| 48 if(purple_ssl_is_supported()) { |
48 if(purple_ssl_is_supported()) { |
| 49 jabber_send_raw(js, |
49 jabber_send_raw(js, |
| 50 "<starttls xmlns='urn:ietf:params:xml:ns:xmpp-tls'/>", -1); |
50 "<starttls xmlns='urn:ietf:params:xml:ns:xmpp-tls'/>", -1); |
| 51 return TRUE; |
51 return TRUE; |
| 52 } else if(xmlnode_get_child(starttls, "required")) { |
52 } else if(xmlnode_get_child(starttls, "required")) { |
| 53 js->gc->wants_to_die = TRUE; |
|
| 54 purple_connection_error_reason (js->gc, PURPLE_REASON_NO_SSL_SUPPORT, |
53 purple_connection_error_reason (js->gc, PURPLE_REASON_NO_SSL_SUPPORT, |
| 55 _("Server requires TLS/SSL for login. No TLS/SSL support found.")); |
54 _("Server requires TLS/SSL for login. No TLS/SSL support found.")); |
| 56 return TRUE; |
55 return TRUE; |
| 57 } |
56 } |
| 58 } |
57 } |
| 113 finish_plaintext_authentication(account->gc->proto_data); |
112 finish_plaintext_authentication(account->gc->proto_data); |
| 114 } |
113 } |
| 115 |
114 |
| 116 static void disallow_plaintext_auth(PurpleAccount *account) |
115 static void disallow_plaintext_auth(PurpleAccount *account) |
| 117 { |
116 { |
| 118 account->gc->wants_to_die = TRUE; |
|
| 119 purple_connection_error_reason (account->gc, PURPLE_REASON_ENCRYPTION_ERROR, |
117 purple_connection_error_reason (account->gc, PURPLE_REASON_ENCRYPTION_ERROR, |
| 120 _("Server requires plaintext authentication over an unencrypted stream")); |
118 _("Server requires plaintext authentication over an unencrypted stream")); |
| 121 } |
119 } |
| 122 |
120 |
| 123 #ifdef HAVE_CYRUS_SASL |
121 #ifdef HAVE_CYRUS_SASL |