diff options
author | Frank Meier <frank.meier@ergon.ch> | 2014-08-22 14:54:41 +0200 |
---|---|---|
committer | Daniel Stenberg <daniel@haxx.se> | 2014-08-22 16:05:31 +0200 |
commit | 63a0bd4270decef04e64fbe497b42f2c9e26c62b (patch) | |
tree | 34f11e16c3952ab028e389bff296fa9a69f9dd0d /docs/KNOWN_BUGS | |
parent | 98633c2a19a9248dbbbb489d57248e113aebc6fa (diff) |
NTLM: ignore CURLOPT_FORBID_REUSE during NTLM HTTP auth
Problem: if CURLOPT_FORBID_REUSE is set, requests using NTLM failed
since NTLM requires multiple requests that re-use the same connection
for the authentication to work
Solution: Ignore the forbid reuse flag in case the NTLM authentication
handshake is in progress, according to the NTLM state flag.
Fixed known bug #77.
Diffstat (limited to 'docs/KNOWN_BUGS')
-rw-r--r-- | docs/KNOWN_BUGS | 4 |
1 files changed, 0 insertions, 4 deletions
diff --git a/docs/KNOWN_BUGS b/docs/KNOWN_BUGS index 409a17703..a21fb194d 100644 --- a/docs/KNOWN_BUGS +++ b/docs/KNOWN_BUGS @@ -51,10 +51,6 @@ may have been fixed since this was written! any file at all. Like when using FTP. http://curl.haxx.se/bug/view.cgi?id=1063 -77. CURLOPT_FORBID_REUSE on a handle prevents NTLM from working since it - "abuses" the underlying connection re-use system and if connections are - forced to close they break the NTLM support. - 76. The SOCKET type in Win64 is 64 bits large (and thus so is curl_socket_t on that platform), and long is only 32 bits. It makes it impossible for curl_easy_getinfo() to return a socket properly with the CURLINFO_LASTSOCKET |