if (nsc->ns_snoop) {
unsigned int snoopoutlen = netoutlen;
- const char *snoopoutbuf = nsc->ns_outbuffer;
+ const char *snoopoutbuf = (const char *) nsc->ns_outbuffer;
while (snoopoutlen > 0) {
const char *end = strpbrk(snoopoutbuf, "\r\n");
#endif /* TLS_SUPPORT */
fprintf(stderr, "=> ");
if (nsc->ns_snoop_cb) {
- char *ptr;
+ const char *ptr;
unsigned int cb_len = outlen;
if (nsc->ns_snoop_savebuf) {
return nsc->sasl_chosen_mech;
}
+/*
+ * Return the negotiated SASL strength security factor (SSF)
+ */
+
+int
+netsec_get_sasl_ssf(netsec_context *nsc)
+{
+#ifdef CYRUS_SASL
+ return nsc->sasl_ssf;
+#else /* CYRUS_SASL */
+ return 0;
+#endif /* CYRUS_SASL */
+}
+
/*
* Set an OAuth2 service name, if we support it.
*/