Sponsored Content
Special Forums IP Networking Force routing between three hosts Post 302910311 by solaris_user on Wednesday 23rd of July 2014 01:29:46 PM
Old 07-23-2014
posted a wrong type of answer, please delete this message
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

hosts.allow & hosts.deny

Hi! Im trying to use host.allow & host.deny to resrtic access to my sun machine, but it doesnt seem to work... I want to allow full access from certain IPīs (ssh,http,ftp,etc...) but deny all kind of conections from outsideworld, the way that im doing that is: hosts.allow ALL:127.0.0.1... (2 Replies)
Discussion started by: Sorrento
2 Replies

2. Linux

Is there any way to unload *.so by force?

In linux, dlclose can unload the dynamic linked library when the reference count decreases to zero. My questions is: Is there any way to unload the *.so without caring the reference count? (0 Replies)
Discussion started by: princelinux
0 Replies

3. UNIX for Dummies Questions & Answers

Hosts.allow and hosts.deny

Hello everyone, This is my first posts and I did search for a questions but did not find a question that answered my question unless of course I overlooked it. I'm running Solaris 8. I use ssh for the users but I have a user called "chatterbox" that uses telnet but I need for chatterbox to... (1 Reply)
Discussion started by: huddlestonsnk
1 Replies

4. HP-UX

how to force umount

sorry, wrong section, mod please close thread (0 Replies)
Discussion started by: robertngo
0 Replies

5. HP-UX

Is it really impossible to force umount on HP-UX

Hello, yeah... here my question : Exist some way to force umount on HP other than reboot? Thanks gb (12 Replies)
Discussion started by: gogol_bordello
12 Replies

6. Red Hat

Force machine reconfiguration

Hi, This may be a dumb question, but here goes. While I have been using Linux for some time, I am wondering if a certain capability exists within Red Hat that I have found within SUSE. Cool stuff you might not know that AutoYast can do ? Part 1 Linux In Novell’s East Region points to... (0 Replies)
Discussion started by: mark54g
0 Replies

7. Shell Programming and Scripting

perl - force matching

for below perl code, if without ?, will print test, otherwise will print null. i know it is due to greedy perl regexp matching that eat out test by previous .*, i also know there should be a way to force perl to match if can match, can anyone help me to figure it out or lead me to the right... (6 Replies)
Discussion started by: summer_cherry
6 Replies

8. AIX

aix tcp wrappers hosts.allow hosts.deny?

hi all just installed the netsec.options.tcpwrapper from expansion pack, which used to be a rpm, for my aix 6.1 test box. it is so unpredictable. i set up the hosts.deny as suggested for all and allow the sshd for specific ip addresses/hostnames. the tcpdchk says the hosts allowed and... (0 Replies)
Discussion started by: wf201626
0 Replies

9. Red Hat

Force ssl/ssh to use the hosts file

does anyone know how to force ssh/ssl to use the hosts file instead of DNS? I have disabled the DNS servers but ssh still will not resolve a host in the hosts file. thanks in advance for the help! DS (3 Replies)
Discussion started by: derrell simpson
3 Replies

10. Solaris

How to copy a tar file on a series of remote hosts and untar it on those hosts?

Am trying to copy a tar file onto a series of remote hosts and untar it at the destination. Need to do this without having to do multiple ssh. Actions to perform within a single ssh session via shell script - copy a file - untar at destination (remote host) OS : Linux RHEL6 (3 Replies)
Discussion started by: sankasu
3 Replies
Heimdal NTLM library(3) 					Heimdalntlmlibrary					   Heimdal NTLM library(3)

NAME
Heimdal NTLM library - Functions void heim_ntlm_free_buf (struct ntlm_buf *p) void heim_ntlm_free_targetinfo (struct ntlm_targetinfo *ti) int heim_ntlm_encode_targetinfo (const struct ntlm_targetinfo *ti, int ucs2, struct ntlm_buf *data) int heim_ntlm_decode_targetinfo (const struct ntlm_buf *data, int ucs2, struct ntlm_targetinfo *ti) void heim_ntlm_free_type1 (struct ntlm_type1 *data) int heim_ntlm_encode_type1 (const struct ntlm_type1 *type1, struct ntlm_buf *data) void heim_ntlm_free_type2 (struct ntlm_type2 *data) int heim_ntlm_encode_type2 (const struct ntlm_type2 *type2, struct ntlm_buf *data) void heim_ntlm_free_type3 (struct ntlm_type3 *data) int heim_ntlm_encode_type3 (const struct ntlm_type3 *type3, struct ntlm_buf *data) int heim_ntlm_nt_key (const char *password, struct ntlm_buf *key) int heim_ntlm_calculate_ntlm1 (void *key, size_t len, unsigned char challenge[8], struct ntlm_buf *answer) int heim_ntlm_build_ntlm1_master (void *key, size_t len, struct ntlm_buf *session, struct ntlm_buf *master) int heim_ntlm_build_ntlm2_master (void *key, size_t len, struct ntlm_buf *blob, struct ntlm_buf *session, struct ntlm_buf *master) int heim_ntlm_keyex_unwrap (struct ntlm_buf *baseKey, struct ntlm_buf *encryptedSession, struct ntlm_buf *session) int heim_ntlm_ntlmv2_key (const void *key, size_t len, const char *username, const char *target, unsigned char ntlmv2[16]) int heim_ntlm_calculate_lm2 (const void *key, size_t len, const char *username, const char *target, const unsigned char serverchallenge[8], unsigned char ntlmv2[16], struct ntlm_buf *answer) int heim_ntlm_calculate_ntlm2 (const void *key, size_t len, const char *username, const char *target, const unsigned char serverchallenge[8], const struct ntlm_buf *infotarget, unsigned char ntlmv2[16], struct ntlm_buf *answer) int heim_ntlm_verify_ntlm2 (const void *key, size_t len, const char *username, const char *target, time_t now, const unsigned char serverchallenge[8], const struct ntlm_buf *answer, struct ntlm_buf *infotarget, unsigned char ntlmv2[16]) Detailed Description The NTLM core functions implement the string2key generation function, message encode and decode function, and the hash function functions. Function Documentation int heim_ntlm_build_ntlm1_master (void * key, size_t len, struct ntlm_buf * session, struct ntlm_buf * master) Generates an NTLMv1 session random with assosited session master key. Parameters: key the ntlm v1 key len length of key session generated session nonce, should be freed with heim_ntlm_free_buf(). master calculated session master key, should be freed with heim_ntlm_free_buf(). Returns: In case of success 0 is return, an errors, a errno in what went wrong. int heim_ntlm_build_ntlm2_master (void * key, size_t len, struct ntlm_buf * blob, struct ntlm_buf * session, struct ntlm_buf * master) Generates an NTLMv2 session random with associated session master key. Parameters: key the NTLMv2 key len length of key blob the NTLMv2 'blob' session generated session nonce, should be freed with heim_ntlm_free_buf(). master calculated session master key, should be freed with heim_ntlm_free_buf(). Returns: In case of success 0 is return, an errors, a errno in what went wrong. int heim_ntlm_calculate_lm2 (const void * key, size_t len, const char * username, const char * target, const unsigned char serverchallenge[8], unsigned char ntlmv2[16], struct ntlm_buf * answer) Calculate LMv2 response Parameters: key the ntlm key len length of key username name of the user, as sent in the message, assumed to be in UTF8. target the name of the target, assumed to be in UTF8. serverchallenge challenge as sent by the server in the type2 message. ntlmv2 calculated session key answer ntlm response answer, should be freed with heim_ntlm_free_buf(). Returns: In case of success 0 is return, an errors, a errno in what went wrong. int heim_ntlm_calculate_ntlm1 (void * key, size_t len, unsigned char challenge[8], struct ntlm_buf * answer) Calculate NTLMv1 response hash Parameters: key the ntlm v1 key len length of key challenge sent by the server answer calculated answer, should be freed with heim_ntlm_free_buf(). Returns: In case of success 0 is return, an errors, a errno in what went wrong. int heim_ntlm_calculate_ntlm2 (const void * key, size_t len, const char * username, const char * target, const unsigned char serverchallenge[8], const struct ntlm_buf * infotarget, unsigned char ntlmv2[16], struct ntlm_buf * answer) Calculate NTLMv2 response Parameters: key the ntlm key len length of key username name of the user, as sent in the message, assumed to be in UTF8. target the name of the target, assumed to be in UTF8. serverchallenge challenge as sent by the server in the type2 message. infotarget infotarget as sent by the server in the type2 message. ntlmv2 calculated session key answer ntlm response answer, should be freed with heim_ntlm_free_buf(). Returns: In case of success 0 is return, an errors, a errno in what went wrong. int heim_ntlm_decode_targetinfo (const struct ntlm_buf * data, int ucs2, struct ntlm_targetinfo * ti) Decodes an NTLM targetinfo message Parameters: data input data buffer with the encode NTLM targetinfo message ucs2 if the strings should be encoded with ucs2 (selected by flag in message). ti the decoded target info, should be freed with heim_ntlm_free_targetinfo(). Returns: In case of success 0 is return, an errors, a errno in what went wrong. int heim_ntlm_encode_targetinfo (const struct ntlm_targetinfo * ti, int ucs2, struct ntlm_buf * data) Encodes a ntlm_targetinfo message. Parameters: ti the ntlm_targetinfo message to encode. ucs2 ignored data is the return buffer with the encoded message, should be freed with heim_ntlm_free_buf(). Returns: In case of success 0 is return, an errors, a errno in what went wrong. int heim_ntlm_encode_type1 (const struct ntlm_type1 * type1, struct ntlm_buf * data) Encodes an ntlm_type1 message. Parameters: type1 the ntlm_type1 message to encode. data is the return buffer with the encoded message, should be freed with heim_ntlm_free_buf(). Returns: In case of success 0 is return, an errors, a errno in what went wrong. int heim_ntlm_encode_type2 (const struct ntlm_type2 * type2, struct ntlm_buf * data) Encodes an ntlm_type2 message. Parameters: type2 the ntlm_type2 message to encode. data is the return buffer with the encoded message, should be freed with heim_ntlm_free_buf(). Returns: In case of success 0 is return, an errors, a errno in what went wrong. int heim_ntlm_encode_type3 (const struct ntlm_type3 * type3, struct ntlm_buf * data) Encodes an ntlm_type3 message. Parameters: type3 the ntlm_type3 message to encode. data is the return buffer with the encoded message, should be freed with heim_ntlm_free_buf(). Returns: In case of success 0 is return, an errors, a errno in what went wrong. void heim_ntlm_free_buf (struct ntlm_buf * p) heim_ntlm_free_buf frees the ntlm buffer Parameters: p buffer to be freed void heim_ntlm_free_targetinfo (struct ntlm_targetinfo * ti) Frees the ntlm_targetinfo message Parameters: ti targetinfo to be freed void heim_ntlm_free_type1 (struct ntlm_type1 * data) Frees the ntlm_type1 message Parameters: data message to be freed void heim_ntlm_free_type2 (struct ntlm_type2 * data) Frees the ntlm_type2 message Parameters: data message to be freed void heim_ntlm_free_type3 (struct ntlm_type3 * data) Frees the ntlm_type3 message Parameters: data message to be freed int heim_ntlm_keyex_unwrap (struct ntlm_buf * baseKey, struct ntlm_buf * encryptedSession, struct ntlm_buf * session) Given a key and encrypted session, unwrap the session key Parameters: baseKey the sessionBaseKey encryptedSession encrypted session, type3.session field. session generated session nonce, should be freed with heim_ntlm_free_buf(). Returns: In case of success 0 is return, an errors, a errno in what went wrong. int heim_ntlm_nt_key (const char * password, struct ntlm_buf * key) Calculate the NTLM key, the password is assumed to be in UTF8. Parameters: password password to calcute the key for. key calcuted key, should be freed with heim_ntlm_free_buf(). Returns: In case of success 0 is return, an errors, a errno in what went wrong. int heim_ntlm_ntlmv2_key (const void * key, size_t len, const char * username, const char * target, unsigned char ntlmv2[16]) Generates an NTLMv2 session key. Parameters: key the ntlm key len length of key username name of the user, as sent in the message, assumed to be in UTF8. target the name of the target, assumed to be in UTF8. ntlmv2 the ntlmv2 session key Returns: 0 on success, or an error code on failure. int heim_ntlm_verify_ntlm2 (const void * key, size_t len, const char * username, const char * target, time_t now, const unsigned char serverchallenge[8], const struct ntlm_buf * answer, struct ntlm_buf * infotarget, unsigned char ntlmv2[16]) Verify NTLMv2 response. Parameters: key the ntlm key len length of key username name of the user, as sent in the message, assumed to be in UTF8. target the name of the target, assumed to be in UTF8. now the time now (0 if the library should pick it up itself) serverchallenge challenge as sent by the server in the type2 message. answer ntlm response answer, should be freed with heim_ntlm_free_buf(). infotarget infotarget as sent by the server in the type2 message. ntlmv2 calculated session key Returns: In case of success 0 is return, an errors, a errno in what went wrong. Version 1.5.2 11 Jan 2012 Heimdal NTLM library(3)
All times are GMT -4. The time now is 11:58 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy