masqmail-0.2
changeset 28:71605f542ecc
flattened conditional nesting
author | meillo@marmaro.de |
---|---|
date | Thu, 06 May 2010 11:52:34 +0200 |
parents | 3654c502a4df |
children | 7cdd30429cc9 |
files | src/conf.c |
diffstat | 1 files changed, 413 insertions(+), 407 deletions(-) [+] |
line diff
1.1 --- a/src/conf.c Thu May 06 11:50:40 2010 +0200 1.2 +++ b/src/conf.c Thu May 06 11:52:34 2010 +0200 1.3 @@ -88,22 +88,22 @@ 1.4 GList *list = NULL; 1.5 FILE *fptr; 1.6 1.7 - if ((fptr = fopen(fname, "rt"))) { 1.8 - gchar buf[256]; 1.9 - 1.10 - while (!feof(fptr)) { 1.11 - fgets(buf, 255, fptr); 1.12 - if (buf[0] && (buf[0] != '#') && (buf[0] != '\n')) { 1.13 - g_strchomp(buf); 1.14 - list = g_list_append(list, g_strdup(buf)); 1.15 - } 1.16 - } 1.17 - fclose(fptr); 1.18 - } else { 1.19 + if ((fptr = fopen(fname, "rt")) == NULL) { 1.20 logwrite(LOG_ALERT, "could not open %s for reading: %s\n", fname, strerror(errno)); 1.21 exit(EXIT_FAILURE); 1.22 } 1.23 1.24 + gchar buf[256]; 1.25 + 1.26 + while (!feof(fptr)) { 1.27 + fgets(buf, 255, fptr); 1.28 + if (buf[0] && (buf[0] != '#') && (buf[0] != '\n')) { 1.29 + g_strchomp(buf); 1.30 + list = g_list_append(list, g_strdup(buf)); 1.31 + } 1.32 + } 1.33 + fclose(fptr); 1.34 + 1.35 return list; 1.36 } 1.37 1.38 @@ -167,25 +167,27 @@ 1.39 GList *res_list = NULL; 1.40 1.41 list = parse_list(line, FALSE); 1.42 - if (list) { 1.43 - foreach(list, list_node) { 1.44 - gchar *item = (gchar *) (list_node->data); 1.45 - if (strcmp(item, "byname") == 0) { 1.46 - res_list = g_list_append(res_list, resolve_byname); 1.47 + if (!list) { 1.48 + return NULL; 1.49 + } 1.50 + 1.51 + foreach(list, list_node) { 1.52 + gchar *item = (gchar *) (list_node->data); 1.53 + if (strcmp(item, "byname") == 0) { 1.54 + res_list = g_list_append(res_list, resolve_byname); 1.55 #ifdef ENABLE_RESOLVER 1.56 - } else if (strcmp(item, "dns_a") == 0) { 1.57 - res_list = g_list_append(res_list, resolve_dns_a); 1.58 - } else if (strcmp(item, "dns_mx") == 0) { 1.59 - res_list = g_list_append(res_list, resolve_dns_mx); 1.60 + } else if (strcmp(item, "dns_a") == 0) { 1.61 + res_list = g_list_append(res_list, resolve_dns_a); 1.62 + } else if (strcmp(item, "dns_mx") == 0) { 1.63 + res_list = g_list_append(res_list, resolve_dns_mx); 1.64 #endif 1.65 - } else { 1.66 - logwrite(LOG_ALERT, "unknown resolver %s\n", item); 1.67 - exit(EXIT_FAILURE); 1.68 - } 1.69 - g_free(item); 1.70 + } else { 1.71 + logwrite(LOG_ALERT, "unknown resolver %s\n", item); 1.72 + exit(EXIT_FAILURE); 1.73 } 1.74 - g_list_free(list); 1.75 + g_free(item); 1.76 } 1.77 + g_list_free(list); 1.78 return res_list; 1.79 } 1.80 1.81 @@ -233,27 +235,27 @@ 1.82 *(q++) = *(p++); 1.83 *q = '\0'; 1.84 1.85 - if ((addr.s_addr = inet_addr(buf)) != INADDR_NONE) { 1.86 - if (*p) { 1.87 - guint i; 1.88 - p++; 1.89 - i = atoi(p); 1.90 - if ((i >= 0) && (i <= 32)) 1.91 - n = i ? ~((1 << (32 - i)) - 1) : 0; 1.92 - else { 1.93 - fprintf(stderr, "'%d' is not a valid net mask (must be >= 0 and <= 32)\n", i); 1.94 - exit(EXIT_FAILURE); 1.95 - } 1.96 - } else 1.97 - n = 0; 1.98 - 1.99 - mask_addr.s_addr = htonl(n); 1.100 - net_addr.s_addr = mask_addr.s_addr & addr.s_addr; 1.101 - } else { 1.102 + if ((addr.s_addr = inet_addr(buf)) == INADDR_NONE) { 1.103 fprintf(stderr, "'%s' is not a valid address (must be ip)\n", buf); 1.104 exit(EXIT_FAILURE); 1.105 } 1.106 1.107 + if (*p) { 1.108 + guint i; 1.109 + p++; 1.110 + i = atoi(p); 1.111 + if ((i >= 0) && (i <= 32)) 1.112 + n = i ? ~((1 << (32 - i)) - 1) : 0; 1.113 + else { 1.114 + fprintf(stderr, "'%d' is not a valid net mask (must be >= 0 and <= 32)\n", i); 1.115 + exit(EXIT_FAILURE); 1.116 + } 1.117 + } else 1.118 + n = 0; 1.119 + 1.120 + mask_addr.s_addr = htonl(n); 1.121 + net_addr.s_addr = mask_addr.s_addr & addr.s_addr; 1.122 + 1.123 p_net_addr = g_malloc(sizeof(struct in_addr)); 1.124 p_net_addr->s_addr = net_addr.s_addr; 1.125 return p_net_addr; 1.126 @@ -295,7 +297,9 @@ 1.127 { 1.128 gint c; 1.129 1.130 - for (c = fgetc(in); c != EOF && isspace(c); c = fgetc(in)); 1.131 + for (c = fgetc(in); c != EOF && isspace(c); c = fgetc(in)) { 1.132 + /* empty */ 1.133 + } 1.134 if (c == EOF) 1.135 return FALSE; 1.136 ungetc(c, in); 1.137 @@ -399,16 +403,18 @@ 1.138 1.139 DEBUG(6) fprintf(stderr, "read_statement() 1\n"); 1.140 1.141 - if (read_lval(in, lval, lsize)) { 1.142 - DEBUG(6) fprintf(stderr, "lval = %s\n", lval); 1.143 - if ((c = fgetc(in) == '=')) { 1.144 - if (read_rval(in, rval, rsize)) { 1.145 - DEBUG(6) fprintf(stderr, "rval = %s\n", rval); 1.146 - return TRUE; 1.147 - } 1.148 - } else { 1.149 - fprintf(stderr, "'=' expected after %s, char was '%c'\n", lval, c); 1.150 + if (!read_lval(in, lval, lsize)) { 1.151 + return FALSE; 1.152 + } 1.153 + 1.154 + DEBUG(6) fprintf(stderr, "lval = %s\n", lval); 1.155 + if ((c = fgetc(in) == '=')) { 1.156 + if (read_rval(in, rval, rsize)) { 1.157 + DEBUG(6) fprintf(stderr, "rval = %s\n", rval); 1.158 + return TRUE; 1.159 } 1.160 + } else { 1.161 + fprintf(stderr, "'=' expected after %s, char was '%c'\n", lval, c); 1.162 } 1.163 return FALSE; 1.164 } 1.165 @@ -424,176 +430,175 @@ 1.166 conf.alias_local_cmp = strcmp; 1.167 conf.max_defer_time = 86400 * 4; /* 4 days */ 1.168 1.169 - if ((in = fopen(filename, "r"))) { 1.170 - gchar lval[256], rval[2048]; 1.171 - while (read_statement(in, lval, 256, rval, 2048)) { 1.172 - if (strcmp(lval, "debug_level") == 0) 1.173 - conf.debug_level = atoi(rval); 1.174 - else if (strcmp(lval, "run_as_user") == 0) { 1.175 - if (!conf.run_as_user) /* you should not be able to reset that flag */ 1.176 - conf.run_as_user = parse_boolean(rval); 1.177 - } else if (strcmp(lval, "use_syslog") == 0) 1.178 - conf.use_syslog = parse_boolean(rval); 1.179 - else if (strcmp(lval, "mail_dir") == 0) 1.180 - conf.mail_dir = g_strdup(rval); 1.181 - else if (strcmp(lval, "lock_dir") == 0) 1.182 - conf.lock_dir = g_strdup(rval); 1.183 - else if (strcmp(lval, "spool_dir") == 0) 1.184 - conf.spool_dir = g_strdup(rval); 1.185 - else if (strcmp(lval, "log_dir") == 0) 1.186 - conf.log_dir = g_strdup(rval); 1.187 - else if (strcmp(lval, "host_name") == 0) { 1.188 - if (rval[0] != '/') 1.189 - conf.host_name = g_strdup(rval); 1.190 - else { 1.191 - char buf[256]; 1.192 - FILE *fptr = fopen(rval, "rt"); 1.193 - if (fptr) { 1.194 - fgets(buf, 255, fptr); 1.195 - g_strchomp(buf); 1.196 - conf.host_name = g_strdup(buf); 1.197 - fclose(fptr); 1.198 - } else { 1.199 - fprintf(stderr, "could not open %s: %s\n", rval, 1.200 - strerror(errno)); 1.201 - return FALSE; 1.202 - } 1.203 + if ((in = fopen(filename, "r")) == NULL) { 1.204 + fprintf(stderr, "could not open config file %s: %s\n", filename, strerror(errno)); 1.205 + return FALSE; 1.206 + } 1.207 + 1.208 + gchar lval[256], rval[2048]; 1.209 + while (read_statement(in, lval, 256, rval, 2048)) { 1.210 + if (strcmp(lval, "debug_level") == 0) 1.211 + conf.debug_level = atoi(rval); 1.212 + else if (strcmp(lval, "run_as_user") == 0) { 1.213 + if (!conf.run_as_user) /* you should not be able to reset that flag */ 1.214 + conf.run_as_user = parse_boolean(rval); 1.215 + } else if (strcmp(lval, "use_syslog") == 0) 1.216 + conf.use_syslog = parse_boolean(rval); 1.217 + else if (strcmp(lval, "mail_dir") == 0) 1.218 + conf.mail_dir = g_strdup(rval); 1.219 + else if (strcmp(lval, "lock_dir") == 0) 1.220 + conf.lock_dir = g_strdup(rval); 1.221 + else if (strcmp(lval, "spool_dir") == 0) 1.222 + conf.spool_dir = g_strdup(rval); 1.223 + else if (strcmp(lval, "log_dir") == 0) 1.224 + conf.log_dir = g_strdup(rval); 1.225 + else if (strcmp(lval, "host_name") == 0) { 1.226 + if (rval[0] != '/') 1.227 + conf.host_name = g_strdup(rval); 1.228 + else { 1.229 + char buf[256]; 1.230 + FILE *fptr = fopen(rval, "rt"); 1.231 + if (fptr) { 1.232 + fprintf(stderr, "could not open %s: %s\n", rval, strerror(errno)); 1.233 + return FALSE; 1.234 } 1.235 - } else if (strcmp(lval, "remote_port") == 0) { 1.236 - fprintf(stderr, "the remote_port option is now deprecated. Use 'mail_host' in the\n" 1.237 - "route configuration instead. See man masqmail.route\n"); 1.238 - conf.remote_port = atoi(rval); 1.239 - } else if (strcmp(lval, "local_hosts") == 0) 1.240 - conf.local_hosts = parse_list(rval, FALSE); 1.241 - else if (strcmp(lval, "local_addresses") == 0) 1.242 - conf.local_addresses = parse_list(rval, TRUE); 1.243 - else if (strcmp(lval, "not_local_addresses") == 0) 1.244 - conf.not_local_addresses = parse_list(rval, TRUE); 1.245 - else if (strcmp(lval, "local_nets") == 0) 1.246 - conf.local_nets = parse_list(rval, FALSE); 1.247 - else if (strcmp(lval, "do_save_envelope_to") == 0) 1.248 - conf.do_save_envelope_to = parse_boolean(rval); 1.249 - else if (strcmp(lval, "defer_all") == 0) 1.250 - conf.defer_all = parse_boolean(rval); 1.251 - else if (strcmp(lval, "do_relay") == 0) 1.252 - conf.do_relay = parse_boolean(rval); 1.253 - else if (strcmp(lval, "alias_file") == 0) { 1.254 - conf.alias_file = g_strdup(rval); 1.255 - } else if (strcmp(lval, "alias_local_caseless") == 0) { 1.256 - conf.alias_local_cmp = parse_boolean(rval) ? strcasecmp : strcmp; 1.257 - } else if (strcmp(lval, "mbox_default") == 0) { 1.258 - conf.mbox_default = g_strdup(rval); 1.259 - } else if (strcmp(lval, "mbox_users") == 0) { 1.260 - conf.mbox_users = parse_list(rval, TRUE); 1.261 - } else if (strcmp(lval, "mda_users") == 0) { 1.262 - conf.mda_users = parse_list(rval, TRUE); 1.263 - } else if (strcmp(lval, "maildir_users") == 0) { 1.264 - conf.maildir_users = parse_list(rval, TRUE); 1.265 - } else if (strcmp(lval, "mda") == 0) { 1.266 - conf.mda = g_strdup(rval); 1.267 - } else if (strcmp(lval, "mda_fromline") == 0) { 1.268 - conf.mda_fromline = parse_boolean(rval); 1.269 - } else if (strcmp(lval, "mda_fromhack") == 0) { 1.270 - conf.mda_fromhack = parse_boolean(rval); 1.271 - } else if (strcmp(lval, "pipe_fromline") == 0) { 1.272 - conf.pipe_fromline = parse_boolean(rval); 1.273 - } else if (strcmp(lval, "pipe_fromhack") == 0) { 1.274 - conf.pipe_fromhack = parse_boolean(rval); 1.275 - } else if (strcmp(lval, "listen_addresses") == 0) { 1.276 - GList *node; 1.277 - GList *tmp_list = parse_list(rval, FALSE); 1.278 + fgets(buf, 255, fptr); 1.279 + g_strchomp(buf); 1.280 + conf.host_name = g_strdup(buf); 1.281 + fclose(fptr); 1.282 + } 1.283 + } else if (strcmp(lval, "remote_port") == 0) { 1.284 + fprintf(stderr, "the remote_port option is now deprecated. Use 'mail_host' in the\n" 1.285 + "route configuration instead. See man masqmail.route\n"); 1.286 + conf.remote_port = atoi(rval); 1.287 + } else if (strcmp(lval, "local_hosts") == 0) 1.288 + conf.local_hosts = parse_list(rval, FALSE); 1.289 + else if (strcmp(lval, "local_addresses") == 0) 1.290 + conf.local_addresses = parse_list(rval, TRUE); 1.291 + else if (strcmp(lval, "not_local_addresses") == 0) 1.292 + conf.not_local_addresses = parse_list(rval, TRUE); 1.293 + else if (strcmp(lval, "local_nets") == 0) 1.294 + conf.local_nets = parse_list(rval, FALSE); 1.295 + else if (strcmp(lval, "do_save_envelope_to") == 0) 1.296 + conf.do_save_envelope_to = parse_boolean(rval); 1.297 + else if (strcmp(lval, "defer_all") == 0) 1.298 + conf.defer_all = parse_boolean(rval); 1.299 + else if (strcmp(lval, "do_relay") == 0) 1.300 + conf.do_relay = parse_boolean(rval); 1.301 + else if (strcmp(lval, "alias_file") == 0) { 1.302 + conf.alias_file = g_strdup(rval); 1.303 + } else if (strcmp(lval, "alias_local_caseless") == 0) { 1.304 + conf.alias_local_cmp = parse_boolean(rval) ? strcasecmp : strcmp; 1.305 + } else if (strcmp(lval, "mbox_default") == 0) { 1.306 + conf.mbox_default = g_strdup(rval); 1.307 + } else if (strcmp(lval, "mbox_users") == 0) { 1.308 + conf.mbox_users = parse_list(rval, TRUE); 1.309 + } else if (strcmp(lval, "mda_users") == 0) { 1.310 + conf.mda_users = parse_list(rval, TRUE); 1.311 + } else if (strcmp(lval, "maildir_users") == 0) { 1.312 + conf.maildir_users = parse_list(rval, TRUE); 1.313 + } else if (strcmp(lval, "mda") == 0) { 1.314 + conf.mda = g_strdup(rval); 1.315 + } else if (strcmp(lval, "mda_fromline") == 0) { 1.316 + conf.mda_fromline = parse_boolean(rval); 1.317 + } else if (strcmp(lval, "mda_fromhack") == 0) { 1.318 + conf.mda_fromhack = parse_boolean(rval); 1.319 + } else if (strcmp(lval, "pipe_fromline") == 0) { 1.320 + conf.pipe_fromline = parse_boolean(rval); 1.321 + } else if (strcmp(lval, "pipe_fromhack") == 0) { 1.322 + conf.pipe_fromhack = parse_boolean(rval); 1.323 + } else if (strcmp(lval, "listen_addresses") == 0) { 1.324 + GList *node; 1.325 + GList *tmp_list = parse_list(rval, FALSE); 1.326 1.327 - conf.listen_addresses = NULL; 1.328 - foreach(tmp_list, node) { 1.329 - conf.listen_addresses = g_list_append(conf.listen_addresses, parse_interface((gchar *) (node-> data), 25)); 1.330 - g_free(node->data); 1.331 - } 1.332 - g_list_free(tmp_list); 1.333 - } else if (strcmp(lval, "ident_trusted_nets") == 0) { 1.334 + conf.listen_addresses = NULL; 1.335 + foreach(tmp_list, node) { 1.336 + conf.listen_addresses = g_list_append(conf.listen_addresses, parse_interface((gchar *) (node-> data), 25)); 1.337 + g_free(node->data); 1.338 + } 1.339 + g_list_free(tmp_list); 1.340 + } else if (strcmp(lval, "ident_trusted_nets") == 0) { 1.341 #ifdef ENABLE_IDENT 1.342 - GList *node; 1.343 - GList *tmp_list = parse_list(rval, FALSE); 1.344 + GList *node; 1.345 + GList *tmp_list = parse_list(rval, FALSE); 1.346 1.347 - conf.ident_trusted_nets = NULL; 1.348 - foreach(tmp_list, node) { 1.349 - conf.ident_trusted_nets = g_list_append(conf.ident_trusted_nets, parse_network((gchar *) (node->data), 25)); 1.350 - g_free(node->data); 1.351 - } 1.352 - g_list_free(tmp_list); 1.353 + conf.ident_trusted_nets = NULL; 1.354 + foreach(tmp_list, node) { 1.355 + conf.ident_trusted_nets = g_list_append(conf.ident_trusted_nets, parse_network((gchar *) (node->data), 25)); 1.356 + g_free(node->data); 1.357 + } 1.358 + g_list_free(tmp_list); 1.359 #else 1.360 - fprintf(stderr, "%s ignored: not compiled with ident support\n", lval); 1.361 + fprintf(stderr, "%s ignored: not compiled with ident support\n", lval); 1.362 #endif 1.363 - } else if ((strncmp(lval, "connect_route.", 14) == 0) 1.364 - || (strncmp(lval, "online_routes.", 14) == 0)) { 1.365 - GList *file_list = parse_list(rval, FALSE); 1.366 - table_pair *pair = create_pair(&(lval[14]), file_list); 1.367 - conf.connect_routes = g_list_append(conf.connect_routes, pair); 1.368 - } else if (strcmp(lval, "local_net_route") == 0) { 1.369 - conf.local_net_routes = parse_list(rval, FALSE); 1.370 - } else if (strcmp(lval, "online_detect") == 0) 1.371 - conf.online_detect = g_strdup(rval); 1.372 - else if (strcmp(lval, "online_file") == 0) 1.373 - conf.online_file = g_strdup(rval); 1.374 - else if (strcmp(lval, "online_pipe") == 0) 1.375 - conf.online_pipe = g_strdup(rval); 1.376 - else if (strcmp(lval, "mserver_iface") == 0) 1.377 - conf.mserver_iface = parse_interface(rval, 224); 1.378 - else if (strcmp(lval, "do_queue") == 0) 1.379 - conf.do_queue = parse_boolean(rval); 1.380 - else if (strncmp(lval, "get.", 4) == 0) { 1.381 + } else if ((strncmp(lval, "connect_route.", 14) == 0) 1.382 + || (strncmp(lval, "online_routes.", 14) == 0)) { 1.383 + GList *file_list = parse_list(rval, FALSE); 1.384 + table_pair *pair = create_pair(&(lval[14]), file_list); 1.385 + conf.connect_routes = g_list_append(conf.connect_routes, pair); 1.386 + } else if (strcmp(lval, "local_net_route") == 0) { 1.387 + conf.local_net_routes = parse_list(rval, FALSE); 1.388 + } else if (strcmp(lval, "online_detect") == 0) 1.389 + conf.online_detect = g_strdup(rval); 1.390 + else if (strcmp(lval, "online_file") == 0) 1.391 + conf.online_file = g_strdup(rval); 1.392 + else if (strcmp(lval, "online_pipe") == 0) 1.393 + conf.online_pipe = g_strdup(rval); 1.394 + else if (strcmp(lval, "mserver_iface") == 0) 1.395 + conf.mserver_iface = parse_interface(rval, 224); 1.396 + else if (strcmp(lval, "do_queue") == 0) 1.397 + conf.do_queue = parse_boolean(rval); 1.398 + else if (strncmp(lval, "get.", 4) == 0) { 1.399 #ifdef ENABLE_POP3 1.400 - table_pair *pair = create_pair_string(&(lval[4]), rval); 1.401 - conf.get_names = g_list_append(conf.get_names, pair); 1.402 + table_pair *pair = create_pair_string(&(lval[4]), rval); 1.403 + conf.get_names = g_list_append(conf.get_names, pair); 1.404 #else 1.405 - fprintf(stderr, "get.<name> ignored: not compiled with pop support\n"); 1.406 + fprintf(stderr, "get.<name> ignored: not compiled with pop support\n"); 1.407 #endif 1.408 - } else if (strncmp(lval, "online_gets.", 12) == 0) { 1.409 + } else if (strncmp(lval, "online_gets.", 12) == 0) { 1.410 #ifdef ENABLE_POP3 1.411 - GList *file_list = parse_list(rval, FALSE); 1.412 - table_pair *pair = create_pair(&(lval[12]), file_list); 1.413 - conf.online_gets = g_list_append(conf.online_gets, pair); 1.414 + GList *file_list = parse_list(rval, FALSE); 1.415 + table_pair *pair = create_pair(&(lval[12]), file_list); 1.416 + conf.online_gets = g_list_append(conf.online_gets, pair); 1.417 #else 1.418 - fprintf(stderr, "online_gets.<name> ignored: not compiled with pop support\n"); 1.419 + fprintf(stderr, "online_gets.<name> ignored: not compiled with pop support\n"); 1.420 #endif 1.421 - } else if (strcmp(lval, "errmsg_file") == 0) 1.422 - conf.errmsg_file = g_strdup(rval); 1.423 - else if (strcmp(lval, "warnmsg_file") == 0) 1.424 - conf.warnmsg_file = g_strdup(rval); 1.425 - else if (strcmp(lval, "warn_intervals") == 0) 1.426 - conf.warn_intervals = parse_list(rval, FALSE); 1.427 - else if (strcmp(lval, "max_defer_time") == 0) { 1.428 - gint dummy; 1.429 - gint ival = time_interval(rval, &dummy); 1.430 - if (ival < 0) 1.431 - fprintf(stderr, "invalid time interval for 'max_defer_time': %s\n", rval); 1.432 - else 1.433 - conf.max_defer_time = ival; 1.434 - } else if (strcmp(lval, "log_user") == 0) 1.435 - conf.log_user = g_strdup(rval); 1.436 + } else if (strcmp(lval, "errmsg_file") == 0) 1.437 + conf.errmsg_file = g_strdup(rval); 1.438 + else if (strcmp(lval, "warnmsg_file") == 0) 1.439 + conf.warnmsg_file = g_strdup(rval); 1.440 + else if (strcmp(lval, "warn_intervals") == 0) 1.441 + conf.warn_intervals = parse_list(rval, FALSE); 1.442 + else if (strcmp(lval, "max_defer_time") == 0) { 1.443 + gint dummy; 1.444 + gint ival = time_interval(rval, &dummy); 1.445 + if (ival < 0) 1.446 + fprintf(stderr, "invalid time interval for 'max_defer_time': %s\n", rval); 1.447 + else 1.448 + conf.max_defer_time = ival; 1.449 + } else if (strcmp(lval, "log_user") == 0) 1.450 + conf.log_user = g_strdup(rval); 1.451 1.452 - else 1.453 - fprintf(stderr, "var '%s' not (yet) known, ignored\n", lval); 1.454 - } 1.455 - fclose(in); 1.456 + else 1.457 + fprintf(stderr, "var '%s' not (yet) known, ignored\n", lval); 1.458 + } 1.459 + fclose(in); 1.460 1.461 - if (conf.errmsg_file == NULL) 1.462 - conf.errmsg_file = g_strdup(DATA_DIR "/tpl/failmsg.tpl"); 1.463 - if (conf.warnmsg_file == NULL) 1.464 - conf.warnmsg_file = g_strdup(DATA_DIR "/tpl/warnmsg.tpl"); 1.465 + if (conf.errmsg_file == NULL) 1.466 + conf.errmsg_file = g_strdup(DATA_DIR "/tpl/failmsg.tpl"); 1.467 + if (conf.warnmsg_file == NULL) 1.468 + conf.warnmsg_file = g_strdup(DATA_DIR "/tpl/warnmsg.tpl"); 1.469 1.470 - if (conf.lock_dir == NULL) 1.471 - conf.lock_dir = g_strdup_printf("%s/lock/", conf.spool_dir); 1.472 + if (conf.lock_dir == NULL) 1.473 + conf.lock_dir = g_strdup_printf("%s/lock/", conf.spool_dir); 1.474 1.475 - if (conf.mbox_default == NULL) 1.476 - conf.mbox_default = g_strdup("mbox"); 1.477 + if (conf.mbox_default == NULL) 1.478 + conf.mbox_default = g_strdup("mbox"); 1.479 1.480 - if (conf.warn_intervals == NULL) 1.481 - conf.warn_intervals = parse_list("1h;4h;8h;1d;2d;3d", FALSE); 1.482 + if (conf.warn_intervals == NULL) 1.483 + conf.warn_intervals = parse_list("1h;4h;8h;1d;2d;3d", FALSE); 1.484 1.485 - return TRUE; 1.486 - } else 1.487 - fprintf(stderr, "could not open config file %s: %s\n", filename, strerror(errno)); 1.488 - return FALSE; 1.489 + return TRUE; 1.490 } 1.491 1.492 connect_route* 1.493 @@ -617,160 +622,160 @@ 1.494 1.495 route->do_pipelining = TRUE; 1.496 1.497 - if ((in = fopen(route->filename, "r"))) { 1.498 - gchar lval[256], rval[2048]; 1.499 - while (read_statement(in, lval, 256, rval, 2048)) { 1.500 - if (strcmp(lval, "protocol") == 0) 1.501 - route->protocol = g_strdup(rval); 1.502 - else if (strcmp(lval, "mail_host") == 0) 1.503 - route->mail_host = parse_interface(rval, conf.remote_port); 1.504 - else if (strcmp(lval, "helo_name") == 0) 1.505 - route->helo_name = g_strdup(rval); 1.506 - else if (strcmp(lval, "wrapper") == 0) 1.507 - route->wrapper = g_strdup(rval); 1.508 - else if (strcmp(lval, "connect_error_fail") == 0) 1.509 - route->connect_error_fail = parse_boolean(rval); 1.510 - else if (strcmp(lval, "do_correct_helo") == 0) 1.511 - route->do_correct_helo = parse_boolean(rval); 1.512 - else if (strcmp(lval, "do_pipelining") == 0) 1.513 - route->do_pipelining = parse_boolean(rval); 1.514 - else if (strcmp(lval, "allowed_return_paths") == 0) 1.515 - route->allowed_return_paths = parse_address_list(rval, TRUE); 1.516 - else if (strcmp(lval, "allowed_mail_locals") == 0) 1.517 - route->allowed_mail_locals = parse_list(rval, TRUE); 1.518 - else if (strcmp(lval, "not_allowed_return_paths") == 0) 1.519 - route->not_allowed_return_paths = parse_address_list(rval, TRUE); 1.520 - else if (strcmp(lval, "not_allowed_mail_locals") == 0) 1.521 - route->not_allowed_mail_locals = parse_list(rval, TRUE); 1.522 - else if (strcmp(lval, "allowed_rcpt_domains") == 0) 1.523 - route->allowed_rcpt_domains = parse_list(rval, TRUE); 1.524 - else if (strcmp(lval, "not_allowed_rcpt_domains") == 0) 1.525 - route->not_allowed_rcpt_domains = parse_list(rval, TRUE); 1.526 - else if (strcmp(lval, "set_h_from_domain") == 0) 1.527 - route->set_h_from_domain = g_strdup(rval); 1.528 - else if (strcmp(lval, "set_h_reply_to_domain") == 0) 1.529 - route->set_h_reply_to_domain = g_strdup(rval); 1.530 - else if (strcmp(lval, "set_return_path_domain") == 0) 1.531 - route->set_return_path_domain = g_strdup(rval); 1.532 - else if (strcmp(lval, "map_return_path_addresses") == 0) { 1.533 - GList *node, *list; 1.534 + if ((in = fopen(route->filename, "r")) == NULL) { 1.535 + logwrite(LOG_ALERT, "could not open route file %s: %s\n", route->filename, strerror(errno)); 1.536 + g_free(route); 1.537 + return NULL; 1.538 + } 1.539 1.540 - list = parse_list(rval, TRUE); 1.541 - foreach(list, node) { 1.542 - gchar *item = (gchar *) (node->data); 1.543 - table_pair *pair = parse_table_pair(item, ':'); 1.544 - address *addr = create_address((gchar *) (pair->value), TRUE); 1.545 - g_free(pair->value); 1.546 - pair->value = (gpointer *) addr; 1.547 - route->map_return_path_addresses = g_list_append(route->map_return_path_addresses, pair); 1.548 - g_free(item); 1.549 - } 1.550 - g_list_free(list); 1.551 - } else if (strcmp(lval, "map_h_from_addresses") == 0) { 1.552 - GList *list, *node; 1.553 + gchar lval[256], rval[2048]; 1.554 + while (read_statement(in, lval, 256, rval, 2048)) { 1.555 + if (strcmp(lval, "protocol") == 0) 1.556 + route->protocol = g_strdup(rval); 1.557 + else if (strcmp(lval, "mail_host") == 0) 1.558 + route->mail_host = parse_interface(rval, conf.remote_port); 1.559 + else if (strcmp(lval, "helo_name") == 0) 1.560 + route->helo_name = g_strdup(rval); 1.561 + else if (strcmp(lval, "wrapper") == 0) 1.562 + route->wrapper = g_strdup(rval); 1.563 + else if (strcmp(lval, "connect_error_fail") == 0) 1.564 + route->connect_error_fail = parse_boolean(rval); 1.565 + else if (strcmp(lval, "do_correct_helo") == 0) 1.566 + route->do_correct_helo = parse_boolean(rval); 1.567 + else if (strcmp(lval, "do_pipelining") == 0) 1.568 + route->do_pipelining = parse_boolean(rval); 1.569 + else if (strcmp(lval, "allowed_return_paths") == 0) 1.570 + route->allowed_return_paths = parse_address_list(rval, TRUE); 1.571 + else if (strcmp(lval, "allowed_mail_locals") == 0) 1.572 + route->allowed_mail_locals = parse_list(rval, TRUE); 1.573 + else if (strcmp(lval, "not_allowed_return_paths") == 0) 1.574 + route->not_allowed_return_paths = parse_address_list(rval, TRUE); 1.575 + else if (strcmp(lval, "not_allowed_mail_locals") == 0) 1.576 + route->not_allowed_mail_locals = parse_list(rval, TRUE); 1.577 + else if (strcmp(lval, "allowed_rcpt_domains") == 0) 1.578 + route->allowed_rcpt_domains = parse_list(rval, TRUE); 1.579 + else if (strcmp(lval, "not_allowed_rcpt_domains") == 0) 1.580 + route->not_allowed_rcpt_domains = parse_list(rval, TRUE); 1.581 + else if (strcmp(lval, "set_h_from_domain") == 0) 1.582 + route->set_h_from_domain = g_strdup(rval); 1.583 + else if (strcmp(lval, "set_h_reply_to_domain") == 0) 1.584 + route->set_h_reply_to_domain = g_strdup(rval); 1.585 + else if (strcmp(lval, "set_return_path_domain") == 0) 1.586 + route->set_return_path_domain = g_strdup(rval); 1.587 + else if (strcmp(lval, "map_return_path_addresses") == 0) { 1.588 + GList *node, *list; 1.589 1.590 - list = parse_list(rval, TRUE); 1.591 - foreach(list, node) { 1.592 - gchar *item = (gchar *) (node->data); 1.593 - table_pair *pair = parse_table_pair(item, ':'); 1.594 - route->map_h_from_addresses = g_list_append(route->map_h_from_addresses, pair); 1.595 - g_free(item); 1.596 - } 1.597 - g_list_free(list); 1.598 - } else if (strcmp(lval, "map_h_reply_to_addresses") == 0) { 1.599 - GList *list, *node; 1.600 + list = parse_list(rval, TRUE); 1.601 + foreach(list, node) { 1.602 + gchar *item = (gchar *) (node->data); 1.603 + table_pair *pair = parse_table_pair(item, ':'); 1.604 + address *addr = create_address((gchar *) (pair->value), TRUE); 1.605 + g_free(pair->value); 1.606 + pair->value = (gpointer *) addr; 1.607 + route->map_return_path_addresses = g_list_append(route->map_return_path_addresses, pair); 1.608 + g_free(item); 1.609 + } 1.610 + g_list_free(list); 1.611 + } else if (strcmp(lval, "map_h_from_addresses") == 0) { 1.612 + GList *list, *node; 1.613 1.614 - list = parse_list(rval, TRUE); 1.615 - foreach(list, node) { 1.616 - gchar *item = (gchar *) (node->data); 1.617 - table_pair *pair = parse_table_pair(item, ':'); 1.618 - route->map_h_reply_to_addresses = g_list_append(route->map_h_reply_to_addresses, pair); 1.619 - g_free(item); 1.620 - } 1.621 - g_list_free(list); 1.622 - } else if (strcmp(lval, "map_h_mail_followup_to_addresses") == 0) { 1.623 - GList *list, *node; 1.624 + list = parse_list(rval, TRUE); 1.625 + foreach(list, node) { 1.626 + gchar *item = (gchar *) (node->data); 1.627 + table_pair *pair = parse_table_pair(item, ':'); 1.628 + route->map_h_from_addresses = g_list_append(route->map_h_from_addresses, pair); 1.629 + g_free(item); 1.630 + } 1.631 + g_list_free(list); 1.632 + } else if (strcmp(lval, "map_h_reply_to_addresses") == 0) { 1.633 + GList *list, *node; 1.634 1.635 - list = parse_list(rval, TRUE); 1.636 - foreach(list, node) { 1.637 - gchar *item = (gchar *) (node->data); 1.638 - table_pair *pair = parse_table_pair(item, ':'); 1.639 - route->map_h_mail_followup_to_addresses = g_list_append(route->map_h_mail_followup_to_addresses, pair); 1.640 - g_free(item); 1.641 - } 1.642 - g_list_free(list); 1.643 - } else if (strcmp(lval, "expand_h_sender_domain") == 0) { 1.644 - route->expand_h_sender_domain = parse_boolean(rval); 1.645 - } else if (strcmp(lval, "expand_h_sender_address") == 0) { 1.646 - route->expand_h_sender_address = parse_boolean(rval); 1.647 - } else if (strcmp(lval, "resolve_list") == 0) 1.648 - route->resolve_list = parse_resolve_list(rval); 1.649 - else if (strcmp(lval, "do_ssl") == 0) { 1.650 - /* we ignore this. This option is used by sqilconf */ 1.651 - ; 1.652 + list = parse_list(rval, TRUE); 1.653 + foreach(list, node) { 1.654 + gchar *item = (gchar *) (node->data); 1.655 + table_pair *pair = parse_table_pair(item, ':'); 1.656 + route->map_h_reply_to_addresses = g_list_append(route->map_h_reply_to_addresses, pair); 1.657 + g_free(item); 1.658 } 1.659 + g_list_free(list); 1.660 + } else if (strcmp(lval, "map_h_mail_followup_to_addresses") == 0) { 1.661 + GList *list, *node; 1.662 + 1.663 + list = parse_list(rval, TRUE); 1.664 + foreach(list, node) { 1.665 + gchar *item = (gchar *) (node->data); 1.666 + table_pair *pair = parse_table_pair(item, ':'); 1.667 + route->map_h_mail_followup_to_addresses = g_list_append(route->map_h_mail_followup_to_addresses, pair); 1.668 + g_free(item); 1.669 + } 1.670 + g_list_free(list); 1.671 + } else if (strcmp(lval, "expand_h_sender_domain") == 0) { 1.672 + route->expand_h_sender_domain = parse_boolean(rval); 1.673 + } else if (strcmp(lval, "expand_h_sender_address") == 0) { 1.674 + route->expand_h_sender_address = parse_boolean(rval); 1.675 + } else if (strcmp(lval, "resolve_list") == 0) 1.676 + route->resolve_list = parse_resolve_list(rval); 1.677 + else if (strcmp(lval, "do_ssl") == 0) { 1.678 + /* we ignore this. This option is used by sqilconf */ 1.679 + ; 1.680 + } 1.681 #ifdef ENABLE_AUTH 1.682 - else if (strcmp(lval, "auth_name") == 0) { 1.683 - route->auth_name = g_strdup(rval); 1.684 - } else if (strcmp(lval, "auth_login") == 0) { 1.685 - route->auth_login = g_strdup(rval); 1.686 - } else if (strcmp(lval, "auth_secret") == 0) { 1.687 - route->auth_secret = g_strdup(rval); 1.688 - } 1.689 + else if (strcmp(lval, "auth_name") == 0) { 1.690 + route->auth_name = g_strdup(rval); 1.691 + } else if (strcmp(lval, "auth_login") == 0) { 1.692 + route->auth_login = g_strdup(rval); 1.693 + } else if (strcmp(lval, "auth_secret") == 0) { 1.694 + route->auth_secret = g_strdup(rval); 1.695 + } 1.696 #else 1.697 - else if ((strcmp(lval, "auth_name") == 0) 1.698 - || (strcmp(lval, "auth_login") == 0) 1.699 - || (strcmp(lval, "auth_secret") == 0)) { 1.700 - logwrite(LOG_WARNING, "%s ignored: not compiled with auth support.\n", lval); 1.701 - } 1.702 + else if ((strcmp(lval, "auth_name") == 0) 1.703 + || (strcmp(lval, "auth_login") == 0) 1.704 + || (strcmp(lval, "auth_secret") == 0)) { 1.705 + logwrite(LOG_WARNING, "%s ignored: not compiled with auth support.\n", lval); 1.706 + } 1.707 #endif 1.708 - else if (strcmp(lval, "pop3_login") == 0) { 1.709 + else if (strcmp(lval, "pop3_login") == 0) { 1.710 #ifdef ENABLE_POP3 1.711 - route->pop3_login = g_strdup(rval); 1.712 + route->pop3_login = g_strdup(rval); 1.713 #else 1.714 - logwrite(LOG_WARNING, "pop3_login ignored: not compiled with pop support.\n"); 1.715 + logwrite(LOG_WARNING, "pop3_login ignored: not compiled with pop support.\n"); 1.716 #endif 1.717 - } else if (strcmp(lval, "pipe") == 0) { 1.718 - route->pipe = g_strdup(rval); 1.719 - } else if (strcmp(lval, "pipe_fromline") == 0) { 1.720 - route->pipe_fromline = parse_boolean(rval); 1.721 - } else if (strcmp(lval, "pipe_fromhack") == 0) { 1.722 - route->pipe_fromhack = parse_boolean(rval); 1.723 - } else if (strcmp(lval, "last_route") == 0) { 1.724 - route->last_route = parse_boolean(rval); 1.725 - } else 1.726 - logwrite(LOG_WARNING, "var '%s' not (yet) known, ignored\n", lval); 1.727 + } else if (strcmp(lval, "pipe") == 0) { 1.728 + route->pipe = g_strdup(rval); 1.729 + } else if (strcmp(lval, "pipe_fromline") == 0) { 1.730 + route->pipe_fromline = parse_boolean(rval); 1.731 + } else if (strcmp(lval, "pipe_fromhack") == 0) { 1.732 + route->pipe_fromhack = parse_boolean(rval); 1.733 + } else if (strcmp(lval, "last_route") == 0) { 1.734 + route->last_route = parse_boolean(rval); 1.735 + } else 1.736 + logwrite(LOG_WARNING, "var '%s' not (yet) known, ignored\n", lval); 1.737 + } 1.738 + 1.739 + if (route->resolve_list == NULL) { 1.740 + if (is_local_net) { 1.741 + route->resolve_list = g_list_append(NULL, resolve_byname); 1.742 + } else { 1.743 +#ifdef ENABLE_RESOLVER 1.744 + route->resolve_list = g_list_append(route->resolve_list, resolve_dns_mx); 1.745 + route->resolve_list = g_list_append(route->resolve_list, resolve_dns_a); 1.746 +#endif 1.747 + route->resolve_list = g_list_append(route->resolve_list, resolve_byname); 1.748 } 1.749 + } 1.750 + fclose(in); 1.751 + ok = TRUE; 1.752 1.753 - if (route->resolve_list == NULL) { 1.754 - if (is_local_net) { 1.755 - route->resolve_list = g_list_append(NULL, resolve_byname); 1.756 - } else { 1.757 -#ifdef ENABLE_RESOLVER 1.758 - route->resolve_list = g_list_append(route->resolve_list, resolve_dns_mx); 1.759 - route->resolve_list = g_list_append(route->resolve_list, resolve_dns_a); 1.760 -#endif 1.761 - route->resolve_list = g_list_append(route->resolve_list, resolve_byname); 1.762 - } 1.763 - } 1.764 - fclose(in); 1.765 - ok = TRUE; 1.766 - 1.767 - /* warn user about misconfigurations: */ 1.768 - if ((route->map_h_from_addresses != NULL) 1.769 - && (route->set_h_from_domain != NULL)) { 1.770 - logwrite(LOG_WARNING, "'map_h_from_addresses' overrides 'set_h_from_domain'\n"); 1.771 - g_free(route->set_h_from_domain); 1.772 - route->set_h_from_domain = NULL; 1.773 - } 1.774 - if ((route->map_h_reply_to_addresses != NULL) 1.775 - && (route->set_h_reply_to_domain != NULL)) { 1.776 - logwrite(LOG_WARNING, "'map_h_reply_to_addresses' overrides 'set_h_reply_to_domain'\n"); 1.777 - g_free(route->set_h_reply_to_domain); 1.778 - route->set_h_reply_to_domain = NULL; 1.779 - } 1.780 - } else { 1.781 - logwrite(LOG_ALERT, "could not open route file %s: %s\n", route->filename, strerror(errno)); 1.782 + /* warn user about misconfigurations: */ 1.783 + if ((route->map_h_from_addresses != NULL) && (route->set_h_from_domain != NULL)) { 1.784 + logwrite(LOG_WARNING, "'map_h_from_addresses' overrides 'set_h_from_domain'\n"); 1.785 + g_free(route->set_h_from_domain); 1.786 + route->set_h_from_domain = NULL; 1.787 + } 1.788 + if ((route->map_h_reply_to_addresses != NULL) && (route->set_h_reply_to_domain != NULL)) { 1.789 + logwrite(LOG_WARNING, "'map_h_reply_to_addresses' overrides 'set_h_reply_to_domain'\n"); 1.790 + g_free(route->set_h_reply_to_domain); 1.791 + route->set_h_reply_to_domain = NULL; 1.792 } 1.793 1.794 if (!ok) { 1.795 @@ -890,62 +895,62 @@ 1.796 1.797 gc->server_port = 110; 1.798 1.799 - if ((in = fopen(filename, "r"))) { 1.800 - gchar lval[256], rval[2048]; 1.801 - while (read_statement(in, lval, 256, rval, 2048)) { 1.802 - if (strcmp(lval, "protocol") == 0) 1.803 - gc->protocol = g_strdup(rval); 1.804 - else if (strcmp(lval, "server") == 0) 1.805 - gc->server_name = g_strdup(rval); 1.806 - else if (strcmp(lval, "port") == 0) 1.807 - gc->server_port = atoi(rval); 1.808 - else if (strcmp(lval, "wrapper") == 0) 1.809 - gc->wrapper = g_strdup(rval); 1.810 - else if (strcmp(lval, "user") == 0) 1.811 - gc->login_user = g_strdup(rval); 1.812 - else if (strcmp(lval, "pass") == 0) 1.813 - gc->login_pass = g_strdup(rval); 1.814 - else if (strcmp(lval, "address") == 0) 1.815 - gc->address = create_address_qualified(rval, TRUE, conf.host_name); 1.816 - else if (strcmp(lval, "return_path") == 0) 1.817 - gc->return_path = create_address_qualified(rval, TRUE, conf.host_name); 1.818 - else if (strcmp(lval, "do_ssl") == 0) 1.819 - /* we ignore this. This option is used by sqilconf */ 1.820 - ; 1.821 - else if (strcmp(lval, "do_keep") == 0) 1.822 - gc->do_keep = parse_boolean(rval); 1.823 - else if (strcmp(lval, "do_uidl") == 0) 1.824 - gc->do_uidl = parse_boolean(rval); 1.825 - else if (strcmp(lval, "do_uidl_dele") == 0) 1.826 - gc->do_uidl_dele = parse_boolean(rval); 1.827 - else if (strcmp(lval, "max_size") == 0) 1.828 - gc->max_size = atoi(rval); 1.829 - else if (strcmp(lval, "max_size_delete") == 0) 1.830 - gc->max_size = parse_boolean(rval); 1.831 - else if (strcmp(lval, "max_count") == 0) 1.832 - gc->max_count = atoi(rval); 1.833 - else if (strcmp(lval, "resolve_list") == 0) 1.834 - gc->resolve_list = parse_resolve_list(rval); 1.835 - else 1.836 - logwrite(LOG_WARNING, "var '%s' not (yet) known, ignored\n", lval); 1.837 - } 1.838 - fclose(in); 1.839 + if ((in = fopen(filename, "r")) == NULL) { 1.840 + logwrite(LOG_ALERT, "could not open get file %s: %s\n", filename, strerror(errno)); 1.841 + g_free(gc); 1.842 + return NULL; 1.843 + } 1.844 1.845 - if (gc->resolve_list == NULL) { 1.846 + gchar lval[256], rval[2048]; 1.847 + while (read_statement(in, lval, 256, rval, 2048)) { 1.848 + if (strcmp(lval, "protocol") == 0) 1.849 + gc->protocol = g_strdup(rval); 1.850 + else if (strcmp(lval, "server") == 0) 1.851 + gc->server_name = g_strdup(rval); 1.852 + else if (strcmp(lval, "port") == 0) 1.853 + gc->server_port = atoi(rval); 1.854 + else if (strcmp(lval, "wrapper") == 0) 1.855 + gc->wrapper = g_strdup(rval); 1.856 + else if (strcmp(lval, "user") == 0) 1.857 + gc->login_user = g_strdup(rval); 1.858 + else if (strcmp(lval, "pass") == 0) 1.859 + gc->login_pass = g_strdup(rval); 1.860 + else if (strcmp(lval, "address") == 0) 1.861 + gc->address = create_address_qualified(rval, TRUE, conf.host_name); 1.862 + else if (strcmp(lval, "return_path") == 0) 1.863 + gc->return_path = create_address_qualified(rval, TRUE, conf.host_name); 1.864 + else if (strcmp(lval, "do_ssl") == 0) 1.865 + /* we ignore this. This option is used by sqilconf */ 1.866 + ; 1.867 + else if (strcmp(lval, "do_keep") == 0) 1.868 + gc->do_keep = parse_boolean(rval); 1.869 + else if (strcmp(lval, "do_uidl") == 0) 1.870 + gc->do_uidl = parse_boolean(rval); 1.871 + else if (strcmp(lval, "do_uidl_dele") == 0) 1.872 + gc->do_uidl_dele = parse_boolean(rval); 1.873 + else if (strcmp(lval, "max_size") == 0) 1.874 + gc->max_size = atoi(rval); 1.875 + else if (strcmp(lval, "max_size_delete") == 0) 1.876 + gc->max_size = parse_boolean(rval); 1.877 + else if (strcmp(lval, "max_count") == 0) 1.878 + gc->max_count = atoi(rval); 1.879 + else if (strcmp(lval, "resolve_list") == 0) 1.880 + gc->resolve_list = parse_resolve_list(rval); 1.881 + else 1.882 + logwrite(LOG_WARNING, "var '%s' not (yet) known, ignored\n", lval); 1.883 + } 1.884 + fclose(in); 1.885 + 1.886 + if (gc->resolve_list == NULL) { 1.887 #ifdef ENABLE_RESOLVER 1.888 - gc->resolve_list = g_list_append(NULL, resolve_dns_a); 1.889 + gc->resolve_list = g_list_append(NULL, resolve_dns_a); 1.890 #endif 1.891 - gc->resolve_list = g_list_append(NULL, resolve_byname); 1.892 - } 1.893 + gc->resolve_list = g_list_append(NULL, resolve_byname); 1.894 + } 1.895 1.896 - if (gc->protocol == NULL) 1.897 - gc->protocol = g_strdup("pop3"); 1.898 - return gc; 1.899 - } 1.900 - logwrite(LOG_ALERT, "could not open get file %s: %s\n", filename, strerror(errno)); 1.901 - 1.902 - g_free(gc); 1.903 - return NULL; 1.904 + if (gc->protocol == NULL) 1.905 + gc->protocol = g_strdup("pop3"); 1.906 + return gc; 1.907 } 1.908 1.909 void 1.910 @@ -978,14 +983,15 @@ 1.911 connect_route *route; 1.912 1.913 route = g_malloc(sizeof(connect_route)); 1.914 - if (route) { 1.915 - memset(route, 0, sizeof(connect_route)); 1.916 - route->protocol = g_strdup("smtp"); 1.917 - route->is_local_net = TRUE; 1.918 - route->name = g_strdup("local_net (default)"); 1.919 - route->expand_h_sender_address = TRUE; 1.920 - route->resolve_list = g_list_append(NULL, resolve_byname); 1.921 - route->connect_error_fail = TRUE; 1.922 + if (!route) { 1.923 + return NULL; 1.924 } 1.925 + memset(route, 0, sizeof(connect_route)); 1.926 + route->protocol = g_strdup("smtp"); 1.927 + route->is_local_net = TRUE; 1.928 + route->name = g_strdup("local_net (default)"); 1.929 + route->expand_h_sender_address = TRUE; 1.930 + route->resolve_list = g_list_append(NULL, resolve_byname); 1.931 + route->connect_error_fail = TRUE; 1.932 return route; 1.933 }