int save;
- save = set_command_prot(conn, prot_private);
+ save = Curl_set_command_prot(conn, prot_private);
Curl_ftpsendf(conn->firstsocket, conn,
"SITE KAUTH %s", conn->data->user);
return /*CURLE_OPERATION_TIMEOUTED*/;
if(/*ret != CONTINUE*/conn->data->buffer[0] != '3'){
- set_command_prot(conn, save);
+ Curl_set_command_prot(conn, save);
/*code = -1;***/
return;
}
p = strstr(conn->data->buffer, "T=");
if(!p) {
printf("Bad reply from server.\n");
- set_command_prot(conn, save);
+ Curl_set_command_prot(conn, save);
return;
}
tmp = Curl_base64_decode(p, &tkt.dat);
if(tmp < 0) {
printf("Failed to decode base64 in reply.\n");
- set_command_prot(conn, save);
+ Curl_set_command_prot(conn, save);
return;
}
tkt.length = tmp;
p = strstr(conn->data->buffer, "P=");
if(!p) {
printf("Bad reply from server.\n");
- set_command_prot(conn, save);
+ Curl_set_command_prot(conn, save);
return;
}
name = p + 2;
memset(passwd, 0, sizeof(passwd));
if(Curl_base64_encode(tktcopy.dat, tktcopy.length, &p) < 0) {
failf(conn->data, "Out of memory base64-encoding.\n");
- set_command_prot(conn, save);
+ Curl_set_command_prot(conn, save);
return;
}
memset (tktcopy.dat, 0, tktcopy.length);
if(nread < 0)
return /*CURLE_OPERATION_TIMEOUTED*/;
free(p);
- set_command_prot(conn, save);
+ Curl_set_command_prot(conn, save);
}
#endif /* KRB4 */