diff options
| author | Daniel Stenberg <daniel@haxx.se> | 2001-08-30 22:59:58 +0000 | 
|---|---|---|
| committer | Daniel Stenberg <daniel@haxx.se> | 2001-08-30 22:59:58 +0000 | 
| commit | 47e7a3e678f34fe0af57b3fdde292f9191f16df5 (patch) | |
| tree | 814d996f9b3dd8abcf53ea669450f2c3da7f30dd /lib/security.c | |
| parent | 0ece1b5c34c049a3226f7dd793cf75e470c46e4d (diff) | |
a few more struct fixes
Diffstat (limited to 'lib/security.c')
| -rw-r--r-- | lib/security.c | 20 | 
1 files changed, 10 insertions, 10 deletions
diff --git a/lib/security.c b/lib/security.c index 88b89b0fa..616f9e04a 100644 --- a/lib/security.c +++ b/lib/security.c @@ -417,15 +417,15 @@ sec_prot_internal(struct connectdata *conn, int level)                    "PBSZ %u", s);      /* wait for feedback */      nread = Curl_GetFTPResponse(conn->firstsocket, -                                conn->data.set->buffer, conn, NULL); +                                conn->data->state.buffer, conn, NULL);      if(nread < 0)        return /*CURLE_OPERATION_TIMEOUTED*/-1; -    if(/*ret != COMPLETE*/conn->data.set->buffer[0] != '2'){ +    if(/*ret != COMPLETE*/conn->data->state.buffer[0] != '2'){        failf(conn->data, "Failed to set protection buffer size.\n");        return -1;      }      conn->buffer_size = s; -    p = strstr(/*reply_string*/conn->data.set->buffer, "PBSZ="); +    p = strstr(/*reply_string*/conn->data->state.buffer, "PBSZ=");      if(p)        sscanf(p, "PBSZ=%u", &s);      if(s < conn->buffer_size) @@ -436,10 +436,10 @@ sec_prot_internal(struct connectdata *conn, int level)                  "PROT %c", level["CSEP"]);    /* wait for feedback */    nread = Curl_GetFTPResponse(conn->firstsocket, -                              conn->data.set->buffer, conn, NULL); +                              conn->data->state.buffer, conn, NULL);    if(nread < 0)      return /*CURLE_OPERATION_TIMEOUTED*/-1; -  if(/*ret != COMPLETE*/conn->data.set->buffer[0] != '2'){ +  if(/*ret != COMPLETE*/conn->data->state.buffer[0] != '2'){      failf(conn->data, "Failed to set protection level.\n");      return -1;    } @@ -494,18 +494,18 @@ Curl_sec_login(struct connectdata *conn)                    "AUTH %s", (*m)->name);      /* wait for feedback */      nread = Curl_GetFTPResponse(conn->firstsocket, -                                conn->data.set->buffer, conn, NULL); +                                conn->data->state.buffer, conn, NULL);      if(nread < 0)        return /*CURLE_OPERATION_TIMEOUTED*/-1; -    if(/*ret != CONTINUE*/conn->data.set->buffer[0] != '3'){ -      if(/*code == 504*/strncmp(conn->data.set->buffer,"504",3) == 0) { +    if(/*ret != CONTINUE*/conn->data->state.buffer[0] != '3'){ +      if(/*code == 504*/strncmp(conn->data->state.buffer,"504",3) == 0) {          infof(data,                "%s is not supported by the server.\n", (*m)->name);        } -      else if(/*code == 534*/strncmp(conn->data.set->buffer,"534",3) == 0) { +      else if(/*code == 534*/strncmp(conn->data->state.buffer,"534",3) == 0) {          infof(data, "%s rejected as security mechanism.\n", (*m)->name);        } -      else if(/*ret == ERROR*/conn->data.set->buffer[0] == '5') { +      else if(/*ret == ERROR*/conn->data->state.buffer[0] == '5') {          infof(data, "The server doesn't support the FTP "                "security extensions.\n");          return -1;  | 
