Update the MS-NLMP URL, and mention it up front.

Microsoft's pile of protocol documentation is probably the best place to
start now that it exists.

Change-Id: I2580379562cb664f3d00473f6be6313306682b89
Reviewed-on: https://code.wireshark.org/review/33524
Reviewed-by: Guy Harris <guy@alum.mit.edu>
This commit is contained in:
Guy Harris 2019-06-08 19:49:17 -07:00
parent bcfe022d22
commit e44d4e740e
1 changed files with 10 additions and 4 deletions

View File

@ -41,6 +41,15 @@
#include "packet-ntlmssp.h"
/*
* See
*
* https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-nlmp/
*
* for Microsoft's MS-NLMP, NT LAN Manager (NTLM) Authentication Protocol
* Specification.
*/
void proto_register_ntlmssp(void);
void proto_reg_handoff_ntlmssp(void);
@ -85,10 +94,7 @@ static GHashTable* hash_packet = NULL;
* "Request Non-NT Session Key", rather than those values shifted
* right one having those interpretations.
*
* UPDATE: Further information obtained from [MS-NLMP] 2.2.2.5:
* NT LAN Manager (NTLM) Authentication Protocol Specification
* http://msdn2.microsoft.com/en-us/library/cc236621.aspx
*
* UPDATE: Further information obtained from [MS-NLMP] 2.2.2.5
*/
#define NTLMSSP_NEGOTIATE_UNICODE 0x00000001
#define NTLMSSP_NEGOTIATE_OEM 0x00000002