diff options
author | james <james@e7ae566f-a301-0410-adde-c780ea21d3b5> | 2008-08-11 13:12:34 +0000 |
---|---|---|
committer | james <james@e7ae566f-a301-0410-adde-c780ea21d3b5> | 2008-08-11 13:12:34 +0000 |
commit | 4f23b71018c07ced4624481a652a53aa3bfb3f7a (patch) | |
tree | 53b9f1a84fc8638105c0bc2a8f064755244c561a | |
parent | LZO compression buffer overflow errors will now invalidate (diff) | |
download | openvpn-4f23b71018c07ced4624481a652a53aa3bfb3f7a.tar.xz |
Fixed minor compile issue in ntlm.c (mid-block declaration).
git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@3222 e7ae566f-a301-0410-adde-c780ea21d3b5
-rw-r--r-- | ntlm.c | 6 |
1 files changed, 4 insertions, 2 deletions
@@ -280,8 +280,10 @@ ntlm_phase_3 (const struct http_proxy_info *p, const char *phase_2, struct gc_ar if (( *((long *)&buf2[0x14]) & 0x00800000) == 0x00800000){ /* Check for Target Information block */ tib_len = buf2[0x28];/* Get Target Information block size */ if (tib_len > 96) tib_len = 96; - char *tib_ptr = buf2 + buf2[0x2c]; /* Get Target Information block pointer */ - memcpy(&ntlmv2_blob[0x1c], tib_ptr, tib_len); /* Copy Target Information block into the blob */ + { + char *tib_ptr = buf2 + buf2[0x2c]; /* Get Target Information block pointer */ + memcpy(&ntlmv2_blob[0x1c], tib_ptr, tib_len); /* Copy Target Information block into the blob */ + } } else { tib_len = 0; } |