diff options
author | Eduardo Chappa <chappa@washington.edu> | 2020-02-19 00:39:42 -0700 |
---|---|---|
committer | Eduardo Chappa <chappa@washington.edu> | 2020-02-19 00:39:42 -0700 |
commit | cd53b13aa5acaecb776c82cd6566122a6893240d (patch) | |
tree | 4e811c0dfdebf647b564f4f9659c388c87a44f4c /imap/src/c-client/auth_log.c | |
parent | 8781af1dfc9fdc1fbc08b281cc418bee8dde604d (diff) | |
download | alpine-cd53b13aa5acaecb776c82cd6566122a6893240d.tar.xz |
* Added support for SALS-IR (rfc 4959) and similar support for other
protocols (SMTP, NNTP, POP3) as some SMTP servers do not support a
round-trip two step authentication. For example, davmail does not
support PLAIN authentication in SMTP using the challenge-response
scheme. Implemented after a report by Geoffrey Bodwin.
Diffstat (limited to 'imap/src/c-client/auth_log.c')
-rw-r--r-- | imap/src/c-client/auth_log.c | 10 |
1 files changed, 5 insertions, 5 deletions
diff --git a/imap/src/c-client/auth_log.c b/imap/src/c-client/auth_log.c index 9c8d76ab..618e2a0b 100644 --- a/imap/src/c-client/auth_log.c +++ b/imap/src/c-client/auth_log.c @@ -27,7 +27,7 @@ * Last Edited: 30 August 2006 */ -long auth_login_client (authchallenge_t challenger,authrespond_t responder, +long auth_login_client (authchallenge_t challenger,authrespond_t responder, char *base, char *service,NETMBX *mb,void *stream, unsigned long port, unsigned long *trial,char *user); char *auth_login_server (authresponse_t responder,int argc,char *argv[]); @@ -55,7 +55,7 @@ AUTHENTICATOR auth_log = { * Returns: T if success, NIL otherwise, number of trials incremented if retry */ -long auth_login_client (authchallenge_t challenger,authrespond_t responder, +long auth_login_client (authchallenge_t challenger,authrespond_t responder, char *base, char *service,NETMBX *mb,void *stream, unsigned long port, unsigned long *trial,char *user) { @@ -68,16 +68,16 @@ long auth_login_client (authchallenge_t challenger,authrespond_t responder, fs_give ((void **) &challenge); mm_login (mb,user, &pwd,*trial); if (!pwd) { /* user requested abort */ - (*responder) (stream,NIL,0); + (*responder) (stream,NIL,NIL,0); *trial = 0; /* cancel subsequent attempts */ ret = LONGT; /* will get a BAD response back */ } /* send user name */ - else if ((*responder) (stream,user,strlen (user)) && + else if ((*responder) (stream,NIL,user,strlen (user)) && (challenge = (*challenger) (stream,&clen))) { fs_give ((void **) &challenge); /* send password */ - if ((*responder) (stream,pwd,strlen (pwd))) { + if ((*responder) (stream,NIL,pwd,strlen (pwd))) { if ((challenge = (*challenger) (stream,&clen)) != NULL) fs_give ((void **) &challenge); else { |