Humm, followup from meself..
line 228 in fakeauth_auth.h
/* Sanity checks. XXX values arbitrarialy chosen */
if (l <= 0 || o <= 0 || l >= 32 || o >= 256) {
fprintf(stderr, "ntlmGetString: insane: l:%d o:%d\n", l, o);
return (NULL); Is there some check for buffer overflow there that is set to 32? When I tried to change SSWAP 64 the fakeauth_auth.c they got authed by fakeauth.. Any ideas why this is 32, or why these clients sets 32 and 34? -- Regards Falk
