* complete copyright information.
*/
-#include <h/mh.h>
-#include <h/utils.h>
-#include <h/oauth.h>
-#include <h/netsec.h>
-
-#include <h/popsbr.h>
-#include <h/signals.h>
+#include "h/mh.h"
+#include "sbr/credentials.h"
+#include "sbr/client.h"
+#include "sbr/error.h"
+#include "h/utils.h"
+#include "h/oauth.h"
+#include "h/netsec.h"
+
+#include "popsbr.h"
+#include "h/signals.h"
#include "sbr/base64.h"
#define TRM "."
static int
check_mech(char *server_mechs, size_t server_mechs_size)
{
- int status, sasl_capability = 0;
+ int status;
+ bool sasl_capability = false;
/*
* First off, we're going to send the CAPA command to see if we can
if (strncasecmp(response, "SASL ", 5) == 0) {
/* We've seen the SASL capability. Grab the mech list. */
- sasl_capability++;
+ sasl_capability = true;
strncpy(server_mechs, response + 5, server_mechs_size);
}
}
* suitable for passing to exec. Returned array must be freed. Shouldn't
* be possible to call this with host set to NULL.
*/
-char **
+static char **
parse_proxy(char *proxy, char *host)
{
char **pargv, **p;
}
-int
+static int
command(const char *fmt, ...)
{
va_list ap;
}
-int
+static int
multiline (void)
{
char buffer[BUFSIZ + LEN(TRM)];