CURLcode result = CURLE_OK;
TCHAR *spn = NULL;
size_t chlglen = 0;
+ size_t resp_max = 0;
unsigned char *chlg = NULL;
- unsigned char resp[1024];
+ unsigned char *resp = NULL;
CredHandle handle;
CtxtHandle ctx;
PSecPkgInfo SecurityPackage;
&SecurityPackage);
if(status != SEC_E_OK) {
Curl_safefree(chlg);
+
return CURLE_NOT_BUILT_IN;
}
+ resp_max = SecurityPackage->cbMaxToken;
+
/* Release the package buffer as it is not required anymore */
s_pSecFn->FreeContextBuffer(SecurityPackage);
+ /* Allocate our response buffer */
+ resp = malloc(resp_max);
+ if(!resp) {
+ Curl_safefree(chlg);
+
+ return CURLE_OUT_OF_MEMORY;
+ }
+
/* Generate our SPN */
spn = Curl_sasl_build_spn(service, data->easy_conn->host.name);
if(!spn) {
+ Curl_safefree(resp);
Curl_safefree(chlg);
return CURLE_OUT_OF_MEMORY;
result = Curl_create_sspi_identity(userp, passwdp, &identity);
if(result) {
Curl_safefree(spn);
+ Curl_safefree(resp);
Curl_safefree(chlg);
return result;
if(status != SEC_E_OK) {
Curl_sspi_free_identity(&identity);
Curl_safefree(spn);
+ Curl_safefree(resp);
Curl_safefree(chlg);
return CURLE_OUT_OF_MEMORY;
resp_desc.pBuffers = &resp_buf;
resp_buf.BufferType = SECBUFFER_TOKEN;
resp_buf.pvBuffer = resp;
- resp_buf.cbBuffer = sizeof(resp);
+ resp_buf.cbBuffer = curlx_uztoul(resp_max);
/* Generate our challenge-response message */
status = s_pSecFn->InitializeSecurityContext(&handle, NULL, spn, 0, 0, 0,
s_pSecFn->FreeCredentialsHandle(&handle);
Curl_sspi_free_identity(&identity);
Curl_safefree(spn);
+ Curl_safefree(resp);
Curl_safefree(chlg);
return CURLE_RECV_ERROR;
/* Free the SPN */
Curl_safefree(spn);
+ /* Free the response buffer */
+ Curl_safefree(resp);
+
/* Free the decoeded challenge message */
Curl_safefree(chlg);