X-Git-Url: https://git.netwichtig.de/gitweb/?a=blobdiff_plain;f=src%2Fsrc%2Fauths%2Fcram_md5.c;h=3f80bd6745f035a800461dd00c222a8ce677de8f;hb=d4fd1b83a197d73cbac114fe53f3448d8b5c7cc2;hp=3be00082df2d27861898835bcdeb2eb3d9fdf8da;hpb=4fab92fbc2b63bac2d89c1dae69fa1845cb640b7;p=user%2Fhenk%2Fcode%2Fexim.git diff --git a/src/src/auths/cram_md5.c b/src/src/auths/cram_md5.c index 3be00082d..3f80bd674 100644 --- a/src/src/auths/cram_md5.c +++ b/src/src/auths/cram_md5.c @@ -2,7 +2,7 @@ * Exim - an Internet mail transport agent * *************************************************/ -/* Copyright (c) University of Cambridge 1995 - 2016 */ +/* Copyright (c) University of Cambridge 1995 - 2017 */ /* See the file NOTICE for conditions of use and distribution. */ @@ -38,7 +38,7 @@ address can appear in the tables drtables.c. */ int auth_cram_md5_options_count = sizeof(auth_cram_md5_options)/sizeof(optionlist); -/* Default private options block for the contidion authentication method. */ +/* Default private options block for the condition authentication method. */ auth_cram_md5_options_block auth_cram_md5_option_defaults = { NULL, /* server_secret */ @@ -47,6 +47,17 @@ auth_cram_md5_options_block auth_cram_md5_option_defaults = { }; +#ifdef MACRO_PREDEF + +/* Dummy values */ +void auth_cram_md5_init(auth_instance *ablock) {} +int auth_cram_md5_server(auth_instance *ablock, uschar *data) {return 0;} +int auth_cram_md5_client(auth_instance *ablock, smtp_inblock *inblock, + smtp_outblock *outblock, int timeout, uschar *buffer, int buffsize) {return 0;} + +#else /*!MACRO_PREDEF*/ + + /************************************************* * Initialization entry point * *************************************************/ @@ -68,12 +79,14 @@ if (ob->client_secret != NULL) } } +#endif /*!MACRO_PREDEF*/ #endif /* STAND_ALONE */ +#ifndef MACRO_PREDEF /************************************************* -* Peform the CRAM-MD5 algorithm * +* Perform the CRAM-MD5 algorithm * *************************************************/ /* The CRAM-MD5 algorithm is described in RFC 2195. It computes @@ -108,8 +121,8 @@ and use that. */ if (len > 64) { md5_start(&base); - md5_end(&base, (uschar *)secret, len, md5secret); - secret = (uschar *)md5secret; + md5_end(&base, US secret, len, md5secret); + secret = US md5secret; len = 16; } @@ -130,7 +143,7 @@ for (i = 0; i < 64; i++) md5_start(&base); md5_mid(&base, isecret); -md5_end(&base, (uschar *)challenge, Ustrlen(challenge), md5secret); +md5_end(&base, US challenge, Ustrlen(challenge), md5secret); /* Compute the outer MD5 digest */ @@ -261,7 +274,7 @@ int i; uschar digest[16]; /* If expansion of either the secret or the user name failed, return CANCELLED -or ERROR, as approriate. */ +or ERROR, as appropriate. */ if (!secret || !name) { @@ -280,7 +293,8 @@ if (!secret || !name) /* Initiate the authentication exchange and read the challenge, which arrives in base 64. */ -if (smtp_write_command(outblock, FALSE, "AUTH %s\r\n", ablock->public_name) < 0) +if (smtp_write_command(outblock, SCMD_FLUSH, "AUTH %s\r\n", + ablock->public_name) < 0) return FAIL_SEND; if (!smtp_read_response(inblock, buffer, buffsize, '3', timeout)) return FAIL; @@ -303,20 +317,17 @@ for (p = big_buffer; *p; ) p++; *p++ = ' '; for (i = 0; i < 16; i++) - { - sprintf(CS p, "%02x", digest[i]); - p += 2; - } + p += sprintf(CS p, "%02x", digest[i]); /* Send the response, in base 64, and check the result. The response is in big_buffer, but b64encode() returns its result in working store, so calling smtp_write_command(), which uses big_buffer, is OK. */ buffer[0] = 0; -if (smtp_write_command(outblock, FALSE, "%s\r\n", b64encode(big_buffer, +if (smtp_write_command(outblock, SCMD_FLUSH, "%s\r\n", b64encode(big_buffer, p - big_buffer)) < 0) return FAIL_SEND; -return smtp_read_response(inblock, (uschar *)buffer, buffsize, '2', timeout) +return smtp_read_response(inblock, US buffer, buffsize, '2', timeout) ? OK : FAIL; } #endif /* STAND_ALONE */ @@ -347,4 +358,5 @@ return 0; #endif +#endif /*!MACRO_PREDEF*/ /* End of cram_md5.c */