ecd7203e871084acbe49abc02055.zip |
removed old code/comments.
(This used to be commit bc8c46bc088298d6247830b673790032e59d7f6a)
-rw-r--r-- | source3/libsmb/smbencrypt.c | 66 |
1 files changed, 0 insertions, 66 deletions
diff --git a/source3/libsmb/smbencrypt.c b/source3/libsmb/smbencrypt.c index abee4f3f19..b833cbd377 100644 --- a/source3/libsmb/smbencrypt.c +++ b/source3/libsmb/smbencrypt.c @@ -223,20 +223,6 @@ void SMBOWFencrypt_ntv2(const uchar kr[16], #endif } -#if 0 -static char np_cli_chal[58] = -{ - 0x01, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, - 0xf0, 0x20, 0xd0, 0xb6, 0xc2, 0x92, 0xBE, 0x01, - 0x05, 0x83, 0x32, 0xec, 0xfa, 0xe4, 0xf3, 0x6d, - 0x6f, 0x00, 0x6e, 0x00, 0x02, 0x00, 0x12, 0x00, - 0x52, 0x00, 0x4f, 0x00, 0x43, 0x00, 0x4b, 0x00, - 0x4e, 0x00, 0x52, 0x00, 0x4f, 0x00, 0x4c, 0x00, - 0x4c, 0x00, 0x00, 0x00, 0x00, 0x00, 0x65, 0x00, - 0x00, 0x00 -}; -#endif - void SMBgenclientchals(char *lm_cli_chal, char *nt_cli_chal, int *nt_cli_chal_len, const char *srv, const char *dom) @@ -316,58 +302,6 @@ void ntv2_owf_gen(const uchar owf[16], #endif } -#if 0 -static void main() -{ - char *kr; - int kr_len; - char *cli_chal; - int cli_chal_len; - char *resp; - int resp_len; - char *k_x; - int k_x_len; - - char k_u[16]; - int k_u_len = sizeof(k_u); - - char sesk[16]; - int sesk_len; - - char buf[1024]; - - int flgs = NTLMSSP_NP | NTLMSSP_N2; - - gen_client_chal(flgs, "BROOKFIELDS1", "TEST1", &cli_chal, &cli_chal_len); - gen_owf(flgs, "test", "ADMINISTRATOR", "BROOKFIELDS1", &kr, &kr_len); - gen_resp(flgs, kr, kr_len, srv_chal, 8, cli_chal, cli_chal_len, - &resp, &resp_len); - - gen_sesskey(flgs, kr, kr_len, resp, resp_len, &k_x, &k_x_len); - - printf("lm_resp:\n"); dump_data(lm_resp, 16); printf("\n"); - printf("np_resp:\n"); dump_data(np_resp, 16); printf("\n"); - printf("resp:\n"); dump_data(resp, 16); printf("\n"); - -#if 0 - printf("np_sesk:\n"); dump_data(np_sess_key, 16); printf("\n"); - if (flgs & NTLMSSP_NP) - { - oem_hash(k_x, k_x_len, k_u, np_sess_key, k_u_len); - sesk_len = k_u_len; - } - else - { - memcpy(sesk, k_x, k_x_len); - sesk_len = k_x_len; - } - - oem_hash(sesk, sesk_len, buf, cli_req, sizeof(cli_req)); - printf("cli_req:\n"); dump_data(buf, sizeof(cli_req)); printf("\n"); -#endif -} -#endif - /* Does the des encryption from the FIRST 8 BYTES of the NT or LM MD4 hash. */ void NTLMSSPOWFencrypt(uchar passwd[8], uchar *ntlmchalresp, uchar p24[24]) { |