summaryrefslogtreecommitdiff
path: root/lib/vauth
diff options
context:
space:
mode:
authorRuurd Beerstra <ruurd.beerstra@infor.com>2020-06-11 17:14:43 +0200
committerDaniel Stenberg <daniel@haxx.se>2020-06-16 09:06:19 +0200
commitd80d419d3e3bf0e5f0dea160df5609c57cb3c5df (patch)
tree103835ad95ff8c5ef1d4c6d72032fe548dde22c9 /lib/vauth
parente15e51384a423be31318b3c9c7d612a1aae661fd (diff)
downloadcurl-d80d419d3e3bf0e5f0dea160df5609c57cb3c5df.tar.gz
ntlm: enable NTLM support with wolfSSL
When wolfSSL is built with its OpenSSL API layer, it fetures the same DES* functions that OpenSSL has. This change take advantage of that. Co-authored-by: Daniel Stenberg Closes #5556 Fixes #5548
Diffstat (limited to 'lib/vauth')
-rw-r--r--lib/vauth/ntlm.c5
1 files changed, 4 insertions, 1 deletions
diff --git a/lib/vauth/ntlm.c b/lib/vauth/ntlm.c
index 8f9103806..3b46e1a46 100644
--- a/lib/vauth/ntlm.c
+++ b/lib/vauth/ntlm.c
@@ -600,11 +600,14 @@ CURLcode Curl_auth_create_ntlm_type3_message(struct Curl_easy *data,
#endif
#if defined(USE_NTRESPONSES) && defined(USE_NTLM2SESSION)
+
+#define CURL_MD5_DIGEST_LENGTH 16 /* fixed size */
+
/* We don't support NTLM2 if we don't have USE_NTRESPONSES */
if(ntlm->flags & NTLMFLAG_NEGOTIATE_NTLM_KEY) {
unsigned char ntbuffer[0x18];
unsigned char tmp[0x18];
- unsigned char md5sum[MD5_DIGEST_LENGTH];
+ unsigned char md5sum[CURL_MD5_DIGEST_LENGTH];
unsigned char entropy[8];
/* Need to create 8 bytes random data */