Humm, followup from meself..
line 228 in fakeauth_auth.h
/* Sanity checks. XXX values arbitrarialy chosen */
if (l <= 0 || o <= 0 || l >= 32 || o >= 256) {
fprintf(stderr, "ntlmGetString: insane: l:%d o:%d\n", l, o);
return (NULL);
Is there some check for buffer overflow there that is set to 32?
When I tried to change SSWAP 64 the fakeauth_auth.c they got authed by
fakeauth..
Any ideas why this is 32, or why these clients sets 32 and 34?
-- Regards FalkReceived on Mon May 19 2008 - 16:12:21 MDT
This archive was generated by hypermail 2.2.0 : Tue Aug 05 2008 - 01:05:13 MDT