X-Git-Url: https://diplodocus.org/git/nmh/blobdiff_plain/8aea555551a2f6a43aa2d24a5b45b09612f0cbb8..0b7286788a95dd854d1826b8493eda431d8e8aac:/uip/popsbr.c diff --git a/uip/popsbr.c b/uip/popsbr.c index ac1117be..b3c85d39 100644 --- a/uip/popsbr.c +++ b/uip/popsbr.c @@ -5,13 +5,14 @@ * complete copyright information. */ -#include -#include -#include -#include - -#include -#include +#include "h/mh.h" +#include "sbr/error.h" +#include "h/utils.h" +#include "h/oauth.h" +#include "h/netsec.h" + +#include "h/popsbr.h" +#include "h/signals.h" #include "sbr/base64.h" #define TRM "." @@ -39,7 +40,8 @@ static int pop_sasl_callback(enum sasl_message_type, unsigned const char *, static int check_mech(char *server_mechs, size_t server_mechs_size) { - int status, sasl_capability = 0; + int status; + bool sasl_capability = false; /* * First off, we're going to send the CAPA command to see if we can @@ -62,7 +64,7 @@ check_mech(char *server_mechs, size_t server_mechs_size) if (strncasecmp(response, "SASL ", 5) == 0) { /* We've seen the SASL capability. Grab the mech list. */ - sasl_capability++; + sasl_capability = true; strncpy(server_mechs, response + 5, server_mechs_size); } }