On mån, 2008-05-19 at 18:00 +0200, Falk wrote: > Humm, followup from meself.. > > line 228 in fakeauth_auth.h > /* Sanity checks. XXX values arbitrarialy chosen */ > if (l <= 0 || o <= 0 || l >= 32 || o >= 256) { > fprintf(stderr, "ntlmGetString: insane: l:%d o:%d\n", l, o); > return (NULL); > > Is there some check for buffer overflow there that is set to 32? > When I tried to change SSWAP 64 the fakeauth_auth.c they got authed by > fakeauth.. > > Any ideas why this is 32, or why these clients sets 32 and 34? I think the comment above answers the why part... Regards Henrik
Attachment:
signature.asc
Description: This is a digitally signed message part