X-Git-Url: http://pileus.org/git/?a=blobdiff_plain;f=options.c;h=d53044fc72c4215ee3e975092acde6fb7819a142;hb=da989f7b8294e342572ec5f27f1a6f3f2b1fe56f;hp=066a8ab0df02d37f032d7f0cf58a15e2b7166e98;hpb=c1cf83738a260121cf7dcc007af8709d0bc15419;p=~andy%2Ffetchmail diff --git a/options.c b/options.c index 066a8ab0..d53044fc 100644 --- a/options.c +++ b/options.c @@ -45,6 +45,7 @@ enum { LA_SSLCERT, LA_SSLPROTO, LA_SSLCERTCK, + LA_SSLCERTFILE, LA_SSLCERTPATH, LA_SSLCOMMONNAME, LA_SSLFINGERPRINT, @@ -131,6 +132,7 @@ static const struct option longoptions[] = { {"sslcert", required_argument, (int *) 0, LA_SSLCERT }, {"sslproto", required_argument, (int *) 0, LA_SSLPROTO }, {"sslcertck", no_argument, (int *) 0, LA_SSLCERTCK }, + {"sslcertfile", required_argument, (int *) 0, LA_SSLCERTFILE }, {"sslcertpath", required_argument, (int *) 0, LA_SSLCERTPATH }, {"sslcommonname", required_argument, (int *) 0, LA_SSLCOMMONNAME }, {"sslfingerprint", required_argument, (int *) 0, LA_SSLFINGERPRINT }, @@ -285,7 +287,7 @@ int parsecmdline (int argc /** argument count */, rctl->logfile = prependdir (optarg, currentwd); break; case LA_INVISIBLE: - rctl->invisible = TRUE; + rctl->invisible = FLAG_TRUE; break; case LA_SHOWDOTS: rctl->showdots = FLAG_TRUE; @@ -304,17 +306,17 @@ int parsecmdline (int argc /** argument count */, rctl->postmaster = (char *) xstrdup(optarg); break; case LA_NOBOUNCE: - run.bouncemail = FALSE; + rctl->bouncemail = FLAG_FALSE; break; case LA_NOSOFTBOUNCE: - run.softbounce = FALSE; + rctl->softbounce = FLAG_FALSE; break; case LA_SOFTBOUNCE: - run.softbounce = TRUE; + rctl->softbounce = FLAG_TRUE; break; case LA_BADHEADER: - if (strcasecmp(optarg,"pass") == 0) { - ctl->server.badheader = BHPASS; + if (strcasecmp(optarg,"accept") == 0) { + ctl->server.badheader = BHACCEPT; } else if (strcasecmp(optarg,"reject") == 0) { ctl->server.badheader = BHREJECT; } else { @@ -345,7 +347,7 @@ int parsecmdline (int argc /** argument count */, else if (strcasecmp(optarg,"kpop") == 0) { ctl->server.protocol = P_POP3; - ctl->server.service = KPOP_PORT; + ctl->server.service = xstrdup(KPOP_PORT); #ifdef KERBEROS_V5 ctl->server.authenticate = A_KERBEROS_V5; #else @@ -485,7 +487,7 @@ int parsecmdline (int argc /** argument count */, buf = xstrdup(optarg); cp = strtok(buf, ","); do { - struct idlist *idp = save_str(&ctl->antispam, NULL, 0);; + struct idlist *idp = save_str(&ctl->antispam, STRING_DUMMY, 0); idp->val.status.num = xatoi(cp, &errflag); } while @@ -560,6 +562,10 @@ int parsecmdline (int argc /** argument count */, ctl->sslcertck = FLAG_TRUE; break; + case LA_SSLCERTFILE: + ctl->sslcertfile = prependdir(optarg, currentwd); + break; + case LA_SSLCERTPATH: ctl->sslcertpath = prependdir(optarg, currentwd); break; @@ -641,14 +647,15 @@ int parsecmdline (int argc /** argument count */, P(GT_(" --sslkey ssl private key file\n")); P(GT_(" --sslcert ssl client certificate\n")); P(GT_(" --sslcertck do strict server certificate check (recommended)\n")); - P(GT_(" --sslcertpath path to ssl certificates\n")); + P(GT_(" --sslcertfile path to trusted-CA ssl certificate file\n")); + P(GT_(" --sslcertpath path to trusted-CA ssl certificate directory\n")); P(GT_(" --sslcommonname expect this CommonName from server (discouraged)\n")); P(GT_(" --sslfingerprint fingerprint that must match that of the server's cert.\n")); P(GT_(" --sslproto force ssl protocol (SSL2/SSL3/TLS1)\n")); #endif P(GT_(" --plugin specify external command to open connection\n")); P(GT_(" --plugout specify external command to open smtp connection\n")); - P(GT_(" --bad-header {reject|pass}\n" + P(GT_(" --bad-header {reject|accept}\n" " specify policy for handling messages with bad headers\n")); P(GT_(" -p, --protocol specify retrieval protocol (see man page)\n"));