X-Git-Url: https://vcs.fsf.org/?a=blobdiff_plain;ds=sidebyside;f=src%2Fsrc%2Fauths%2Fpwcheck.c;h=115c1454dde30881f8e44800df32313c08bc962c;hb=f1e894f37fb99398f7447220925a915bd031491a;hp=f477b6f0664334ce586512af8af8cc64cf9b4a57;hpb=1fe64dcc7107853e28d02700674b640ed24c0fea;p=exim.git diff --git a/src/src/auths/pwcheck.c b/src/src/auths/pwcheck.c index f477b6f06..115c1454d 100644 --- a/src/src/auths/pwcheck.c +++ b/src/src/auths/pwcheck.c @@ -1,4 +1,4 @@ -/* $Cambridge: exim/src/src/auths/pwcheck.c,v 1.1 2004/10/07 13:10:01 ph10 Exp $ */ +/* $Cambridge: exim/src/src/auths/pwcheck.c,v 1.2 2005/06/27 14:29:44 ph10 Exp $ */ /* SASL server API implementation * Rob Siemborski @@ -137,7 +137,7 @@ return PWCHECK_FAIL; start += n; } - close(s); + (void)close(s); if (start > 1 && !strncmp(response, "OK", 2)) { return PWCHECK_OK; @@ -220,14 +220,14 @@ int saslauthd_verify_password(const uschar *userid, if ( write_string(s, userid, Ustrlen(userid)) < 0) { DEBUG(D_auth) debug_printf("Failed to send userid to saslauthd daemon \n"); - close(s); + (void)close(s); return PWCHECK_FAIL; } if ( write_string(s, password, Ustrlen(password)) < 0) { DEBUG(D_auth) debug_printf("Failed to send password to saslauthd daemon \n"); - close(s); + (void)close(s); return PWCHECK_FAIL; } @@ -236,25 +236,25 @@ int saslauthd_verify_password(const uschar *userid, if ( write_string(s, service, Ustrlen(service)) < 0) { DEBUG(D_auth) debug_printf("Failed to send service name to saslauthd daemon \n"); - close(s); + (void)close(s); return PWCHECK_FAIL; } if ( write_string(s, realm, Ustrlen(realm)) < 0) { DEBUG(D_auth) debug_printf("Failed to send realm to saslauthd daemon \n"); - close(s); + (void)close(s); return PWCHECK_FAIL; } if ( read_string(s, &daemon_reply ) < 2) { DEBUG(D_auth) debug_printf("Corrupted answer '%s' received. \n", daemon_reply); - close(s); + (void)close(s); return PWCHECK_FAIL; } - close(s); + (void)close(s); DEBUG(D_auth) debug_printf("Answer '%s' received. \n", daemon_reply);