while (capacity > 0)
{
- do { ret = recv(fd, to, 1, 0); } while (ret == -1 && errno == EINTR);
+ do { ret = read(fd, to, 1); } while (ret == -1 && errno == EINTR);
if (ret == -1)
return -1;
have++;
don't do a PEEK into the data, actually slurp up enough to be
"safe". Can't take it all because TLS-on-connect clients follow
immediately with TLS handshake. */
- ret = recv(fd, &hdr, PROXY_INITIAL_READ, 0);
+ ret = read(fd, &hdr, PROXY_INITIAL_READ);
}
while (ret == -1 && errno == EINTR);
/* First get the length fields. */
do
{
- retmore = recv(fd, (uschar*)&hdr + ret, PROXY_V2_HEADER_SIZE - PROXY_INITIAL_READ, 0);
+ retmore = read(fd, (uschar*)&hdr + ret, PROXY_V2_HEADER_SIZE - PROXY_INITIAL_READ);
} while (retmore == -1 && errno == EINTR);
if (retmore == -1)
goto proxyfail;
{
do
{
- retmore = recv(fd, (uschar*)&hdr + ret, size-ret, 0);
+ retmore = read(fd, (uschar*)&hdr + ret, size-ret);
} while (retmore == -1 && errno == EINTR);
if (retmore == -1)
goto proxyfail;
#ifndef DISABLE_TLS
if (tls_in.on_connect)
{
- if (tls_server_start(tls_require_ciphers, &user_msg) != OK)
+ if (tls_server_start(&user_msg) != OK)
return smtp_log_tls_fail(user_msg);
cmd_list[CMD_LIST_TLS_AUTH].is_mail_cmd = TRUE;
}
STARTTLS that don't add to the nonmail command count. */
s = NULL;
- if ((rc = tls_server_start(tls_require_ciphers, &s)) == OK)
+ if ((rc = tls_server_start(&s)) == OK)
{
if (!tls_remember_esmtp)
fl.helo_seen = fl.esmtp = fl.auth_advertised = f.smtp_in_pipelining_advertised = FALSE;