ntlm: Fixed return code for bad type-2 Target Info

Use CURLE_BAD_CONTENT_ENCODING for bad type-2 Target Info security
buffers just like we do for bad decodes.
This commit is contained in:
Steve Holme 2014-12-14 12:07:57 +00:00
parent 18f58c437f
commit 52a4d6b8ae

View File

@ -201,7 +201,7 @@ static CURLcode ntlm_decode_type2_target(struct SessionHandle *data,
(target_info_offset < 48)) {
infof(data, "NTLM handshake failure (bad type-2 message). "
"Target Info Offset Len is set incorrect by the peer\n");
return CURLE_REMOTE_ACCESS_DENIED;
return CURLE_BAD_CONTENT_ENCODING;
}
ntlm->target_info = malloc(target_info_len);