Add NTLMSSP message type to COL_INFO. This looks nice for NTLM over

HTTP, but NTLMSSP_CHALLENGE appears twice in a session setup response
SPNEGO negTokenTarg, as the NTLMSSP message appears both in the
responseToken and mechListMIC fields.

svn path=/trunk/; revision=6328
This commit is contained in:
Tim Potter 2002-09-24 00:14:46 +00:00
parent abf520e1cc
commit 081a11b3d6
1 changed files with 7 additions and 1 deletions

View File

@ -2,7 +2,7 @@
* Routines for NTLM Secure Service Provider
* Devin Heitmueller <dheitmueller@netilla.com>
*
* $Id: packet-ntlmssp.c,v 1.23 2002/09/23 22:55:32 tpot Exp $
* $Id: packet-ntlmssp.c,v 1.24 2002/09/24 00:14:46 tpot Exp $
*
* Ethereal - Network traffic analyzer
* By Gerald Combs <gerald@ethereal.com>
@ -619,6 +619,12 @@ dissect_ntlmssp(tvbuff_t *tvb, packet_info *pinfo _U_, proto_tree *tree)
ntlmssp_message_type = tvb_get_letohl (tvb, offset);
offset += 4;
if (check_col(pinfo->cinfo, COL_INFO))
col_append_fstr(pinfo->cinfo, COL_INFO, ", %s",
val_to_str(ntlmssp_message_type,
ntlmssp_message_types,
"Unknown message type"));
/* Call the appropriate dissector based on the Message Type */
switch (ntlmssp_message_type) {