forked from osmocom/wireshark
Add NTLMSSP message type to COL_INFO. This looks nice for NTLM over
HTTP, but NTLMSSP_CHALLENGE appears twice in a session setup response SPNEGO negTokenTarg, as the NTLMSSP message appears both in the responseToken and mechListMIC fields. svn path=/trunk/; revision=6328
This commit is contained in:
parent
abf520e1cc
commit
081a11b3d6
|
@ -2,7 +2,7 @@
|
|||
* Routines for NTLM Secure Service Provider
|
||||
* Devin Heitmueller <dheitmueller@netilla.com>
|
||||
*
|
||||
* $Id: packet-ntlmssp.c,v 1.23 2002/09/23 22:55:32 tpot Exp $
|
||||
* $Id: packet-ntlmssp.c,v 1.24 2002/09/24 00:14:46 tpot Exp $
|
||||
*
|
||||
* Ethereal - Network traffic analyzer
|
||||
* By Gerald Combs <gerald@ethereal.com>
|
||||
|
@ -619,6 +619,12 @@ dissect_ntlmssp(tvbuff_t *tvb, packet_info *pinfo _U_, proto_tree *tree)
|
|||
ntlmssp_message_type = tvb_get_letohl (tvb, offset);
|
||||
offset += 4;
|
||||
|
||||
if (check_col(pinfo->cinfo, COL_INFO))
|
||||
col_append_fstr(pinfo->cinfo, COL_INFO, ", %s",
|
||||
val_to_str(ntlmssp_message_type,
|
||||
ntlmssp_message_types,
|
||||
"Unknown message type"));
|
||||
|
||||
/* Call the appropriate dissector based on the Message Type */
|
||||
switch (ntlmssp_message_type) {
|
||||
|
||||
|
|
Loading…
Reference in New Issue