aboutsummaryrefslogtreecommitdiffstats
path: root/epan/dissectors
diff options
context:
space:
mode:
authorRonnie Sahlberg <ronnie_sahlberg@ozemail.com.au>2005-08-19 09:47:11 +0000
committerRonnie Sahlberg <ronnie_sahlberg@ozemail.com.au>2005-08-19 09:47:11 +0000
commit0a1de06a249a376ecad78bb54bf200554ec427b0 (patch)
tree894d987135aede7ac7b20074e7a82dfde971d677 /epan/dissectors
parentb2807e2ab65c7c96b38c4b08b4b491986719378a (diff)
From Matthias Drochner:
I'll attach a patch which fixes the decoding of authenticated LDAP bind replies. The SASL credentials are always "context specific" in terms of ASN.1. I've tested the fix with DIGEST-MD5 authentication. (Without the patch, ethereal complains about a wrong type because it expects an ASN.a octet string.) (You might also consider a stricter check of the ASN.1 header type for the GSSAPI and GSS-SPNEGO cases, but I can't test this.) svn path=/trunk/; revision=15428
Diffstat (limited to 'epan/dissectors')
-rw-r--r--epan/dissectors/packet-ldap.c8
1 files changed, 1 insertions, 7 deletions
diff --git a/epan/dissectors/packet-ldap.c b/epan/dissectors/packet-ldap.c
index af306924cd..9e4c6f37af 100644
--- a/epan/dissectors/packet-ldap.c
+++ b/epan/dissectors/packet-ldap.c
@@ -1276,16 +1276,10 @@ static void dissect_ldap_response_bind(ASN1_SCK *a, proto_tree *tree,
a->offset += cred_length;
} else {
if (read_bytestring(a, tree, hf_ldap_message_bind_server_credentials,
- NULL, NULL, ASN1_UNI, ASN1_OTS) != ASN1_ERR_NOERROR)
+ NULL, NULL, ASN1_CTX, 7) != ASN1_ERR_NOERROR)
return;
}
break;
-
- default:
- if (read_bytestring(a, tree, hf_ldap_message_bind_server_credentials,
- NULL, NULL, ASN1_CTX, 7) != ASN1_ERR_NOERROR)
- return;
- break;
}
}
}