]> granicus.if.org Git - curl/commitdiff
ntlm: Fixed static'ness of local decode function
authorSteve Holme <steve_holme@hotmail.com>
Sun, 23 Nov 2014 10:32:49 +0000 (10:32 +0000)
committerSteve Holme <steve_holme@hotmail.com>
Sun, 23 Nov 2014 10:38:54 +0000 (10:38 +0000)
lib/curl_ntlm_msgs.c
lib/curl_ntlm_msgs.h

index 6bef728563c62f8c83def59b13420b538bfb0c3e..d0672af360a7e9c7db3ddbc10bcf66d17aa28035 100644 (file)
@@ -166,7 +166,7 @@ static unsigned int readshort_le(unsigned char *buf)
 }
 
 /*
- * Curl_ntlm_decode_type2_target()
+ * ntlm_decode_type2_target()
  *
  * This is used to decode the "target info" in the ntlm type-2 message
  * received.
@@ -180,10 +180,10 @@ static unsigned int readshort_le(unsigned char *buf)
  *
  * Returns CURLE_OK on success.
  */
-CURLcode Curl_ntlm_decode_type2_target(struct SessionHandle *data,
-                                       unsigned char *buffer,
-                                       size_t size,
-                                       struct ntlmdata *ntlm)
+static CURLcode ntlm_decode_type2_target(struct SessionHandle *data,
+                                         unsigned char *buffer,
+                                         size_t size,
+                                         struct ntlmdata *ntlm)
 {
   unsigned int target_info_len = 0;
   unsigned int target_info_offset = 0;
@@ -303,7 +303,7 @@ CURLcode Curl_ntlm_decode_type2_message(struct SessionHandle *data,
   memcpy(ntlm->nonce, &type2[24], 8);
 
   if(ntlm->flags & NTLMFLAG_NEGOTIATE_TARGET_INFO) {
-    result = Curl_ntlm_decode_type2_target(data, type2, type2_len, ntlm);
+    result = ntlm_decode_type2_target(data, type2, type2_len, ntlm);
     if(result) {
       free(type2);
       infof(data, "NTLM handshake failure (bad type-2 message)\n");
index 2c97331b0524191038d5d45e89b4f00948551160..c28a3698eb41fb6660cb17eb2e10a0f17fb58345 100644 (file)
@@ -46,12 +46,6 @@ CURLcode Curl_ntlm_decode_type2_message(struct SessionHandle *data,
                                         const char* header,
                                         struct ntlmdata* ntlm);
 
-/* This is to decode target info received in NTLM type-2 message */
-CURLcode Curl_ntlm_decode_type2_target(struct SessionHandle *data,
-                                       unsigned char* buffer,
-                                       size_t size,
-                                       struct ntlmdata* ntlm);
-
 /* NTLM buffer fixed size, large enough for long user + host + domain */
 #define NTLM_BUFSIZE 1024