aboutsummaryrefslogtreecommitdiff
path: root/lib/telnet.c
diff options
context:
space:
mode:
authorDaniel Stenberg <daniel@haxx.se>2005-02-16 14:31:23 +0000
committerDaniel Stenberg <daniel@haxx.se>2005-02-16 14:31:23 +0000
commitac022b2e30f42f860f365348ee569f87d0fbe1cf (patch)
treeb7f616cd8189ef4af0d9abff8812efe0595baeb8 /lib/telnet.c
parentf169b750b8bf231df6df776343acbd3e3979ada5 (diff)
Christopher R. Palmer reported a problem with HTTP-POSTing using "anyauth"
that picks NTLM. Thanks to David Byron letting me test NTLM against his servers, I could quickly repeat and fix the problem. It turned out to be: When libcurl POSTs without knowing/using an authentication and it gets back a list of types from which it picks NTLM, it needs to either continue sending its data if it keeps the connection alive, or not send the data but close the connection. Then do the first step in the NTLM auth. libcurl didn't send the data nor close the connection but simply read the response-body and then sent the first negotiation step. Which then failed miserably of course. The fixed version forces a connection if there is more than 2000 bytes left to send.
Diffstat (limited to 'lib/telnet.c')
0 files changed, 0 insertions, 0 deletions