# HG changeset patch # User Nathan Walp # Date 1178840622 0 # Node ID 5f557e708335744a2f03056ceac0d299b86b02eb # Parent d5293baaed1117580d8b153a70cd19d3531e22fa fixes #763 diff -r d5293baaed11 -r 5f557e708335 libpurple/protocols/jabber/auth.c --- a/libpurple/protocols/jabber/auth.c Thu May 10 23:35:22 2007 +0000 +++ b/libpurple/protocols/jabber/auth.c Thu May 10 23:43:42 2007 +0000 @@ -291,12 +291,15 @@ * plaintext auth */ } else if (!plaintext) { + char *msg = g_strdup_printf(_("%s requires plaintext authentication over an unencrypted connection. Allow this and continue authentication?"), + js->user->domain); purple_request_yes_no(js->gc, _("Plaintext Authentication"), _("Plaintext Authentication"), - _("This server requires plaintext authentication over an unencrypted connection. Allow this and continue authentication?"), + msg, 2, js->gc->account, NULL, NULL, NULL, allow_cyrus_plaintext_auth, disallow_plaintext_auth); + g_free(msg); return; /* Everything else has failed, so fail the * connection. Should probably have a better @@ -477,13 +480,16 @@ js->auth_type = JABBER_AUTH_PLAIN; if(js->gsc == NULL && !purple_account_get_bool(js->gc->account, "auth_plain_in_clear", FALSE)) { + char *msg = g_strdup_printf(_("%s requires plaintext authentication over an unencrypted connection. Allow this and continue authentication?"), + js->user->domain); purple_request_yes_no(js->gc, _("Plaintext Authentication"), _("Plaintext Authentication"), - _("This server requires plaintext authentication over an unencrypted connection. Allow this and continue authentication?"), + msg, 2, purple_connection_get_account(js->gc), NULL, NULL, purple_connection_get_account(js->gc), allow_plaintext_auth, disallow_plaintext_auth); + g_free(msg); return; } finish_plaintext_authentication(js);