]> git.ipfire.org Git - thirdparty/curl.git/commitdiff
ntlm: Fixed return code for bad type-2 Target Info
authorSteve Holme <steve_holme@hotmail.com>
Sun, 14 Dec 2014 12:07:57 +0000 (12:07 +0000)
committerSteve Holme <steve_holme@hotmail.com>
Sun, 14 Dec 2014 12:11:04 +0000 (12:11 +0000)
Use CURLE_BAD_CONTENT_ENCODING for bad type-2 Target Info security
buffers just like we do for bad decodes.

lib/curl_ntlm_msgs.c

index d99a70f49b64d76e8f4e17101436a8e82118a182..ece1d0fa45827813a8575c61473ab2820388353e 100644 (file)
@@ -201,7 +201,7 @@ static CURLcode ntlm_decode_type2_target(struct SessionHandle *data,
          (target_info_offset < 48)) {
         infof(data, "NTLM handshake failure (bad type-2 message). "
                     "Target Info Offset Len is set incorrect by the peer\n");
-        return CURLE_REMOTE_ACCESS_DENIED;
+        return CURLE_BAD_CONTENT_ENCODING;
       }
 
       ntlm->target_info = malloc(target_info_len);