| 430 purple_ssl_close(gsc); |
430 purple_ssl_close(gsc); |
| 431 return; |
431 return; |
| 432 } |
432 } |
| 433 |
433 |
| 434 while((len = purple_ssl_read(gsc, buf, sizeof(buf) - 1)) > 0) { |
434 while((len = purple_ssl_read(gsc, buf, sizeof(buf) - 1)) > 0) { |
| |
435 gc->last_received = time(NULL); |
| 435 buf[len] = '\0'; |
436 buf[len] = '\0'; |
| 436 purple_debug(PURPLE_DEBUG_INFO, "jabber", "Recv (ssl)(%d): %s\n", len, buf); |
437 purple_debug(PURPLE_DEBUG_INFO, "jabber", "Recv (ssl)(%d): %s\n", len, buf); |
| 437 jabber_parser_process(js, buf, len); |
438 jabber_parser_process(js, buf, len); |
| 438 if(js->reinit) |
439 if(js->reinit) |
| 439 jabber_stream_init(js); |
440 jabber_stream_init(js); |
| 457 |
458 |
| 458 if(!PURPLE_CONNECTION_IS_VALID(gc)) |
459 if(!PURPLE_CONNECTION_IS_VALID(gc)) |
| 459 return; |
460 return; |
| 460 |
461 |
| 461 if((len = read(js->fd, buf, sizeof(buf) - 1)) > 0) { |
462 if((len = read(js->fd, buf, sizeof(buf) - 1)) > 0) { |
| |
463 gc->last_received = time(NULL); |
| 462 #ifdef HAVE_CYRUS_SASL |
464 #ifdef HAVE_CYRUS_SASL |
| 463 if (js->sasl_maxbuf>0) { |
465 if (js->sasl_maxbuf>0) { |
| 464 const char *out; |
466 const char *out; |
| 465 unsigned int olen; |
467 unsigned int olen; |
| 466 sasl_decode(js->sasl, buf, len, &out, &olen); |
468 sasl_decode(js->sasl, buf, len, &out, &olen); |