diff options
author | Matthias Andree <matthias.andree@gmx.de> | 2011-05-26 01:47:41 +0200 |
---|---|---|
committer | Matthias Andree <matthias.andree@gmx.de> | 2011-05-26 23:15:29 +0200 |
commit | 7dc67b8cf06f74aa57525279940e180c99701314 (patch) | |
tree | 538ef92392badbcf8efaa4dd5daad44406a3052b /imap.c | |
parent | 5706501113d3374107981a16060adb1f6a105b88 (diff) | |
download | fetchmail-7dc67b8cf06f74aa57525279940e180c99701314.tar.gz fetchmail-7dc67b8cf06f74aa57525279940e180c99701314.tar.bz2 fetchmail-7dc67b8cf06f74aa57525279940e180c99701314.zip |
Run S(TART)TLS negotiation under timeout alarm.
Reported missing by Thomas Jarosch.
Diffstat (limited to 'imap.c')
-rw-r--r-- | imap.c | 6 |
1 files changed, 4 insertions, 2 deletions
@@ -447,9 +447,9 @@ static int imap_getauth(int sock, struct query *ctl, char *greeting) * whether TLS is mandatory or opportunistic unless SSLOpen() fails * (see below). */ if (gen_transact(sock, "STARTTLS") == PS_SUCCESS - && SSLOpen(sock, ctl->sslcert, ctl->sslkey, "tls1", ctl->sslcertck, + && (set_timeout(mytimeout), SSLOpen(sock, ctl->sslcert, ctl->sslkey, "tls1", ctl->sslcertck, ctl->sslcertfile, ctl->sslcertpath, ctl->sslfingerprint, commonname, - ctl->server.pollname, &ctl->remotename) != -1) + ctl->server.pollname, &ctl->remotename)) != -1) { /* * RFC 2595 says this: @@ -473,9 +473,11 @@ static int imap_getauth(int sock, struct query *ctl, char *greeting) } else if (must_tls(ctl)) { /* Config required TLS but we couldn't guarantee it, so we must * stop. */ + set_timeout(0); report(stderr, GT_("%s: upgrade to TLS failed.\n"), commonname); return PS_SOCKET; } else { + set_timeout(0); if (outlevel >= O_VERBOSE) { report(stdout, GT_("%s: opportunistic upgrade to TLS failed, trying to continue\n"), commonname); } |