summaryrefslogtreecommitdiffstats
path: root/tests
diff options
context:
space:
mode:
authorSimo Sorce <simo@redhat.com>2014-04-05 14:51:02 -0400
committerSimo Sorce <simo@redhat.com>2014-05-04 17:21:06 -0400
commitfe612bf48a46789cc7e4a4c1e637fe17d2796a97 (patch)
tree4bd37b88c06ec05a7e8b18b83b1ef078a580f826 /tests
parent0af4f35f01fef417b42fbad0a9ad774043d898be (diff)
downloadgss-ntlmssp-fe612bf48a46789cc7e4a4c1e637fe17d2796a97.tar.gz
gss-ntlmssp-fe612bf48a46789cc7e4a4c1e637fe17d2796a97.tar.xz
gss-ntlmssp-fe612bf48a46789cc7e4a4c1e637fe17d2796a97.zip
Return target_info from ntlm_decode_auth_msg
The target_info structure embedded in the NT Response message in NTLMv2 contains information needed to establish if the client has sent a valid MIC. So we need to extract and return it if the caller requested it. Also moves some wire structures definitions in common to be able to reuse them.
Diffstat (limited to 'tests')
-rw-r--r--tests/ntlmssptest.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/tests/ntlmssptest.c b/tests/ntlmssptest.c
index 6915a8c..7a77db7 100644
--- a/tests/ntlmssptest.c
+++ b/tests/ntlmssptest.c
@@ -910,7 +910,7 @@ int test_DecodeAuthenticateMessageV2(struct ntlm_ctx *ctx)
ret = ntlm_decode_auth_msg(ctx, &auth_msg, T_NTLMv2.ChallengeFlags,
&lm_chalresp, &nt_chalresp,
&dom, &usr, &wks,
- &enc_sess_key, NULL);
+ &enc_sess_key, NULL, NULL);
if (ret) return ret;
if ((lm_chalresp.length != 24) ||