}
/*
- * Return 0 on success and then the buffers are filled in fine.
+ * Returns 0 on success and then the buffers are filled in fine.
*
* Non-zero means failure to parse.
*/
* Returns CURLE_OK on success.
*/
static CURLcode sasl_create_external_message(struct SessionHandle *data,
- const char *user, char **outptr,
- size_t *outlen)
+ const char *user, char **outptr,
+ size_t *outlen)
{
/* This is the same formatting as the login message. */
return sasl_create_login_message(data, user, outptr, outlen);
/*
* Curl_sasl_decode_mech()
*
- * Convert an SASL mechanism name to a token.
+ * Convert a SASL mechanism name into a token.
*
* Parameters:
*
* maxlen [in] - Maximum mechanism string length.
* len [out] - If not NULL, effective name length.
*
- * Return the SASL mechanism token or 0 if no match.
+ * Returns the SASL mechanism token or 0 if no match.
*/
unsigned int Curl_sasl_decode_mech(const char *ptr, size_t maxlen, size_t *len)
{
/*
* Curl_sasl_init()
*
- * Initializes an SASL structure.
+ * Initializes the SASL structure.
*/
void Curl_sasl_init(struct SASL *sasl, const struct SASLproto *params)
{
*progress = SASL_IDLE;
/* Calculate the supported authentication mechanism, by decreasing order of
- * security, as well as the initial response where appropriate */
+ security, as well as the initial response where appropriate */
if((enabledmechs & SASL_MECH_EXTERNAL) && !conn->passwd[0]) {
mech = SASL_MECH_STRING_EXTERNAL;
state1 = SASL_EXTERNAL;
/*
* Curl_sasl_continue()
*
- * Continue an SASL authentication.
+ * Continue the authentication.
*/
CURLcode Curl_sasl_continue(struct SASL *sasl, struct connectdata *conn,
int code, saslprogress *progress)