diff options
Diffstat (limited to 'driver.c')
| -rw-r--r-- | driver.c | 121 | 
1 files changed, 60 insertions, 61 deletions
@@ -132,7 +132,7 @@ static void map_name(const char *name, struct query *ctl, struct idlist **xmit_n      if (lname != (char *)NULL)      {  	if (outlevel >= O_DEBUG) -	    report(stdout, 0, _("mapped %s to local %s\n"), name, lname); +	    report(stdout, _("mapped %s to local %s\n"), name, lname);  	save_str(xmit_names, lname, XMIT_ACCEPT);  	accept_count++;      } @@ -189,7 +189,7 @@ static void find_server_names(const char *hdr,  			strcasecmp(rhs, idp->id) == 0)  		    {  			if (outlevel >= O_DEBUG) -			    report(stdout, 0, _("passed through %s matching %s\n"),  +			    report(stdout, _("passed through %s matching %s\n"),   				  cp, idp->id);  			save_str(xmit_names, cp, XMIT_ACCEPT);  			accept_count++; @@ -243,7 +243,7 @@ static char *parse_received(struct query *ctl, char *bufp)       * does this when the mail has a single recipient.       */      if (outlevel >= O_DEBUG) -	report(stdout, 0, _("analyzing Received line:\n%s"), bufp); +	report(stdout, _("analyzing Received line:\n%s"), bufp);      /* search for whitepace-surrounded "by" followed by xxxx.yyyy */      for (base = bufp;  ; base = ok + 2) @@ -281,13 +281,13 @@ static char *parse_received(struct query *ctl, char *bufp)  	if (is_host_alias(rbuf, ctl))  	{  	    if (outlevel >= O_DEBUG) -		report(stdout, 0,  +		report(stdout,   		      _("line accepted, %s is an alias of the mailserver\n"), rbuf);  	}  	else  	{  	    if (outlevel >= O_DEBUG) -		report(stdout, 0,  +		report(stdout,   		      _("line rejected, %s is not an alias of the mailserver\n"),   		      rbuf);  	    return(NULL); @@ -359,7 +359,7 @@ static char *parse_received(struct query *ctl, char *bufp)      if (!ok)      {  	if (outlevel >= O_DEBUG) -	    report(stdout, 0, _("no Received address found\n")); +	    report(stdout, _("no Received address found\n"));  	return(NULL);      }      else @@ -368,7 +368,7 @@ static char *parse_received(struct query *ctl, char *bufp)  	    char *lf = rbuf + strlen(rbuf)-1;  	    *lf = '\0';  	    if (outlevel >= O_DEBUG) -		report(stdout, 0, _("found Received address `%s'\n"), rbuf+2); +		report(stdout, _("found Received address `%s'\n"), rbuf+2);  	    *lf = '\n';  	}  	return(rbuf); @@ -732,7 +732,7 @@ static int readheaders(int sock,      if (!headers_ok)      {  	if (outlevel > O_SILENT) -	    report(stdout, 0, +	    report(stdout,  		   _("message delimiter found while scanning headers\n"));      } @@ -869,7 +869,7 @@ static int readheaders(int sock,  	    no_local_matches = TRUE;  	    save_str(&msgblk.recipients, run.postmaster, XMIT_ACCEPT);  	    if (outlevel >= O_DEBUG) -		report(stdout, 0,  +		report(stdout,  		      _("no local matches, forwarding to %s\n"),  		      run.postmaster);  	} @@ -884,7 +884,7 @@ static int readheaders(int sock,      if (ctl->errcount > olderrs)	/* there were DNS errors above */      {  	if (outlevel >= O_DEBUG) -	    report(stdout, 0, +	    report(stdout,  		   _("forwarding and deletion suppressed due to DNS errors\n"));  	free(msgblk.headers);  	free_str_list(&msgblk.recipients); @@ -982,7 +982,7 @@ static int readheaders(int sock,      if (n == -1)      { -	report(stdout, errno, _("writing RFC822 msgblk.headers\n")); +	report(stdout, _("writing RFC822 msgblk.headers\n"));  	release_sink(ctl);  	free(msgblk.headers);  	free_str_list(&msgblk.recipients); @@ -1141,7 +1141,7 @@ static int readbody(int sock, struct query *ctl, flag forward, int len)  	    if (n < 0)  	    { -		report(stdout, errno, _("writing message text\n")); +		report(stdout, _("writing message text\n"));  		release_sink(ctl);  		return(PS_IOERR);  	    } @@ -1184,7 +1184,7 @@ const char *canonical;	/* server name */  			 "KPOPV0.1"));      if (rem != KSUCCESS)      { -	report(stderr, 0, _("kerberos error %s\n"), (krb_get_err_text (rem))); +	report(stderr, _("kerberos error %s\n"), (krb_get_err_text (rem)));  	return (PS_AUTHFAIL);      }      return (0); @@ -1210,19 +1210,19 @@ const char *canonical;  /* server name */      krb5_auth_con_init(context, &auth_context);      if (retval = krb5_cc_default(context, &ccdef)) { -        report(stderr, 0, "krb5_cc_default: %s\n", error_message(retval)); +        report(stderr, "krb5_cc_default: %s\n", error_message(retval));          return(PS_ERROR);      }      if (retval = krb5_cc_get_principal(context, ccdef, &client)) { -        report(stderr, 0, "krb5_cc_get_principal: %s\n", error_message(retval)); +        report(stderr, "krb5_cc_get_principal: %s\n", error_message(retval));          return(PS_ERROR);      }      if (retval = krb5_sname_to_principal(context, canonical, "pop",             KRB5_NT_UNKNOWN,             &server)) { -        report(stderr, 0, "krb5_sname_to_principal: %s\n", error_message(retval)); +        report(stderr, "krb5_sname_to_principal: %s\n", error_message(retval));          return(PS_ERROR);      } @@ -1242,13 +1242,13 @@ const char *canonical;  /* server name */      if (retval) {        if (err_ret && err_ret->text.length) { -          report(stderr, 0, _("krb5_sendauth: %s [server says '%*s'] \n"), +          report(stderr, _("krb5_sendauth: %s [server says '%*s'] \n"),  		 error_message(retval),  		 err_ret->text.length,  		 err_ret->text.data);  	  krb5_free_error(context, err_ret);        } else -          report(stderr, 0, "krb5_sendauth: %s\n", error_message(retval)); +          report(stderr, "krb5_sendauth: %s\n", error_message(retval));        return(PS_ERROR);      } @@ -1372,7 +1372,7 @@ const struct method *proto;	/* protocol method table */  #ifndef KERBEROS_V4      if (ctl->server.preauthenticate == A_KERBEROS_V4)      { -	report(stderr, 0, _("Kerberos V4 support not linked.\n")); +	report(stderr, _("Kerberos V4 support not linked.\n"));  	return(PS_ERROR);      }  #endif /* KERBEROS_V4 */ @@ -1380,7 +1380,7 @@ const struct method *proto;	/* protocol method table */  #ifndef KERBEROS_V5      if (ctl->server.preauthenticate == A_KERBEROS_V5)      { -	report(stderr, 0, _("Kerberos V5 support not linked.\n")); +	report(stderr, _("Kerberos V5 support not linked.\n"));  	return(PS_ERROR);      }  #endif /* KERBEROS_V5 */ @@ -1390,13 +1390,13 @@ const struct method *proto;	/* protocol method table */      {  	/* check for unsupported options */  	if (ctl->flush) { -	    report(stderr, 0, +	    report(stderr,  		    _("Option --flush is not supported with %s\n"),  		    proto->name);  	    return(PS_SYNTAX);  	}  	else if (ctl->fetchall) { -	    report(stderr, 0, +	    report(stderr,  		    _("Option --all is not supported with %s\n"),  		    proto->name);  	    return(PS_SYNTAX); @@ -1404,7 +1404,7 @@ const struct method *proto;	/* protocol method table */      }      if (!proto->getsizes && NUM_SPECIFIED(ctl->limit))      { -	report(stderr, 0, +	report(stderr,  		_("Option --limit is not supported with %s\n"),  		proto->name);  	return(PS_SYNTAX); @@ -1438,23 +1438,23 @@ const struct method *proto;	/* protocol method table */  #endif /* HAVE_SIGPROCMASK */  	if (phase == OPEN_WAIT) -	    report(stdout, 0, +	    report(stdout,  		  _("timeout after %d seconds waiting to connect to server %s.\n"),  		  ctl->server.timeout, ctl->server.pollname);  	else if (phase == SERVER_WAIT) -	    report(stdout, 0, +	    report(stdout,  		  _("timeout after %d seconds waiting for server %s.\n"),  		  ctl->server.timeout, ctl->server.pollname);  	else if (phase == FORWARDING_WAIT) -	    report(stdout, 0, +	    report(stdout,  		  _("timeout after %d seconds waiting for %s.\n"),  		  ctl->server.timeout,  		  ctl->mda ? "MDA" : "SMTP");  	else if (phase == LISTENER_WAIT) -	    report(stdout, 0, +	    report(stdout,  		  _("timeout after %d seconds waiting for listener to respond.\n"));  	else -	    report(stdout, 0, _("timeout after %d seconds.\n"), ctl->server.timeout); +	    report(stdout, _("timeout after %d seconds.\n"), ctl->server.timeout);  	release_sink(ctl);  	if (ctl->smtp_socket != -1) @@ -1504,7 +1504,7 @@ const struct method *proto;	/* protocol method table */  	/* execute pre-initialization command, if any */  	if (ctl->preconnect && (ok = system(ctl->preconnect)))  	{ -	    report(stderr, 0,  +	    report(stderr,   		   _("pre-connection command failed with status %d\n"), ok);  	    ok = PS_SYNTAX;  	    goto closeUp; @@ -1530,7 +1530,7 @@ const struct method *proto;	/* protocol method table */  	    int err_no = errno;  #ifdef HAVE_RES_SEARCH  	    if (err_no != 0 && h_errno != 0) -		report(stderr, 0, _("fetchmail: internal inconsistency\n")); +		report(stderr, _("fetchmail: internal inconsistency\n"));  #endif  	    /*  	     * Avoid generating a bogus error every poll cycle when we're @@ -1540,26 +1540,25 @@ const struct method *proto;	/* protocol method table */  	    if (err_no == EHOSTUNREACH && run.poll_interval)  	        goto ehostunreach; -	    report_build(stderr, _("fetchmail: %s connection to %s failed\n"),  +	    report_build(stderr, _("fetchmail: %s connection to %s failed"),   			 protocol->name, ctl->server.pollname);  #ifdef HAVE_RES_SEARCH  	    if (h_errno != 0)  	    {  		if (h_errno == HOST_NOT_FOUND) -		    report_complete(stderr, 0, _(": host is unknown\n")); +		    report_complete(stderr, _(": host is unknown\n"));  		else if (h_errno == NO_ADDRESS) -		    report_complete(stderr, 0, _(": name is valid but has no IP address\n")); +		    report_complete(stderr, _(": name is valid but has no IP address\n"));  		else if (h_errno == NO_RECOVERY) -		    report_complete(stderr, 0, _(": unrecoverable name server error\n")); +		    report_complete(stderr, _(": unrecoverable name server error\n"));  		else if (h_errno == TRY_AGAIN) -		    report_complete(stderr, 0, _(": temporary name server error\n")); +		    report_complete(stderr, _(": temporary name server error\n"));  		else -		    report_complete(stderr, 0, _(": unknown DNS error %d\n"), h_errno); +		    report_complete(stderr, _(": unknown DNS error %d\n"), h_errno);  	    }  	    else  #endif /* HAVE_RES_SEARCH */ - -		report_complete(stderr, err_no, "\n"); +		report_complete(stderr, ": %s\n", strerror(err_no));  	ehostunreach:  #endif /* INET6 */ @@ -1610,14 +1609,14 @@ const struct method *proto;	/* protocol method table */  	    if (ok != 0)  	    {  		if (ok == PS_LOCKBUSY) -		    report(stderr, 0, _("Lock-busy error on %s@%s\n"), +		    report(stderr, _("Lock-busy error on %s@%s\n"),  			  ctl->remotename,  			  ctl->server.truename);  		else  		{  		    if (ok == PS_ERROR)  			ok = PS_AUTHFAIL; -		    report(stderr, 0, _("Authorization failure on %s@%s\n"),  +		    report(stderr, _("Authorization failure on %s@%s\n"),   			  ctl->remotename,  			  ctl->server.truename); @@ -1660,9 +1659,9 @@ const struct method *proto;	/* protocol method table */  		if (outlevel >= O_DEBUG)  		    if (idp->id) -			report(stdout, 0, _("selecting or re-polling folder %s\n"), idp->id); +			report(stdout, _("selecting or re-polling folder %s\n"), idp->id);  		    else -			report(stdout, 0, _("selecting or re-polling default folder\n")); +			report(stdout, _("selecting or re-polling default folder\n"));  		/* compute # of messages and number of new messages waiting */  		ok = (protocol->getrange)(sock, ctl, idp->id, &count, &new, &bytes); @@ -1678,7 +1677,7 @@ const struct method *proto;	/* protocol method table */  				   ctl->remotename, ctl->server.truename);  		if (outlevel > O_SILENT)  		    if (count == -1)		/* only used for ETRN */ -			report(stdout, 0, _("Polling %s\n"), ctl->server.truename); +			report(stdout, _("Polling %s\n"), ctl->server.truename);  		    else if (count != 0)  		    {  			if (new != -1 && (count - new) > 0) @@ -1691,15 +1690,15 @@ const struct method *proto;	/* protocol method table */  				  count, count > 1 ? _("messages") :  				                     _("message"), buf);  			if (bytes == -1) -			    report_complete(stdout, 0, ".\n"); +			    report_complete(stdout, ".\n");  			else -			    report_complete(stdout, 0, _(" (%d octets).\n"), bytes); +			    report_complete(stdout, _(" (%d octets).\n"), bytes);  		    }  		    else  		    {  			/* these are pointless in normal daemon mode */  			if (pass == 1 && (run.poll_interval == 0 || outlevel >= O_VERBOSE)) -			    report(stdout, 0, _("No mail for %s\n"), buf);  +			    report(stdout, _("No mail for %s\n"), buf);   		    }  		/* very important, this is where we leave the do loop */  @@ -1799,7 +1798,7 @@ const struct method *proto;	/* protocol method table */  			if (msgsizes && msgsizes[num-1] == -1)  			{  			    if (outlevel >= O_VERBOSE) -				report(stdout, 0,  +				report(stdout,   				      _("Skipping message %d, length -1"),  				      num - 1);  			    continue; @@ -1885,9 +1884,9 @@ const struct method *proto;	/* protocol method table */  				    report_build(stdout, _(" (%d %soctets)"),  					len, wholesize ? "" : _("header "));  				if (outlevel >= O_VERBOSE) -				    report_complete(stdout, 0, "\n"); +				    report_complete(stdout, "\n");  				else -				    report_complete(stdout, 0, " "); +				    report_complete(stdout, " ");  			    }  			    /*  @@ -1931,7 +1930,7 @@ const struct method *proto;	/* protocol method table */  				    if ((ok=(protocol->fetch_body)(sock,ctl,num,&len)))  					goto cleanUp;  				    if (outlevel > O_SILENT && !wholesize) -					report_complete(stdout, 0,  +					report_complete(stdout,  					       _(" (%d body octets) "), len);  				}  			    } @@ -2003,7 +2002,7 @@ const struct method *proto;	/* protocol method table */  			    if (msgsizes && msglen != msgsizes[num-1])  			    {  				if (outlevel >= O_DEBUG) -				    report(stdout, 0, +				    report(stdout,  					  _("message %d was not the expected length (%d actual != %d expected)\n"),  					  num, msglen, msgsizes[num-1]);  			    } @@ -2042,7 +2041,7 @@ const struct method *proto;	/* protocol method table */  			if (retained)  			{  			    if (outlevel > O_SILENT)  -				report(stdout, 0, _(" retained\n")); +				report(stdout, _(" retained\n"));  			}  			else if (protocol->delete  				 && !suppress_delete @@ -2050,7 +2049,7 @@ const struct method *proto;	/* protocol method table */  			{  			    deletions++;  			    if (outlevel > O_SILENT)  -				report_complete(stdout, 0, _(" flushed\n")); +				report_complete(stdout, _(" flushed\n"));  			    ok = (protocol->delete)(sock, ctl, num);  			    if (ok != 0)  				goto cleanUp; @@ -2059,13 +2058,13 @@ const struct method *proto;	/* protocol method table */  #endif /* POP3_ENABLE */  			}  			else if (outlevel > O_SILENT)  -			    report_complete(stdout, 0, _(" not flushed\n")); +			    report_complete(stdout, _(" not flushed\n"));  			/* perhaps this as many as we're ready to handle */  			if (NUM_NONZERO(ctl->fetchlimit)  					&& ctl->fetchlimit <= fetches)  			{ -			    report(stdout, 0, _("fetchlimit reached; %d messages left on server\n"), +			    report(stdout, _("fetchlimit reached; %d messages left on server\n"),  				  count - fetches);  			    goto no_error;  			} @@ -2137,19 +2136,19 @@ const struct method *proto;	/* protocol method table */  	msg = _("DNS lookup");  	break;      case PS_UNDEFINED: -	report(stderr, 0, _("undefined\n")); +	report(stderr, _("undefined\n"));  	break;      }      if (ok==PS_SOCKET || ok==PS_AUTHFAIL || ok==PS_SYNTAX   		|| ok==PS_IOERR || ok==PS_ERROR || ok==PS_PROTOCOL   		|| ok==PS_LOCKBUSY || ok==PS_SMTP) -	report(stderr,0, _("%s error while fetching from %s\n"), msg, ctl->server.pollname); +	report(stderr, _("%s error while fetching from %s\n"), msg, ctl->server.pollname);  closeUp:      /* execute post-initialization command, if any */      if (ctl->postconnect && (ok = system(ctl->postconnect)))      { -	report(stderr, 0, _("post-connection command failed with status %d\n"), ok); +	report(stderr, _("post-connection command failed with status %d\n"), ok);  	if (ok == PS_SUCCESS)  	    ok = PS_SYNTAX;      } @@ -2206,7 +2205,7 @@ va_dcl  	    *cp = '\0';  	}  	buf[strlen(buf)-2] = '\0'; -	report(stdout, 0, "%s> %s\n", protocol->name, buf); +	report(stdout, "%s> %s\n", protocol->name, buf);      }  } @@ -2234,7 +2233,7 @@ int size;	/* length of buffer */  	if (buf[strlen(buf)-1] == '\r')  	    buf[strlen(buf)-1] = '\0';  	if (outlevel >= O_MONITOR) -	    report(stdout, 0, "%s< %s\n", protocol->name, buf); +	    report(stdout, "%s< %s\n", protocol->name, buf);  	phase = oldphase;  	return(PS_SUCCESS);      } @@ -2292,7 +2291,7 @@ va_dcl  	    *cp = '\0';  	}  	buf[strlen(buf)-1] = '\0'; -	report(stdout, 0, "%s> %s\n", protocol->name, buf); +	report(stdout, "%s> %s\n", protocol->name, buf);      }      /* we presume this does its own response echoing */  | 
