aboutsummaryrefslogtreecommitdiff
path: root/lib/vauth/ntlm.c
diff options
context:
space:
mode:
authorSteve Holme <steve_holme@hotmail.com>2016-03-13 11:28:42 +0000
committerSteve Holme <steve_holme@hotmail.com>2016-03-25 17:40:12 +0000
commit58a7bc96eca33c4b6483ed25d0b1547ce8ec0d89 (patch)
tree838bce407fb6d98d8af66448f86b04c414eeb81b /lib/vauth/ntlm.c
parent7d2a5a05f64c51107b962ff19f85052ab251323a (diff)
downloadgnurl-58a7bc96eca33c4b6483ed25d0b1547ce8ec0d89.tar.gz
gnurl-58a7bc96eca33c4b6483ed25d0b1547ce8ec0d89.tar.bz2
gnurl-58a7bc96eca33c4b6483ed25d0b1547ce8ec0d89.zip
vauth: Refactored function names after move to new vauth directory
Renamed all the SASL functions that moved to the new vauth directory to include the correct module name.
Diffstat (limited to 'lib/vauth/ntlm.c')
-rw-r--r--lib/vauth/ntlm.c20
1 files changed, 10 insertions, 10 deletions
diff --git a/lib/vauth/ntlm.c b/lib/vauth/ntlm.c
index aef29bdfb..e27ce59be 100644
--- a/lib/vauth/ntlm.c
+++ b/lib/vauth/ntlm.c
@@ -217,7 +217,7 @@ static CURLcode ntlm_decode_type2_target(struct SessionHandle *data,
*/
/*
- * Curl_sasl_decode_ntlm_type2_message()
+ * Curl_auth_decode_ntlm_type2_message()
*
* This is used to decode an already encoded NTLM type-2 message. The message
* is first decoded from a base64 string into a raw NTLM message and checked
@@ -232,7 +232,7 @@ static CURLcode ntlm_decode_type2_target(struct SessionHandle *data,
*
* Returns CURLE_OK on success.
*/
-CURLcode Curl_sasl_decode_ntlm_type2_message(struct SessionHandle *data,
+CURLcode Curl_auth_decode_ntlm_type2_message(struct SessionHandle *data,
const char *type2msg,
struct ntlmdata *ntlm)
{
@@ -329,7 +329,7 @@ static void unicodecpy(unsigned char *dest, const char *src, size_t length)
}
/*
- * Curl_sasl_create_ntlm_type1_message()
+ * Curl_auth_create_ntlm_type1_message()
*
* This is used to generate an already encoded NTLM type-1 message ready for
* sending to the recipient using the appropriate compile time crypto API.
@@ -345,7 +345,7 @@ static void unicodecpy(unsigned char *dest, const char *src, size_t length)
*
* Returns CURLE_OK on success.
*/
-CURLcode Curl_sasl_create_ntlm_type1_message(const char *userp,
+CURLcode Curl_auth_create_ntlm_type1_message(const char *userp,
const char *passwdp,
struct ntlmdata *ntlm,
char **outptr, size_t *outlen)
@@ -378,7 +378,7 @@ CURLcode Curl_sasl_create_ntlm_type1_message(const char *userp,
(void)passwdp;
/* Clean up any former leftovers and initialise to defaults */
- Curl_sasl_ntlm_cleanup(ntlm);
+ Curl_auth_ntlm_cleanup(ntlm);
#if USE_NTRESPONSES && USE_NTLM2SESSION
#define NTLM2FLAG NTLMFLAG_NEGOTIATE_NTLM2_KEY
@@ -448,7 +448,7 @@ CURLcode Curl_sasl_create_ntlm_type1_message(const char *userp,
}
/*
- * Curl_sasl_create_ntlm_type3_message()
+ * Curl_auth_create_ntlm_type3_message()
*
* This is used to generate an already encoded NTLM type-3 message ready for
* sending to the recipient using the appropriate compile time crypto API.
@@ -465,7 +465,7 @@ CURLcode Curl_sasl_create_ntlm_type1_message(const char *userp,
*
* Returns CURLE_OK on success.
*/
-CURLcode Curl_sasl_create_ntlm_type3_message(struct SessionHandle *data,
+CURLcode Curl_auth_create_ntlm_type3_message(struct SessionHandle *data,
const char *userp,
const char *passwdp,
struct ntlmdata *ntlm,
@@ -815,13 +815,13 @@ CURLcode Curl_sasl_create_ntlm_type3_message(struct SessionHandle *data,
/* Return with binary blob encoded into base64 */
result = Curl_base64_encode(NULL, (char *)ntlmbuf, size, outptr, outlen);
- Curl_sasl_ntlm_cleanup(ntlm);
+ Curl_auth_ntlm_cleanup(ntlm);
return result;
}
/*
-* Curl_sasl_ntlm_cleanup()
+* Curl_auth_ntlm_cleanup()
*
* This is used to clean up the NTLM specific data.
*
@@ -830,7 +830,7 @@ CURLcode Curl_sasl_create_ntlm_type3_message(struct SessionHandle *data,
* ntlm [in/out] - The NTLM data struct being cleaned up.
*
*/
-void Curl_sasl_ntlm_cleanup(struct ntlmdata *ntlm)
+void Curl_auth_ntlm_cleanup(struct ntlmdata *ntlm)
{
/* Free the target info */
Curl_safefree(ntlm->target_info);