def test_get_NTLM2_response(self): expected_response = ntlmv1_with_ess_ntlmv1_response expected_key = ntlmv1_with_ess_session_base_key actual_response, actual_key = ComputeResponse._get_NTLM2_response(password, server_challenge, client_challenge) assert actual_response == expected_response assert actual_key == expected_key
def test_get_NTLM2_response(self): # 4.2.3.2.2 - NTLMv1 Response server_challenge = b"\x01\x23\x45\x67\x89\xab\xcd\xef" client_challenge = b"\xaa" * 8 expected_response = b"\x75\x37\xf8\x03\xae\x36\x71\x28" \ b"\xca\x45\x82\x04\xbd\xe7\xca\xf8" \ b"\x1e\x97\xed\x26\x83\x26\x72\x32" expected_key = b"\xd8\x72\x62\xb0\xcd\xe4\xb1\xcb" \ b"\x74\x99\xbe\xcc\xcd\xf1\x07\x84" actual_response, actual_key = \ ComputeResponse._get_NTLM2_response("Password", server_challenge, client_challenge) assert actual_response == expected_response assert actual_key == expected_key