Removed an extraneous \n that violated the SSO daemon protocol
authorDan Fandrich <dan@coneharvesters.com>
Thu, 28 Jul 2011 19:41:44 +0000 (12:41 -0700)
committerDan Fandrich <dan@coneharvesters.com>
Thu, 28 Jul 2011 19:41:44 +0000 (12:41 -0700)
This caused fake_ntlm to abort due to an invalid command
causing sporadic test 2005 failures.

lib/http_ntlm.c
tests/server/fake_ntlm.c

index efc38c7..79481a4 100644 (file)
@@ -962,7 +962,7 @@ CURLcode Curl_output_ntlm_sso(struct connectdata *conn,
     conn->response_header = NULL;
     break;
   case NTLMSTATE_TYPE2:
-    input = aprintf("TT %s\n", conn->challenge_header);
+    input = aprintf("TT %s", conn->challenge_header);
     if(!input)
       return CURLE_OUT_OF_MEMORY;
     res = sso_ntlm_response(conn,
index 2fff0b3..53f79c0 100644 (file)
@@ -220,7 +220,7 @@ int main(int argc, char *argv[])
     }
   }
 
-  while(fgets(buf, 1024, stdin)) {
+  while(fgets(buf, sizeof(buf), stdin)) {
     if(strcmp(buf, type1_input) == 0) {
       stream=fopen(filename, "rb");
       if(!stream) {