void client_auth_respond(struct client *client, const char *response)
{
- client->auth_waiting = FALSE;
+ client->auth_client_continue_pending = FALSE;
client_set_auth_waiting(client);
auth_client_request_continue(client->auth_request, response);
if (!client_does_custom_io(client))
str_truncate(client->auth_response, 0);
i_assert(client->io == NULL);
- client->auth_waiting = TRUE;
+ client->auth_client_continue_pending = TRUE;
if (!client_does_custom_io(client)) {
client->io = io_add_istream(client->input,
client_auth_input, client);
client->ssl_iostream == NULL)
return "(cert required, client didn't start TLS)";
- if (client->auth_waiting && client->auth_attempts == 1) {
+ if (client->auth_client_continue_pending && client->auth_attempts == 1) {
return t_strdup_printf("(client didn't finish SASL auth, "
"waited %u secs)", auth_secs);
}
bool ssl_servername_settings_read:1;
bool banner_sent:1;
bool authenticating:1;
+ /* SASL authentication is waiting for client to send a continuation */
+ bool auth_client_continue_pending:1;
bool auth_try_aborted:1;
bool auth_initializing:1;
bool auth_process_comm_fail:1;
bool proxy_nopipelining:1;
bool proxy_not_trusted:1;
bool proxy_redirect_reauth:1;
- bool auth_waiting:1;
bool notified_auth_ready:1;
bool notified_disconnect:1;
bool fd_proxying:1;
i_assert(status < 0);
return;
}
- client->auth_waiting = FALSE;
+ client->auth_client_continue_pending = FALSE;
i_assert(client->auth_request == request);
switch (status) {