diff options
author | Daniel Stenberg <daniel@haxx.se> | 2005-02-16 14:31:23 +0000 |
---|---|---|
committer | Daniel Stenberg <daniel@haxx.se> | 2005-02-16 14:31:23 +0000 |
commit | ac022b2e30f42f860f365348ee569f87d0fbe1cf (patch) | |
tree | b7f616cd8189ef4af0d9abff8812efe0595baeb8 /lib/config-riscos.h | |
parent | f169b750b8bf231df6df776343acbd3e3979ada5 (diff) |
Christopher R. Palmer reported a problem with HTTP-POSTing using "anyauth"
that picks NTLM. Thanks to David Byron letting me test NTLM against his
servers, I could quickly repeat and fix the problem. It turned out to be:
When libcurl POSTs without knowing/using an authentication and it gets back a
list of types from which it picks NTLM, it needs to either continue sending
its data if it keeps the connection alive, or not send the data but close the
connection. Then do the first step in the NTLM auth. libcurl didn't send the
data nor close the connection but simply read the response-body and then sent
the first negotiation step. Which then failed miserably of course. The fixed
version forces a connection if there is more than 2000 bytes left to send.
Diffstat (limited to 'lib/config-riscos.h')
0 files changed, 0 insertions, 0 deletions