X-Git-Url: https://diplodocus.org/git/nmh/blobdiff_plain/2e04b8ea0e57e411665aa6a8814ff65db0d4cd2b..3b2ca65d6c8ffd443caa93bf89b0f9b61d9a4919:/uip/send.c diff --git a/uip/send.c b/uip/send.c index 03a54698..1e48ea3a 100644 --- a/uip/send.c +++ b/uip/send.c @@ -63,7 +63,6 @@ X("snoop", 5, SNOOPSW) \ X("sasl", SASLminc(4), SASLSW) \ X("nosasl", SASLminc(6), NOSASLSW) \ - X("saslmaxssf", SASLminc(6), SASLMXSSFSW) \ X("saslmech mechanism", SASLminc(6), SASLMECHSW) \ X("authservice", SASLminc(0), AUTHSERVICESW) \ X("user username", SASLminc(-4), USERSW) \ @@ -268,11 +267,6 @@ main (int argc, char **argv) user = cp; continue; - case SASLMECHSW: - if (!(saslmech = *argp++) || *saslmech == '-') - adios (NULL, "missing argument to %s", argp[-2]); - continue; - case AUTHSERVICESW: #ifdef OAUTH_SUPPORT if (!(auth_svc = *argp++) || *auth_svc == '-') @@ -282,12 +276,16 @@ main (int argc, char **argv) #endif continue; + case SASLMECHSW: + if (!(saslmech = *argp) || *saslmech == '-') + adios (NULL, "missing argument to %s", argp[-2]); + /* Fall through */ + case ALIASW: case FILTSW: case WIDTHSW: case CLIESW: case SERVSW: - case SASLMXSSFSW: case PORTSW: case MTSSM: case MTSSW: @@ -459,13 +457,6 @@ go_to_it: if (user == NULL) { adios (NULL, "must specify -user with -saslmech xoauth2"); } - - vec[vecp++] = "-authservice"; - if (saslmech && ! strcasecmp(saslmech, "xoauth2")) { - vec[vecp++] = mh_oauth_do_xoauth (user, auth_svc, snoop ? stderr : NULL); - } else { - vec[vecp++] = auth_svc; - } } #else NMH_UNUSED(auth_svc); @@ -485,7 +476,7 @@ go_to_it: closefds (3); for (msgnum = 0; msgnum < msgp; msgnum++) { - switch (sendsbr (vec, vecp, program, msgs[msgnum], &st, 1)) { + switch (sendsbr (vec, vecp, program, msgs[msgnum], &st, 1, auth_svc)) { case DONE: done (++status); case NOTOK: