diff options
author | Steve Holme <steve_holme@hotmail.com> | 2014-12-14 12:07:57 +0000 |
---|---|---|
committer | Steve Holme <steve_holme@hotmail.com> | 2014-12-14 12:11:04 +0000 |
commit | 52a4d6b8aee78f748924ed9f5217e4287df4593f (patch) | |
tree | 182e1c6332dfe4c817317f422315e387910bd865 | |
parent | 18f58c437f2607feac4e3c107e90f86691ac5d0a (diff) |
ntlm: Fixed return code for bad type-2 Target Info
Use CURLE_BAD_CONTENT_ENCODING for bad type-2 Target Info security
buffers just like we do for bad decodes.
-rw-r--r-- | lib/curl_ntlm_msgs.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/lib/curl_ntlm_msgs.c b/lib/curl_ntlm_msgs.c index d99a70f49..ece1d0fa4 100644 --- a/lib/curl_ntlm_msgs.c +++ b/lib/curl_ntlm_msgs.c @@ -201,7 +201,7 @@ static CURLcode ntlm_decode_type2_target(struct SessionHandle *data, (target_info_offset < 48)) { infof(data, "NTLM handshake failure (bad type-2 message). " "Target Info Offset Len is set incorrect by the peer\n"); - return CURLE_REMOTE_ACCESS_DENIED; + return CURLE_BAD_CONTENT_ENCODING; } ntlm->target_info = malloc(target_info_len); |