X-Git-Url: https://git.exim.org/exim.git/blobdiff_plain/db3f7b6972f3b003c0413b78afcfbe295ffe0b97..1d28cc061677bd07d9bed48dd84bd5c590247043:/src/src/auths/check_serv_cond.c diff --git a/src/src/auths/check_serv_cond.c b/src/src/auths/check_serv_cond.c index a698cdc73..5201d2177 100644 --- a/src/src/auths/check_serv_cond.c +++ b/src/src/auths/check_serv_cond.c @@ -4,6 +4,7 @@ /* Copyright (c) University of Cambridge 1995 - 2012 */ /* See the file NOTICE for conditions of use and distribution. */ +/* SPDX-License-Identifier: GPL-2.0-or-later */ #include "../exim.h" @@ -65,11 +66,8 @@ uschar *cond; HDEBUG(D_auth) { debug_printf("%s authenticator %s:\n", ablock->name, label); - for (int i = 0; i < AUTH_VARS; i++) - { - if (auth_vars[i] != NULL) - debug_printf(" $auth%d = %s\n", i + 1, auth_vars[i]); - } + for (int i = 0; i < AUTH_VARS; i++) if (auth_vars[i]) + debug_printf(" $auth%d = %s\n", i + 1, auth_vars[i]); for (int i = 1; i <= expand_nmax; i++) debug_printf(" $%d = %.*s\n", i, expand_nlength[i], expand_nstring[i]); debug_print_string(ablock->server_debug_string); /* customized debug */ @@ -83,23 +81,21 @@ For plaintext/gsasl authenticators, it will have been pre-checked to prevent this. We return the unset scenario value given to us, which for server_condition will be OK and otherwise will typically be FAIL. */ -if (condition == NULL) return unset; +if (!condition) return unset; cond = expand_string(condition); HDEBUG(D_auth) - { - if (cond == NULL) + if (!cond) debug_printf("expansion failed: %s\n", expand_string_message); else debug_printf("expanded string: %s\n", cond); - } /* A forced expansion failure causes authentication to fail. Other expansion failures yield DEFER, which will cause a temporary error code to be returned to the AUTH command. The problem is at the server end, so the client should try again later. */ -if (cond == NULL) +if (!cond) { if (f.expand_string_forcedfail) return FAIL; auth_defer_msg = expand_string_message;