Displaying 5 results from an estimated 5 matches for "read_le32".
2004 Oct 22
1
[PATCH] support OEM encoding in NTLM messages
...flags;
if (!ntlmssp_check_request(ntlm_request, data_size, &error)) {
if (verbose) {
@@ -154,8 +156,9 @@ mech_ntlm_auth_continue(struct auth_requ
message = ntlmssp_create_challenge(request->pool, ntlm_request,
&message_size);
- request->ntlm2_negotiated =
- read_le32(&message->flags) & NTLMSSP_NEGOTIATE_NTLM2;
+ flags = read_le32(&message->flags);
+ request->ntlm2_negotiated = flags & NTLMSSP_NEGOTIATE_NTLM2;
+ request->unicode_negotiated = flags & NTLMSSP_NEGOTIATE_UNICODE;
request->challenge = message->challenge;...
2004 Jul 27
3
[PATCH 0/10] NTLM patchset submission
Hello all,
as I promised some days ago here is NTLM (aka SPA, aka MSN) authentication
support patchset.
It contains common code in src/lib-ntlm directory, Samba compatible
NTLM password scheme and authentication mechanism itself.
All patches are against 1.0-test30.
Please take a look.
Best regards.
--
Andrey Panin | Linux and UNIX system administrator
pazke at donpac.ru | PGP key:
2004 Oct 07
0
[PATCH] fix NTLM2 endianness buglet
...ot-1.0-test46/src/auth/mech-ntlm.c 2004-10-04 21:41:48.000000000 +0400
@@ -154,7 +154,8 @@
message = ntlmssp_create_challenge(auth->pool, request,
&message_size);
- auth->ntlm2_negotiated = message->flags & NTLMSSP_NEGOTIATE_NTLM2;
+ auth->ntlm2_negotiated =
+ read_le32(&message->flags) & NTLMSSP_NEGOTIATE_NTLM2;
auth->challenge = message->challenge;
mech_init_auth_client_reply(&reply);
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 189 bytes
Desc:...
2004 Nov 10
0
[PATCH] NTLM update and crashfix
...-1.0-test52.vanilla/src/lib-ntlm/ntlm-message.c 2004-10-22 17:32:27.000000000 +0400
+++ dovecot-1.0-test52/src/lib-ntlm/ntlm-message.c 2004-11-10 16:28:33.000000000 +0300
@@ -180,13 +180,19 @@ static int ntlmssp_check_buffer(const st
size_t data_size, const char **error)
{
uint32_t offset = read_le32(&buffer->offset);
+ uint16_t length = read_le16(&buffer->length);
+ uint16_t space = read_le16(&buffer->space);
+
+ /* Empty buffer is ok */
+ if (!length && !space)
+ return 1;
if (offset >= data_size) {
*error = "buffer offset out of bounds";
r...
2004 Oct 29
1
[PATCH] yet another NTLM update
...-1.0-test51.vanilla/src/lib-ntlm/ntlm-message.c 2004-10-08 21:35:31.000000000 +0400
+++ dovecot-1.0-test51/src/lib-ntlm/ntlm-message.c 2004-10-29 15:49:34.000000000 +0400
@@ -164,13 +164,19 @@ static int ntlmssp_check_buffer(const st
size_t data_size, const char **error)
{
uint32_t offset = read_le32(&buffer->offset);
+ uint16_t length = read_le16(&buffer->length);
+ uint16_t space = read_le16(&buffer->space);
+
+ /* Empty buffer is ok */
+ if (!length && !space)
+ return 1;
if (offset >= data_size) {
*error = "buffer offset out of bounds";
r...