def test_NTLMv1_without_extended_security(): password = '******' server_challenge = b'\x01\x23\x45\x67\x89\xab\xcd\xef' nt_challenge_response, lm_challenge_response, session_key = ntlm.generateChallengeResponseV1(password, server_challenge, has_extended_security = False, client_challenge = b'\xAA'*8) assert binascii.hexlify(nt_challenge_response).lower() == b'67 c4 30 11 f3 02 98 a2 ad 35 ec e6 4f 16 33 1c 44 bd be d9 27 84 1f 94'.replace(b' ', b'') # [MS-NLMP]: 4.2.2.2.1 assert binascii.hexlify(lm_challenge_response).lower() == b'98 de f7 b8 7f 88 aa 5d af e2 df 77 96 88 a1 72 de f1 1c 7d 5c cd ef 13'.replace(b' ', b'') # [MS-NLMP]: 4.2.2.2.2
def test_NTLMv1_with_extended_security(): password = '******' server_challenge = b'\x01\x23\x45\x67\x89\xab\xcd\xef' nt_challenge_response, lm_challenge_response, session_key = ntlm.generateChallengeResponseV1(password, server_challenge, has_extended_security = True, client_challenge = b'\xAA'*8) assert binascii.hexlify(nt_challenge_response).lower() == b'75 37 f8 03 ae 36 71 28 ca 45 82 04 bd e7 ca f8 1e 97 ed 26 83 26 72 32'.replace(b' ', b'') # [MS-NLMP]: 4.2.3.2.2 assert binascii.hexlify(lm_challenge_response).lower() == b'aa aa aa aa aa aa aa aa 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00'.replace(b' ', b'') # [MS-NLMP]: 4.2.3.2.1
def test_NTLMv1_without_extended_security(): password = '******' server_challenge = b'\x01\x23\x45\x67\x89\xab\xcd\xef' nt_challenge_response, lm_challenge_response, session_key = ntlm.generateChallengeResponseV1( password, server_challenge, has_extended_security=False, client_challenge=b'\xAA' * 8) assert binascii.hexlify(nt_challenge_response).lower( ) == b'67 c4 30 11 f3 02 98 a2 ad 35 ec e6 4f 16 33 1c 44 bd be d9 27 84 1f 94'.replace( b' ', b'') # [MS-NLMP]: 4.2.2.2.1 assert binascii.hexlify(lm_challenge_response).lower( ) == b'98 de f7 b8 7f 88 aa 5d af e2 df 77 96 88 a1 72 de f1 1c 7d 5c cd ef 13'.replace( b' ', b'') # [MS-NLMP]: 4.2.2.2.2
def test_NTLMv1_with_extended_security(): password = '******' server_challenge = b'\x01\x23\x45\x67\x89\xab\xcd\xef' nt_challenge_response, lm_challenge_response, session_key = ntlm.generateChallengeResponseV1( password, server_challenge, has_extended_security=True, client_challenge=b'\xAA' * 8) assert binascii.hexlify(nt_challenge_response).lower( ) == b'75 37 f8 03 ae 36 71 28 ca 45 82 04 bd e7 ca f8 1e 97 ed 26 83 26 72 32'.replace( b' ', b'') # [MS-NLMP]: 4.2.3.2.2 assert binascii.hexlify(lm_challenge_response).lower( ) == b'aa aa aa aa aa aa aa aa 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00'.replace( b' ', b'') # [MS-NLMP]: 4.2.3.2.1