#endif /* USE_NTLM && !USE_WINDOWS_SSPI*/
/*
- * sasl_create_xoauth2_message()
+ * sasl_create_oauth_bearer_message()
*
* This is used to generate an already encoded OAuth 2.0 message ready for
* sending to the recipient.
*
* Returns CURLE_OK on success.
*/
-static CURLcode sasl_create_xoauth2_message(struct SessionHandle *data,
- const char *user,
- const char *bearer,
- char **outptr, size_t *outlen)
+static CURLcode sasl_create_oauth_bearer_message(struct SessionHandle *data,
+ const char *user,
+ const char *bearer,
+ char **outptr, size_t *outlen)
{
CURLcode result = CURLE_OK;
char *xoauth = NULL;
sasl->authused = SASL_MECH_XOAUTH2;
if(force_ir || data->set.sasl_ir)
- result = sasl_create_xoauth2_message(data, conn->user,
- conn->oauth_bearer,
- &resp, &len);
+ result = sasl_create_oauth_bearer_message(data, conn->user,
+ conn->oauth_bearer,
+ &resp, &len);
}
else if(enabledmechs & SASL_MECH_LOGIN) {
mech = SASL_MECH_STRING_LOGIN;
case SASL_XOAUTH2:
/* Create the authorisation message */
- result = sasl_create_xoauth2_message(data, conn->user,
- conn->oauth_bearer, &resp, &len);
+ result = sasl_create_oauth_bearer_message(data, conn->user,
+ conn->oauth_bearer, &resp, &len);
break;
case SASL_CANCEL:
/* Remove the offending mechanism from the supported list */