diff options
author | Steve Holme <steve_holme@hotmail.com> | 2014-12-05 00:24:11 +0000 |
---|---|---|
committer | Steve Holme <steve_holme@hotmail.com> | 2014-12-05 00:23:47 +0000 |
commit | 45229fae8ec6ad4eb00726c0c9e9f639124fd06e (patch) | |
tree | 3f46a0b5b27e8ac33426bd5f52c3f80004c94ee0 /lib | |
parent | ef5b98742fb7540b14d66ab63558d47d810f5353 (diff) |
sasl_sspi: Corrected some typos
Diffstat (limited to 'lib')
-rw-r--r-- | lib/curl_sasl_sspi.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/lib/curl_sasl_sspi.c b/lib/curl_sasl_sspi.c index c63b85dd7..30d019b59 100644 --- a/lib/curl_sasl_sspi.c +++ b/lib/curl_sasl_sspi.c @@ -1027,7 +1027,7 @@ CURLcode Curl_sasl_create_gssapi_security_message(struct SessionHandle *data, input_buf[1].pvBuffer = NULL; input_buf[1].cbBuffer = 0; - /* Decrypt in the inbound challenge obtaining the qop */ + /* Decrypt the inbound challenge and obtain the qop */ status = s_pSecFn->DecryptMessage(krb5->context, &input_desc, 0, &qop); if(status != SEC_E_OK) { infof(data, "GSSAPI handshake failure (empty security message)\n"); @@ -1063,7 +1063,7 @@ CURLcode Curl_sasl_create_gssapi_security_message(struct SessionHandle *data, max_size = ntohl(indata & 0xFFFFFF00); if(max_size > 0) { /* The server has told us it supports a maximum receive buffer, however, as - we don't require one unless we are encrypting data we, tell the server + we don't require one unless we are encrypting data, we tell the server our receive buffer is zero. */ max_size = 0; } |