RFR 8151788: NullPointerException from ntlm.Client.type3
Vyom Tewari
vyom.tewari at oracle.com
Wed Jul 13 06:52:09 UTC 2016
Hi All,
Please find the updated
webrev(http://cr.openjdk.java.net/%7Evtewari/8151788/webrev0.1/index.html).
I addressed the review comments.
Thanks,
Vyom
On Tuesday 12 July 2016 08:25 PM, Weijun Wang wrote:
>
>
> On 7/12/2016 22:34, Pavel Rappo wrote:
>> What's the difference between no security buffer and an empty one
>> (from the
>> com.sun.security.ntlm.Client#type3's perspective)?
>
> I quickly browse through the NTLM protocol and yes they look like the
> same in each case. (Except for one which I am not sure, is there any
> difference between no domain and empty domain?) In all cases where a
> security buffer is optional, there is a flag we can rely on, and no
> need to look at whether the offset of the security buffer is zero.
>
> So it does look safer to return a new byte[0] right inside
> readSecurityBuffer(int offset) when the offset is zero.
>
> Thanks
> Max
>
>>
>>> On 12 Jul 2016, at 15:25, Wang Weijun <weijun.wang at oracle.com> wrote:
>>>
>>> When there is no offset, there is no security buffer at all. When
>>> the length is zero, the security buffer is an empty byte array.
>>
More information about the net-dev
mailing list