projects
/
apps
/
madmutt.git
/ blobdiff
commit
grep
author
committer
pickaxe
?
search:
re
summary
|
shortlog
|
log
|
commit
|
commitdiff
|
tree
raw
|
inline
| side by side
Move many things to the crypt module \o/
[apps/madmutt.git]
/
pop
/
pop_auth.c
diff --git
a/pop/pop_auth.c
b/pop/pop_auth.c
index
adb47d7
..
98dc1cc
100644
(file)
--- a/
pop/pop_auth.c
+++ b/
pop/pop_auth.c
@@
-7,31
+7,18
@@
* please see the file GPL in the top level source directory.
*/
* please see the file GPL in the top level source directory.
*/
-#if HAVE_CONFIG_H
-# include "config.h"
-#endif
+#include <lib-lib/lib-lib.h>
-#include <lib-lib/mem.h>
-#include <lib-lib/ascii.h>
-#include <lib-lib/macros.h>
-#include <lib-hash/hash.h>
-#include <lib-lib/debug.h>
+#include <sasl/sasl.h>
+#include <sasl/saslutil.h>
+
+#include <lib-mx/mx.h>
+#include "md5.h"
#include "mutt.h"
#include "mutt.h"
-#include "mx.h"
#include "pop.h"
#include "pop.h"
-
-
-#include <string.h>
-#include <unistd.h>
-
-#ifdef USE_SASL
-#include <sasl/sasl.h>
-#include <sasl/saslutil.h>
#include "mutt_sasl.h"
#include "mutt_sasl.h"
-#endif
-#ifdef USE_SASL
/* SASL authenticator */
static pop_auth_res_t pop_auth_sasl (POP_DATA * pop_data, const char *method)
{
/* SASL authenticator */
static pop_auth_res_t pop_auth_sasl (POP_DATA * pop_data, const char *method)
{
@@
-42,14
+29,11
@@
static pop_auth_res_t pop_auth_sasl (POP_DATA * pop_data, const char *method)
char inbuf[LONG_STRING];
const char *mech;
char inbuf[LONG_STRING];
const char *mech;
-#ifdef USE_SASL
const char *pc = NULL;
const char *pc = NULL;
-#endif
unsigned int len, olen;
unsigned char client_start;
if (mutt_sasl_client_new (pop_data->conn, &saslconn) < 0) {
unsigned int len, olen;
unsigned char client_start;
if (mutt_sasl_client_new (pop_data->conn, &saslconn) < 0) {
- debug_print (1, ("Error allocating SASL connection.\n"));
return POP_A_FAILURE;
}
return POP_A_FAILURE;
}
@@
-57,18
+41,14
@@
static pop_auth_res_t pop_auth_sasl (POP_DATA * pop_data, const char *method)
method = pop_data->auth_list;
for (;;) {
method = pop_data->auth_list;
for (;;) {
-#ifdef USE_SASL
- rc =
- sasl_client_start (saslconn, method, &interaction, &pc, &olen, &mech);
-#endif
+ rc = sasl_client_start (saslconn, method, &interaction, &pc, &olen,
+ &mech);
if (rc != SASL_INTERACT)
break;
mutt_sasl_interact (interaction);
}
if (rc != SASL_OK && rc != SASL_CONTINUE) {
if (rc != SASL_INTERACT)
break;
mutt_sasl_interact (interaction);
}
if (rc != SASL_OK && rc != SASL_CONTINUE) {
- debug_print (1, ("Failure starting authentication exchange. No shared mechanisms?\n"));
-
/* SASL doesn't support suggested mechanisms, so fall back */
return POP_A_UNAVAIL;
}
/* SASL doesn't support suggested mechanisms, so fall back */
return POP_A_UNAVAIL;
}
@@
-93,13
+73,10
@@
static pop_auth_res_t pop_auth_sasl (POP_DATA * pop_data, const char *method)
if (rc != SASL_CONTINUE)
break;
if (rc != SASL_CONTINUE)
break;
-#ifdef USE_SASL
if (!m_strncmp(inbuf, "+ ", 2)
&& sasl_decode64 (inbuf, strlen (inbuf), buf, LONG_STRING - 1,
&len) != SASL_OK)
if (!m_strncmp(inbuf, "+ ", 2)
&& sasl_decode64 (inbuf, strlen (inbuf), buf, LONG_STRING - 1,
&len) != SASL_OK)
-#endif
{
{
- debug_print (1, ("error base64-decoding server response.\n"));
goto bail;
}
goto bail;
}
@@
-119,15
+96,12
@@
static pop_auth_res_t pop_auth_sasl (POP_DATA * pop_data, const char *method)
/* send out response, or line break if none needed */
if (pc) {
if (sasl_encode64 (pc, olen, buf, sizeof (buf), &olen) != SASL_OK) {
/* send out response, or line break if none needed */
if (pc) {
if (sasl_encode64 (pc, olen, buf, sizeof (buf), &olen) != SASL_OK) {
- debug_print (1, ("error base64-encoding client response.\n"));
goto bail;
}
/* sasl_client_st(art|ep) allocate pc with malloc, expect me to
* free it */
goto bail;
}
/* sasl_client_st(art|ep) allocate pc with malloc, expect me to
* free it */
-#ifndef USE_SASL
- p_delete(&pc);
-#endif
+ p_delete((char **)&pc);
}
}
}
}
@@
-155,7
+129,6
@@
bail:
return POP_A_FAILURE;
}
return POP_A_FAILURE;
}
-#endif
/* Get the server timestamp for APOP authentication */
void pop_apop_timestamp (POP_DATA * pop_data, char *buf)
/* Get the server timestamp for APOP authentication */
void pop_apop_timestamp (POP_DATA * pop_data, char *buf)
@@
-171,7
+144,8
@@
void pop_apop_timestamp (POP_DATA * pop_data, char *buf)
}
/* APOP authenticator */
}
/* APOP authenticator */
-static pop_auth_res_t pop_auth_apop (POP_DATA * pop_data, const char *method)
+static pop_auth_res_t pop_auth_apop (POP_DATA * pop_data,
+ const char *method __attribute__ ((unused)))
{
MD5_CTX mdContext;
unsigned char digest[16];
{
MD5_CTX mdContext;
unsigned char digest[16];
@@
-192,12
+166,12
@@
static pop_auth_res_t pop_auth_apop (POP_DATA * pop_data, const char *method)
strlen (pop_data->conn->account.pass));
MD5Final (digest, &mdContext);
strlen (pop_data->conn->account.pass));
MD5Final (digest, &mdContext);
- for (i = 0; i < s
izeof
(digest); i++)
+ for (i = 0; i < s
sizeof
(digest); i++)
sprintf (hash + 2 * i, "%02x", digest[i]);
/* Send APOP command to server */
sprintf (hash + 2 * i, "%02x", digest[i]);
/* Send APOP command to server */
- snprintf
(buf, sizeof
(buf), "APOP %s %s\r\n", pop_data->conn->account.user,
-
hash);
+ snprintf
(buf, sizeof
(buf), "APOP %s %s\r\n", pop_data->conn->account.user,
+ hash);
switch (pop_query (pop_data, buf, sizeof (buf))) {
case PQ_OK:
switch (pop_query (pop_data, buf, sizeof (buf))) {
case PQ_OK:
@@
-217,7
+191,8
@@
static pop_auth_res_t pop_auth_apop (POP_DATA * pop_data, const char *method)
}
/* USER authenticator */
}
/* USER authenticator */
-static pop_auth_res_t pop_auth_user (POP_DATA * pop_data, const char *method)
+static pop_auth_res_t pop_auth_user (POP_DATA * pop_data,
+ const char *method __attribute__ ((unused)))
{
char buf[LONG_STRING];
pop_query_status ret;
{
char buf[LONG_STRING];
pop_query_status ret;
@@
-233,14
+208,11
@@
static pop_auth_res_t pop_auth_user (POP_DATA * pop_data, const char *method)
if (pop_data->cmd_user == CMD_UNKNOWN) {
if (ret == PQ_OK) {
pop_data->cmd_user = CMD_AVAILABLE;
if (pop_data->cmd_user == CMD_UNKNOWN) {
if (ret == PQ_OK) {
pop_data->cmd_user = CMD_AVAILABLE;
-
- debug_print (1, ("set USER capability\n"));
}
if (ret == PQ_ERR) {
pop_data->cmd_user = CMD_NOT_AVAILABLE;
}
if (ret == PQ_ERR) {
pop_data->cmd_user = CMD_NOT_AVAILABLE;
- debug_print (1, ("unset USER capability\n"));
snprintf (pop_data->err_msg, sizeof (pop_data->err_msg),
_("Command USER is not supported by server."));
}
snprintf (pop_data->err_msg, sizeof (pop_data->err_msg),
_("Command USER is not supported by server."));
}
@@
-248,12
+220,7
@@
static pop_auth_res_t pop_auth_user (POP_DATA * pop_data, const char *method)
if (ret == PQ_OK) {
snprintf (buf, sizeof (buf), "PASS %s\r\n", pop_data->conn->account.pass);
if (ret == PQ_OK) {
snprintf (buf, sizeof (buf), "PASS %s\r\n", pop_data->conn->account.pass);
- ret = pop_query_d (pop_data, buf, sizeof (buf),
-#ifdef DEBUG
- /* don't print the password unless we're at the ungodly debugging level */
- DebugLevel < M_SOCK_LOG_FULL ? "PASS *\r\n" :
-#endif
- NULL);
+ ret = pop_query (pop_data, buf, sizeof (buf));
}
switch (ret) {
}
switch (ret) {
@@
-274,9
+241,7
@@
static pop_auth_res_t pop_auth_user (POP_DATA * pop_data, const char *method)
}
static pop_auth_t pop_authenticators[] = {
}
static pop_auth_t pop_authenticators[] = {
-#ifdef USE_SASL
{pop_auth_sasl, NULL},
{pop_auth_sasl, NULL},
-#endif
{pop_auth_apop, "apop"},
{pop_auth_user, "user"},
{NULL, NULL}
{pop_auth_apop, "apop"},
{pop_auth_user, "user"},
{NULL, NULL}
@@
-291,7
+256,7
@@
static pop_auth_t pop_authenticators[] = {
*/
pop_query_status pop_authenticate (POP_DATA * pop_data)
{
*/
pop_query_status pop_authenticate (POP_DATA * pop_data)
{
- ACCOUNT *ac
c
t = &pop_data->conn->account;
+ ACCOUNT *act = &pop_data->conn->account;
pop_auth_t *authenticator;
char *methods;
char *comma;
pop_auth_t *authenticator;
char *methods;
char *comma;
@@
-299,8
+264,8
@@
pop_query_status pop_authenticate (POP_DATA * pop_data)
int attempts = 0;
int ret = POP_A_UNAVAIL;
int attempts = 0;
int ret = POP_A_UNAVAIL;
- if (mutt_account_getuser (ac
ct) || !ac
ct->user[0] ||
- mutt_account_getpass (ac
ct) || !ac
ct->pass[0])
+ if (mutt_account_getuser (ac
t) || !a
ct->user[0] ||
+ mutt_account_getpass (ac
t) || !a
ct->pass[0])
return PFD_FUNCT_ERROR;
if (PopAuthenticators && *PopAuthenticators) {
return PFD_FUNCT_ERROR;
if (PopAuthenticators && *PopAuthenticators) {
@@
-312,7
+277,6
@@
pop_query_status pop_authenticate (POP_DATA * pop_data)
comma = strchr (method, ':');
if (comma)
*comma++ = '\0';
comma = strchr (method, ':');
if (comma)
*comma++ = '\0';
- debug_print (2, ("Trying method %s\n", method));
authenticator = pop_authenticators;
while (authenticator->authenticate) {
authenticator = pop_authenticators;
while (authenticator->authenticate) {
@@
-348,7
+312,6
@@
pop_query_status pop_authenticate (POP_DATA * pop_data)
}
else {
/* Fall back to default: any authenticator */
}
else {
/* Fall back to default: any authenticator */
- debug_print (2, ("Using any available method.\n"));
authenticator = pop_authenticators;
while (authenticator->authenticate) {
authenticator = pop_authenticators;
while (authenticator->authenticate) {