diff --git a/sope-mime/NGImap4/NGImap4Client.m b/sope-mime/NGImap4/NGImap4Client.m index 239d50efd..a4f85b409 100644 --- a/sope-mime/NGImap4/NGImap4Client.m +++ b/sope-mime/NGImap4/NGImap4Client.m @@ -378,7 +378,7 @@ - (NSDictionary *)_receiveServerGreetingWithoutTagId { buffer = nil; self->parser = [[NGImap4ResponseParser alloc] initWithStream: self->socket]; - [self logWithFormat:@"TLS started successfully."]; + [self debugWithFormat:@"TLS started successfully."]; } else [self logWithFormat:@"Could not start TLS."]; diff --git a/sope-mime/NGImap4/NGSieveClient.m b/sope-mime/NGImap4/NGSieveClient.m index 8b10049d8..fb33909d2 100644 --- a/sope-mime/NGImap4/NGSieveClient.m +++ b/sope-mime/NGImap4/NGSieveClient.m @@ -333,7 +333,7 @@ - (NSDictionary *)openConnection { //buffer = nil; self->parser = [[NGImap4ResponseParser alloc] initWithStream: self->socket]; - [self logWithFormat:@"TLS started successfully."]; + [self debugWithFormat:@"TLS started successfully."]; /* as per rfc5804 section 2.2: * at this point, the server MUST re-issue the capability results