Integrated: 8270290: NTLM authentication fails if HEAD request is used

2021-09-30 Thread Alex Kasko
On Mon, 12 Jul 2021 10:34:54 GMT, Alex Kasko wrote: > When HEAD request is used with a proxy (or a server) that requires NTLM, > authentication fails when server returns large (8kb+) body along with > NTLMSSP_CHALLENGE response. > > Proposed fix is to check for ongoing NTLM

Re: RFR: 8270290: NTLM authentication fails if HEAD request is used [v2]

2021-09-30 Thread Alex Kasko
On Wed, 25 Aug 2021 14:21:59 GMT, Alex Kasko wrote: >> When HEAD request is used with a proxy (or a server) that requires NTLM, >> authentication fails when server returns large (8kb+) body along with >> NTLMSSP_CHALLENGE response. >> >> Proposed fix is to

Re: RFR: 8270290: NTLM authentication fails if HEAD request is used [v2]

2021-09-30 Thread Alex Kasko
On Wed, 25 Aug 2021 14:21:59 GMT, Alex Kasko wrote: >> When HEAD request is used with a proxy (or a server) that requires NTLM, >> authentication fails when server returns large (8kb+) body along with >> NTLMSSP_CHALLENGE response. >> >> Proposed fix is to

Re: RFR: 8270290: NTLM authentication fails if HEAD request is used [v2]

2021-08-25 Thread Alex Kasko
body in this case. > > Alternatively the whole check for `HEAD` method in `reset()` can be dropped. Alex Kasko has updated the pull request incrementally with one additional commit since the last revision: fix direct server and plain http proxy auth that became inadvertently broken ---

Re: RFR: 8270290: NTLM authentication fails if HEAD request is used

2021-07-12 Thread Alex Kasko
On Mon, 12 Jul 2021 10:34:54 GMT, Alex Kasko wrote: > When HEAD request is used with a proxy (or a server) that requires NTLM, > authentication fails when server returns large (8kb+) body along with > NTLMSSP_CHALLENGE response. > > Proposed fix is to check for ongoing NTLM

RFR: 8270290: NTLM authentication fails if HEAD request is used

2021-07-12 Thread Alex Kasko
When HEAD request is used with a proxy (or a server) that requires NTLM, authentication fails when server returns large (8kb+) body along with NTLMSSP_CHALLENGE response. Proposed fix is to check for ongoing NTLM auth in `reset()` and consume the response body in this case. Alternatively the w