X-Git-Url: http://git.madism.org/?p=apps%2Fmadmutt.git;a=blobdiff_plain;f=pop%2Fpop_auth.c;h=194f33b26752a9d1d969cda5d60d8b25cae2b049;hp=749981603c36296022271ec9fb0b84c82d97dc78;hb=a8477ebaa09990b3688164cbe5cf661c4189541d;hpb=203e950e3d3c76795fa49895d040f732adad2049 diff --git a/pop/pop_auth.c b/pop/pop_auth.c index 7499816..194f33b 100644 --- a/pop/pop_auth.c +++ b/pop/pop_auth.c @@ -18,6 +18,7 @@ #include "lib/mem.h" #include "lib/intl.h" +#include "lib/debug.h" #include #include @@ -54,9 +55,7 @@ static pop_auth_res_t pop_auth_sasl (POP_DATA * pop_data, const char *method) unsigned char client_start; if (mutt_sasl_client_new (pop_data->conn, &saslconn) < 0) { - dprint (1, - (debugfile, - "pop_auth_sasl: Error allocating SASL connection.\n")); + debug_print (1, ("Error allocating SASL connection.\n")); return POP_A_FAILURE; } @@ -77,9 +76,7 @@ static pop_auth_res_t pop_auth_sasl (POP_DATA * pop_data, const char *method) } if (rc != SASL_OK && rc != SASL_CONTINUE) { - dprint (1, - (debugfile, - "pop_auth_sasl: Failure starting authentication exchange. No shared mechanisms?\n")); + debug_print (1, ("Failure starting authentication exchange. No shared mechanisms?\n")); /* SASL doesn't support suggested mechanisms, so fall back */ return POP_A_UNAVAIL; @@ -106,17 +103,15 @@ static pop_auth_res_t pop_auth_sasl (POP_DATA * pop_data, const char *method) break; #ifdef USE_SASL2 - if (!mutt_strncmp (inbuf, "+ ", 2) + if (!str_ncmp (inbuf, "+ ", 2) && sasl_decode64 (inbuf, strlen (inbuf), buf, LONG_STRING - 1, &len) != SASL_OK) #else - if (!mutt_strncmp (inbuf, "+ ", 2) + if (!str_ncmp (inbuf, "+ ", 2) && sasl_decode64 (inbuf, strlen (inbuf), buf, &len) != SASL_OK) #endif { - dprint (1, - (debugfile, - "pop_auth_sasl: error base64-decoding server response.\n")); + debug_print (1, ("error base64-decoding server response.\n")); goto bail; } @@ -136,9 +131,7 @@ static pop_auth_res_t pop_auth_sasl (POP_DATA * pop_data, const char *method) /* send out response, or line break if none needed */ if (pc) { if (sasl_encode64 (pc, olen, buf, sizeof (buf), &olen) != SASL_OK) { - dprint (1, - (debugfile, - "pop_auth_sasl: error base64-encoding client response.\n")); + debug_print (1, ("error base64-encoding client response.\n")); goto bail; } @@ -153,7 +146,7 @@ static pop_auth_res_t pop_auth_sasl (POP_DATA * pop_data, const char *method) if (rc != SASL_OK) goto bail; - if (!mutt_strncmp (inbuf, "+OK", 3)) { + if (!str_ncmp (inbuf, "+OK", 3)) { mutt_sasl_setup_conn (pop_data->conn, saslconn); return POP_A_SUCCESS; } @@ -162,7 +155,7 @@ bail: sasl_dispose (&saslconn); /* terminate SASL sessoin if the last responce is not +OK nor -ERR */ - if (!mutt_strncmp (inbuf, "+ ", 2)) { + if (!str_ncmp (inbuf, "+ ", 2)) { snprintf (buf, sizeof (buf), "*\r\n"); if (pop_query (pop_data, buf, sizeof (buf)) == PQ_NOT_CONNECTED) return POP_A_SOCKET; @@ -185,7 +178,7 @@ void pop_apop_timestamp (POP_DATA * pop_data, char *buf) if ((p1 = strchr (buf, '<')) && (p2 = strchr (p1, '>'))) { p2[1] = '\0'; - pop_data->timestamp = safe_strdup (p1); + pop_data->timestamp = str_dup (p1); } } @@ -250,13 +243,13 @@ static pop_auth_res_t pop_auth_user (POP_DATA * pop_data, const char *method) if (ret == PQ_OK) { pop_data->cmd_user = CMD_AVAILABLE; - dprint (1, (debugfile, "pop_auth_user: set USER capability\n")); + debug_print (1, ("set USER capability\n")); } if (ret == PQ_ERR) { pop_data->cmd_user = CMD_NOT_AVAILABLE; - dprint (1, (debugfile, "pop_auth_user: unset USER capability\n")); + debug_print (1, ("unset USER capability\n")); snprintf (pop_data->err_msg, sizeof (pop_data->err_msg), _("Command USER is not supported by server.")); } @@ -266,10 +259,10 @@ static pop_auth_res_t pop_auth_user (POP_DATA * pop_data, const char *method) snprintf (buf, sizeof (buf), "PASS %s\r\n", pop_data->conn->account.pass); ret = pop_query_d (pop_data, buf, sizeof (buf), #ifdef DEBUG - /* don't print the password unless we're at the ungodly debugging level */ - debuglevel < M_SOCK_LOG_FULL ? "PASS *\r\n" : + /* don't print the password unless we're at the ungodly debugging level */ + DebugLevel < M_SOCK_LOG_FULL ? "PASS *\r\n" : #endif - NULL); + NULL); } switch (ret) { @@ -317,14 +310,14 @@ pop_query_status pop_authenticate (POP_DATA * pop_data) if (PopAuthenticators && *PopAuthenticators) { /* Try user-specified list of authentication methods */ - methods = safe_strdup (PopAuthenticators); + methods = str_dup (PopAuthenticators); method = methods; while (method) { comma = strchr (method, ':'); if (comma) *comma++ = '\0'; - dprint (2, (debugfile, "pop_authenticate: Trying method %s\n", method)); + debug_print (2, ("Trying method %s\n", method)); authenticator = pop_authenticators; while (authenticator->authenticate) { @@ -360,8 +353,7 @@ pop_query_status pop_authenticate (POP_DATA * pop_data) } else { /* Fall back to default: any authenticator */ - dprint (2, - (debugfile, "pop_authenticate: Using any available method.\n")); + debug_print (2, ("Using any available method.\n")); authenticator = pop_authenticators; while (authenticator->authenticate) {