Age | Commit message (Collapse) | Author |
|
System.dll on mobile.
(cherry picked from commit 2026a0b408d122cf3eb2f25cb7355215aa100291)
|
|
They weren't updated in the last 6 years and aren't helpful anymore (e.g. by causing unrelated matches during git grep searches).
|
|
|
|
When the NTLM sources are compiled into System.dll, then we need to store the
configuration variables there and peek/poke it in Mono.Security.
|
|
dependency (on Mono.Security assembly) and avoid code duplication (with mscorlib.dll)
|
|
|
|
There has been a bug report where a Microsoft Server 2008 RC2 does
not accept the domain name that it sent back in the Type2Message's
TargetInfo / Domain Name field.
Therefor, we're now using the domain name from the `NetworkCredential' -
this is also what's initialy being sent to the server in the
`Type1Message`.
|
|
* Provide a more descriptive [Obsolete] message for the legacy API.
* Refuse to send the LM response unless explicitly enabled with
Type3Message.DefaultAuthLevel. The LM response is only actually
checked by old, pre-historic servers and sending it exposes the
user's password to very weak encryption.
* Fix some problems when encoding / decoding problems in Type2Message.
* Type3Message now encodes host and domain name in a case-sensitive
way, fixes the tests.
|
|
By default, we use NTLMv2 Session if the server supports it
and fall back to LM and NTLM.
The default behavior can be configured with the static
Mono.Security.Protocol.Ntlm.Type3Message.DefaultAuthLevel
property.
To use NTLMv2, you must explicitly set this to
NtlmAuthLevel.NTLMv2_only.
This is similar to the LAN Manager Authentication Level on
Windows (http://msdn.microsoft.com/en-us/library/ms814176.aspx).
|
|
-Set the correct flags when the domain is not set. This fixes
authentication with an empty or null domain name.
-Allow domain\user and domain/user as the user name and set domain and
user accordingly.
|
|
* ChallengeResponse.cs: Let it compile for Moonlight (where the
file is compiled inside System.dll)
svn path=/trunk/mcs/; revision=157058
|
|
default encoding for compilers.
svn path=/trunk/mcs/; revision=64941
|
|
svn path=/trunk/mcs/; revision=46563
|
|
svn path=/trunk/mcs/; revision=46562
|
|
* MessageBase.cs: Fixed endian issue. Added globalization support.
* Type1Message.cs: Fixed endian issue. Added globalization support.
* Type2Message.cs: Fixed endian issue.
* Type3Message.cs: Fixed endian issue. Added globalization support.
svn path=/trunk/mcs/; revision=35704
|
|
svn path=/trunk/mcs/; revision=30348
|
|
* ChallengeResponse.cs: FxCop-ized.
* NtlmFlags.cs: FxCop-ized. CLS compliance.
* Type1Message.cs: FxCop-ized.
* Type3Message.cs: FxCop-ized.
svn path=/trunk/mcs/; revision=25860
|
|
* NtlmFlags.cs: Changed enum to int for CLS compliance.
svn path=/trunk/mcs/; revision=25721
|
|
* ChallengeResponse.cs: Sorry I must have a profesionnal problem with
weak passwords ;-). Anyway I corrected the CR for null passwords (which
would produce a weak key for the first DES key) and added clean up :).
However it (null password) doesn't work for SQL Server authentication ?
svn path=/trunk/mcs/; revision=21300
|
|
* ChallengeResponse.cs: Pre-calculated second part of the LM hash for
small password. Otherwise we get a DES weak key - which isn't
supported (exception) by the framework.
svn path=/trunk/mcs/; revision=21207
|
|
* ChallengeResponse.cs: Fixed compilation error with mcs (System.Math.Min)
* Type2Message.cs: Fixed compilation warning for override. Flags are now
32 bits.
* Type3Message.cs: Fixed compilation warning for override. Removed (old)
header code to use base class. Changed 16 bits Options for 32 bits Flags
(NtlmFlags).
svn path=/trunk/mcs/; revision=20709
|
|
* ChallengeResponse.cs: New. Implements the NTLM (v1) Challenge Response.
* MessageBase.cs: New. Abstract base class for NTLM messages.
* NtlmFlags.cs: New. All known flags for NTLM.
* Type1Message.cs: New. Negotiation message.
* Type2Message.cs: New. Challenge message.
* Type3Message.cs: New. Authentication message.
svn path=/trunk/mcs/; revision=20676
|