* complete copyright information.
*/
-#include <h/mh.h>
+#include "h/mh.h"
+#include "sbr/r1bindex.h"
+#include "sbr/client.h"
+#include "sbr/error.h"
#include "smtp.h"
-#include <h/mts.h>
-#include <h/signals.h>
-#include <h/utils.h>
-#include <h/netsec.h>
+#include "h/mts.h"
+#include "h/signals.h"
+#include "h/utils.h"
+#include "h/netsec.h"
#include <sys/socket.h>
#include "sbr/base64.h"
*/
if (tls & S_INITTLS) {
- if (netsec_negotiate_tls(nsc, &errstr) != OK) {
+ if (netsec_negotiate_tls(nsc, &errstr) != OK) {
sm_end(NOTOK);
return sm_nerror(errstr);
}
*/
if (sasl) {
- char *server_mechs;
+ char *server_mechs;
if (! (server_mechs = EHLOset("AUTH"))) {
sm_end(NOTOK);
return sm_ierror("SMTP server does not support SASL");
char **ehlo = EHLOkeys, *buffer;
if (doingEHLO) {
- static int at_least_once = 0;
+ static bool at_least_once;
if (at_least_once) {
char *ep;
free (ep);
}
} else {
- at_least_once = 1;
+ at_least_once = true;
}
ehlo = EHLOkeys;
rc = sizeof(sm_reply.text) - 1;
for (more = false; (buffer = netsec_readline(nsc, &buflen,
- &errstr)) != NULL ; ) {
+ &errstr)) != NULL ; ) {
if (doingEHLO
&& has_prefix(buffer, "250")
*outdata = NULL;
*outdatalen = 0;
} else {
- rc = decodeBase64(line + 4, outdata, &len, 0, NULL);
+ rc = decodeBase64(line + 4, outdata, &len, 0);
if (rc != OK) {
netsec_err(errstr, "Unable to decode base64 response");
return NOTOK;