In the preceding the "--curl" codepath was made mandatory, so now we won't use the OpenSSL implementation codepaths in imap-send.c except for "imap.tunnel". So let's follow-up and delete the code on that path which was specific to the "imap.host" mode. Signed-off-by: Ævar Arnfjörð Bjarmason <avarab@xxxxxxxxx> --- imap-send.c | 127 +++++++--------------------------------------------- 1 file changed, 16 insertions(+), 111 deletions(-) diff --git a/imap-send.c b/imap-send.c index 9d7cb22285d..9712a8d4f93 100644 --- a/imap-send.c +++ b/imap-send.c @@ -197,14 +197,7 @@ static void socket_perror(const char *func, struct imap_socket *sock, int ret) } } -#ifdef NO_OPENSSL -static int ssl_socket_connect(struct imap_socket *sock, int use_tls_only, int verify) -{ - fprintf(stderr, "SSL requested but SSL support not compiled in\n"); - return -1; -} - -#else +#ifndef NO_OPENSSL static int host_matches(const char *host, const char *pattern) { @@ -253,7 +246,7 @@ static int verify_hostname(X509 *cert, const char *hostname) cname, hostname); } -static int ssl_socket_connect(struct imap_socket *sock, int use_tls_only, int verify) +static int ssl_socket_connect(struct imap_socket *sock, int verify) { #if (OPENSSL_VERSION_NUMBER >= 0x10000000L) const SSL_METHOD *meth; @@ -279,8 +272,7 @@ static int ssl_socket_connect(struct imap_socket *sock, int use_tls_only, int ve return -1; } - if (use_tls_only) - SSL_CTX_set_options(ctx, SSL_OP_NO_SSLv2 | SSL_OP_NO_SSLv3); + SSL_CTX_set_options(ctx, SSL_OP_NO_SSLv2 | SSL_OP_NO_SSLv3); if (verify) SSL_CTX_set_verify(ctx, SSL_VERIFY_PEER, NULL); @@ -944,7 +936,8 @@ static struct imap_store *imap_open_store(struct imap_server_conf *srvc, const c struct imap_store *ctx; struct imap *imap; char *arg, *rsp; - int s = -1, preauth; + int preauth; + struct child_process tunnel = CHILD_PROCESS_INIT; CALLOC_ARRAY(ctx, 1); @@ -953,107 +946,19 @@ static struct imap_store *imap_open_store(struct imap_server_conf *srvc, const c imap->in_progress_append = &imap->in_progress; /* open connection to IMAP server */ + imap_info("Starting tunnel '%s'... ", srvc->tunnel); - if (srvc->tunnel) { - struct child_process tunnel = CHILD_PROCESS_INIT; - - imap_info("Starting tunnel '%s'... ", srvc->tunnel); - - strvec_push(&tunnel.args, srvc->tunnel); - tunnel.use_shell = 1; - tunnel.in = -1; - tunnel.out = -1; - if (start_command(&tunnel)) - die("cannot start proxy %s", srvc->tunnel); - - imap->buf.sock.fd[0] = tunnel.out; - imap->buf.sock.fd[1] = tunnel.in; - - imap_info("ok\n"); - } else { -#ifndef NO_IPV6 - struct addrinfo hints, *ai0, *ai; - int gai; - char portstr[6]; - - xsnprintf(portstr, sizeof(portstr), "%d", srvc->port); - - memset(&hints, 0, sizeof(hints)); - hints.ai_socktype = SOCK_STREAM; - hints.ai_protocol = IPPROTO_TCP; - - imap_info("Resolving %s... ", srvc->host); - gai = getaddrinfo(srvc->host, portstr, &hints, &ai); - if (gai) { - fprintf(stderr, "getaddrinfo: %s\n", gai_strerror(gai)); - goto bail; - } - imap_info("ok\n"); - - for (ai0 = ai; ai; ai = ai->ai_next) { - char addr[NI_MAXHOST]; - - s = socket(ai->ai_family, ai->ai_socktype, - ai->ai_protocol); - if (s < 0) - continue; + strvec_push(&tunnel.args, srvc->tunnel); + tunnel.use_shell = 1; + tunnel.in = -1; + tunnel.out = -1; + if (start_command(&tunnel)) + die("cannot start proxy %s", srvc->tunnel); - getnameinfo(ai->ai_addr, ai->ai_addrlen, addr, - sizeof(addr), NULL, 0, NI_NUMERICHOST); - imap_info("Connecting to [%s]:%s... ", addr, portstr); + imap->buf.sock.fd[0] = tunnel.out; + imap->buf.sock.fd[1] = tunnel.in; - if (connect(s, ai->ai_addr, ai->ai_addrlen) < 0) { - close(s); - s = -1; - perror("connect"); - continue; - } - - break; - } - freeaddrinfo(ai0); -#else /* NO_IPV6 */ - struct hostent *he; - struct sockaddr_in addr; - - memset(&addr, 0, sizeof(addr)); - addr.sin_port = htons(srvc->port); - addr.sin_family = AF_INET; - - imap_info("Resolving %s... ", srvc->host); - he = gethostbyname(srvc->host); - if (!he) { - perror("gethostbyname"); - goto bail; - } - imap_info("ok\n"); - - addr.sin_addr.s_addr = *((int *) he->h_addr_list[0]); - - s = socket(PF_INET, SOCK_STREAM, 0); - - imap_info("Connecting to %s:%hu... ", inet_ntoa(addr.sin_addr), ntohs(addr.sin_port)); - if (connect(s, (struct sockaddr *)&addr, sizeof(addr))) { - close(s); - s = -1; - perror("connect"); - } -#endif - if (s < 0) { - fputs("Error: unable to connect to server.\n", stderr); - goto bail; - } - - imap->buf.sock.fd[0] = s; - imap->buf.sock.fd[1] = dup(s); - - if (srvc->use_ssl && - ssl_socket_connect(&imap->buf.sock, 0, srvc->ssl_verify)) { - close(s); - goto bail; - } - imap_info("ok\n"); - } + imap_info("ok\n"); /* read the greeting string */ if (buffer_gets(&imap->buf, &rsp)) { @@ -1081,7 +986,7 @@ static struct imap_store *imap_open_store(struct imap_server_conf *srvc, const c if (!srvc->use_ssl && CAP(STARTTLS)) { if (imap_exec(ctx, NULL, "STARTTLS") != RESP_OK) goto bail; - if (ssl_socket_connect(&imap->buf.sock, 1, + if (ssl_socket_connect(&imap->buf.sock, srvc->ssl_verify)) goto bail; /* capabilities may have changed, so get the new capabilities */ -- 2.39.1.1392.g63e6d408230