"NTLMSSP",
&ntlmssp_command)) {
DEBUG(1, ("Failed to parse NTLMSSP packet, could not extract NTLMSSP command\n"));
- dump_data(2, (const char *)input.data, input.length);
+ dump_data(2, input.data, input.length);
return NT_STATUS_INVALID_PARAMETER;
}
}
&cliname,
&domname)) {
DEBUG(1, ("ntlmssp_server_negotiate: failed to parse NTLMSSP:\n"));
- dump_data(2, (const char *)in.data, in.length);
+ dump_data(2, in.data, in.length);
return NT_STATUS_INVALID_PARAMETER;
}
&ntlmssp_state->encrypted_session_key,
&auth_flags)) {
DEBUG(10, ("ntlmssp_server_auth: failed to parse NTLMSSP (nonfatal):\n"));
- dump_data(10, (const char *)request.data, request.length);
+ dump_data(10, request.data, request.length);
/* zero this out */
data_blob_free(&ntlmssp_state->encrypted_session_key);
&user,
&workstation)) {
DEBUG(1, ("ntlmssp_server_auth: failed to parse NTLMSSP:\n"));
- dump_data(2, (const char *)request.data, request.length);
+ dump_data(2, request.data, request.length);
return NT_STATUS_INVALID_PARAMETER;
}
&server_domain_blob,
&chal_flags)) {
DEBUG(1, ("Failed to parse the NTLMSSP Challenge: (#1)\n"));
- dump_data(2, (const char *)in.data, in.length);
+ dump_data(2, in.data, in.length);
return NT_STATUS_INVALID_PARAMETER;
}
&unkn1, &unkn2,
&struct_blob)) {
DEBUG(1, ("Failed to parse the NTLMSSP Challenge: (#2)\n"));
- dump_data(2, (const char *)in.data, in.length);
+ dump_data(2, in.data, in.length);
return NT_STATUS_INVALID_PARAMETER;
}
DEBUG(5, ("NTLMSSP challenge set by NTLM2\n"));
DEBUG(5, ("challenge is: \n"));
- dump_data(5, (const char *)session_nonce_hash, 8);
+ dump_data(5, session_nonce_hash, 8);
nt_response = data_blob_talloc(ntlmssp_state, NULL, 24);
SMBNTencrypt(ntlmssp_state->password,
sizeof(lm_key)) != 0) {
printf("LM Key does not match expectations!\n");
printf("lm_key:\n");
- dump_data(1, (const char *)lm_key, 8);
+ dump_data(1, lm_key, 8);
printf("expected:\n");
- dump_data(1, (const char *)lm_hash, 8);
+ dump_data(1, lm_hash, 8);
pass = False;
}
switch (break_which) {
case NO_NT:
{
- char lm_key_expected[16];
+ uint8_t lm_key_expected[16];
memcpy(lm_key_expected, lm_hash, 8);
memset(lm_key_expected+8, '\0', 8);
if (memcmp(lm_key_expected, user_session_key,
16) != 0) {
printf("NT Session Key does not match expectations (should be first-8 LM hash)!\n");
printf("user_session_key:\n");
- dump_data(1, (const char *)user_session_key, sizeof(user_session_key));
+ dump_data(1, user_session_key, sizeof(user_session_key));
printf("expected:\n");
- dump_data(1, (const char *)lm_key_expected, sizeof(lm_key_expected));
+ dump_data(1, lm_key_expected, sizeof(lm_key_expected));
pass = False;
}
break;
sizeof(user_session_key)) != 0) {
printf("NT Session Key does not match expectations!\n");
printf("user_session_key:\n");
- dump_data(1, (const char *)user_session_key, 16);
+ dump_data(1, user_session_key, 16);
printf("expected:\n");
- dump_data(1, (const char *)session_key.data, session_key.length);
+ dump_data(1, session_key.data, session_key.length);
pass = False;
}
}
sizeof(lm_key)) != 0) {
printf("LM Key does not match expectations!\n");
printf("lm_key:\n");
- dump_data(1, (const char *)lm_key, 8);
+ dump_data(1, lm_key, 8);
printf("expected:\n");
- dump_data(1, (const char *)lm_hash, 8);
+ dump_data(1, lm_hash, 8);
pass = False;
}
if (memcmp(lm_hash, user_session_key, 8) != 0) {
- char lm_key_expected[16];
+ uint8_t lm_key_expected[16];
memcpy(lm_key_expected, lm_hash, 8);
memset(lm_key_expected+8, '\0', 8);
if (memcmp(lm_key_expected, user_session_key,
16) != 0) {
printf("NT Session Key does not match expectations (should be first-8 LM hash)!\n");
printf("user_session_key:\n");
- dump_data(1, (const char *)user_session_key, sizeof(user_session_key));
+ dump_data(1, user_session_key, sizeof(user_session_key));
printf("expected:\n");
- dump_data(1, (const char *)lm_key_expected, sizeof(lm_key_expected));
+ dump_data(1, lm_key_expected, sizeof(lm_key_expected));
pass = False;
}
}
DATA_BLOB nt_response = data_blob_talloc(samlogon_state->mem_ctx, NULL, 24);
DATA_BLOB session_key = data_blob_talloc(samlogon_state->mem_ctx, NULL, 16);
- char lm_key[8];
- char lm_hash[16];
- char user_session_key[16];
- char nt_hash[16];
+ uint8_t lm_key[8];
+ uint8_t lm_hash[16];
+ uint8_t user_session_key[16];
+ uint8_t nt_hash[16];
ZERO_STRUCT(lm_key);
ZERO_STRUCT(user_session_key);
SMBNTencrypt(samlogon_state->password, samlogon_state->chall.data,
nt_response.data);
- E_md4hash(samlogon_state->password, (uint8_t *)nt_hash);
- SMBsesskeygen_ntv1((const uint8_t *)nt_hash,
+ E_md4hash(samlogon_state->password, nt_hash);
+ SMBsesskeygen_ntv1(nt_hash,
session_key.data);
- lm_good = E_deshash(samlogon_state->password, (uint8_t *)lm_hash);
+ lm_good = E_deshash(samlogon_state->password, lm_hash);
if (!lm_good) {
ZERO_STRUCT(lm_hash);
}
printf("user_session_key:\n");
dump_data(1, user_session_key, 16);
printf("expected:\n");
- dump_data(1, (const char *)session_key.data, session_key.length);
+ dump_data(1, session_key.data, session_key.length);
pass = False;
}
sizeof(user_session_key)) != 0) {
printf("USER (LMv2) Session Key does not match expectations!\n");
printf("user_session_key:\n");
- dump_data(1, (const char *)user_session_key, 16);
+ dump_data(1, user_session_key, 16);
printf("expected:\n");
- dump_data(1, (const char *)lmv2_session_key.data, ntlmv2_session_key.length);
+ dump_data(1, lmv2_session_key.data, ntlmv2_session_key.length);
pass = False;
}
if (memcmp(lmv2_session_key.data, lm_session_key,
sizeof(lm_session_key)) != 0) {
printf("LM (LMv2) Session Key does not match expectations!\n");
printf("lm_session_key:\n");
- dump_data(1, (const char *)lm_session_key, 8);
+ dump_data(1, lm_session_key, 8);
printf("expected:\n");
- dump_data(1, (const char *)lmv2_session_key.data, 8);
+ dump_data(1, lmv2_session_key.data, 8);
pass = False;
}
break;
sizeof(user_session_key)) != 0) {
printf("USER (NTLMv2) Session Key does not match expectations!\n");
printf("user_session_key:\n");
- dump_data(1, (const char *)user_session_key, 16);
+ dump_data(1, user_session_key, 16);
printf("expected:\n");
- dump_data(1, (const char *)ntlmv2_session_key.data, ntlmv2_session_key.length);
+ dump_data(1, ntlmv2_session_key.data, ntlmv2_session_key.length);
pass = False;
}
if (memcmp(ntlmv2_session_key.data, lm_session_key,
sizeof(lm_session_key)) != 0) {
printf("LM (NTLMv2) Session Key does not match expectations!\n");
printf("lm_session_key:\n");
- dump_data(1, (const char *)lm_session_key, 8);
+ dump_data(1, lm_session_key, 8);
printf("expected:\n");
- dump_data(1, (const char *)ntlmv2_session_key.data, 8);
+ dump_data(1, ntlmv2_session_key.data, 8);
pass = False;
}
}
sizeof(lm_key)) != 0) {
printf("LM Key does not match expectations!\n");
printf("lm_key:\n");
- dump_data(1, (const char *)lm_key, 8);
+ dump_data(1, lm_key, 8);
printf("expected:\n");
- dump_data(1, (const char *)lm_hash, 8);
+ dump_data(1, lm_hash, 8);
pass = False;
}
if (memcmp(nt_key, user_session_key, 16) != 0) {
printf("NT Session Key does not match expectations (should be first-8 LM hash)!\n");
printf("user_session_key:\n");
- dump_data(1, (const char *)user_session_key, sizeof(user_session_key));
+ dump_data(1, user_session_key, sizeof(user_session_key));
printf("expected:\n");
- dump_data(1, (const char *)nt_key, sizeof(nt_key));
+ dump_data(1, nt_key, sizeof(nt_key));
pass = False;
}
return pass;