diff options
author | Simo Sorce <simo@redhat.com> | 2014-04-05 14:51:02 -0400 |
---|---|---|
committer | Simo Sorce <simo@redhat.com> | 2014-05-04 17:21:06 -0400 |
commit | fe612bf48a46789cc7e4a4c1e637fe17d2796a97 (patch) | |
tree | 4bd37b88c06ec05a7e8b18b83b1ef078a580f826 /tests | |
parent | 0af4f35f01fef417b42fbad0a9ad774043d898be (diff) | |
download | gss-ntlmssp-fe612bf48a46789cc7e4a4c1e637fe17d2796a97.tar.gz gss-ntlmssp-fe612bf48a46789cc7e4a4c1e637fe17d2796a97.tar.xz gss-ntlmssp-fe612bf48a46789cc7e4a4c1e637fe17d2796a97.zip |
Return target_info from ntlm_decode_auth_msg
The target_info structure embedded in the NT Response message in NTLMv2
contains information needed to establish if the client has sent a valid
MIC. So we need to extract and return it if the caller requested it.
Also moves some wire structures definitions in common to be able to
reuse them.
Diffstat (limited to 'tests')
-rw-r--r-- | tests/ntlmssptest.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/tests/ntlmssptest.c b/tests/ntlmssptest.c index 6915a8c..7a77db7 100644 --- a/tests/ntlmssptest.c +++ b/tests/ntlmssptest.c @@ -910,7 +910,7 @@ int test_DecodeAuthenticateMessageV2(struct ntlm_ctx *ctx) ret = ntlm_decode_auth_msg(ctx, &auth_msg, T_NTLMv2.ChallengeFlags, &lm_chalresp, &nt_chalresp, &dom, &usr, &wks, - &enc_sess_key, NULL); + &enc_sess_key, NULL, NULL); if (ret) return ret; if ((lm_chalresp.length != 24) || |