diff options
author | Tobias Markmann <tm@ayena.de> | 2008-11-16 17:31:16 +0100 |
---|---|---|
committer | Tobias Markmann <tm@ayena.de> | 2008-11-16 17:31:16 +0100 |
commit | 74f2b0fd6f34ebd75eaf424210d4cba2bd57c0bf (patch) | |
tree | cbe8b4064a4cbc93fc26daf2e0136e27cebf2b4c /util/sasl.lua | |
parent | 984abd96c9bf16ec925476dd7a8cd9f93b654242 (diff) | |
download | prosody-74f2b0fd6f34ebd75eaf424210d4cba2bd57c0bf.tar.gz prosody-74f2b0fd6f34ebd75eaf424210d4cba2bd57c0bf.zip |
Removing some debug messages.
Diffstat (limited to 'util/sasl.lua')
-rw-r--r-- | util/sasl.lua | 8 |
1 files changed, 0 insertions, 8 deletions
diff --git a/util/sasl.lua b/util/sasl.lua index a5657c8c..94077411 100644 --- a/util/sasl.lua +++ b/util/sasl.lua @@ -32,10 +32,8 @@ local function new_plain(realm, password_handler) self.username = authentication if claimed_password == correct_password then - log("debug", "success") return "success" else - log("debug", "failure") return "failure", "not-authorized" end end @@ -63,10 +61,8 @@ local function new_digest_md5(realm, password_handler) local function parse(data) message = {} - log("debug", "parse-message: "..data) for k, v in gmatch(data, [[([%w%-]+)="?([%w%-%/%.%+=]+)"?,?]]) do message[k] = v - log("debug", " "..k.." = "..v) end return message end @@ -79,7 +75,6 @@ local function new_digest_md5(realm, password_handler) object.nonce_count = {} function object.feed(self, message) - log("debug", "SASL step: "..self.step) self.step = self.step + 1 if (self.step == 1) then local challenge = serialize({ nonce = object.nonce, @@ -87,7 +82,6 @@ local function new_digest_md5(realm, password_handler) charset = "utf-8", algorithm = "md5-sess", realm = self.realm}); - log("debug", "challenge: "..challenge) return "challenge", challenge elseif (self.step == 2) then local response = parse(message) @@ -135,8 +129,6 @@ local function new_digest_md5(realm, password_handler) local KD = HA1..":"..response["nonce"]..":"..response["nc"]..":"..response["cnonce"]..":"..response["qop"]..":"..HA2 local response_value = md5.sumhexa(KD) - log("debug", "response_value: "..response_value); - log("debug", "response: "..response["response"]); if response_value == response["response"] then -- calculate rspauth A2 = ":"..protocol.."/"..domain |