summary refs log tree commit diff stats
path: root/src/common/proto-irc.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/common/proto-irc.c')
-rw-r--r--src/common/proto-irc.c6
1 files changed, 3 insertions, 3 deletions
diff --git a/src/common/proto-irc.c b/src/common/proto-irc.c
index 6a3ee30e..2b83e992 100644
--- a/src/common/proto-irc.c
+++ b/src/common/proto-irc.c
@@ -886,8 +886,8 @@ process_numeric (session * sess, int n,
 	case 905:	/* failed SASL auth */
 	case 906:	/* registration completes before SASL auth */
 	case 907:	/* attempting to re-auth after a successful auth */
+		EMIT_SIGNAL (XP_TE_SASLRESPONSE, serv->server_session, word[1], word[2], word[3], ++word_eol[4], 0);
 		tcp_send_len (serv, "CAP END\r\n", 9);
-		PrintTextf (sess, "%s\n", ++word_eol[4]);
 		break;
 
 	default:
@@ -1145,7 +1145,7 @@ process_named_msg (session *sess, char *type, char *word[], char *word_eol[])
 					if (strncasecmp (word[5][0]==':' ? word[5] + 1 : word[5], "sasl", 12) == 0)
 					{
 						serv->have_sasl = TRUE;
-						PrintTextf (sess, "Authenticating via SASL as %s\n", sess->server->sasluser);
+						EMIT_SIGNAL (XP_TE_SASLAUTH, serv->server_session, sess->server->sasluser, NULL, NULL, NULL, 0);
 						tcp_send_len (serv, "AUTHENTICATE PLAIN\r\n", 20);
 
 						pass = encode_sasl_pass (sess->server->sasluser, sess->server->saslpassword);
@@ -1155,7 +1155,7 @@ process_named_msg (session *sess, char *type, char *word[], char *word_eol[])
 				}
 				else if (strncasecmp (word[4], "LS", 2) == 0)
 				{
-					PrintTextf (sess, "Capabilities supported by the server: %s\n", ++word_eol[5]);
+					EMIT_SIGNAL (XP_TE_SERVERCAP, serv->server_session, word[1], ++word_eol[5], NULL, NULL, 0);
 					if (strstr (word_eol[5], "identify-msg") != 0)
 					{
 						tcp_send_len (serv, "CAP REQ :identify-msg\r\n", 23);