Lines Matching refs:sparams
114 sasl_server_params_t *sparams,
122 text = sparams->utils->malloc(sizeof(server_context_t));
124 MEMERROR( sparams->utils );
141 static char *gettime(sasl_server_params_t *sparams)
147 ret= sparams->utils->malloc(15);
157 static char *randomdigits(sasl_server_params_t *sparams)
173 sparams->utils->rand(sparams->utils->rpool,
177 sparams->utils->rand(sparams->utils->rpool,(char *) temp,4);
184 ret = sparams->utils->malloc(15); /* there's no way an unsigned can be longer than this right? */
193 sasl_server_params_t *sparams,
205 sparams->utils->log(sparams->utils->conn, SASL_LOG_ERR,
208 SETERROR(sparams->utils, "CRAM-MD5 does not accpet inital data");
214 time = gettime(sparams);
215 randdigits = randomdigits(sparams);
217 MEMERROR( sparams->utils );
222 text->challenge = sparams->utils->malloc(200 + 1);
224 MEMERROR(sparams->utils);
230 sparams->serverFQDN);
236 sparams->utils->free(time);
237 sparams->utils->free(randdigits);
246 sasl_server_params_t *sparams,
273 sparams->utils->log(sparams->utils->conn, SASL_LOG_ERR,
276 SETERROR( sparams->utils,"need authentication name");
281 userid = (char *) sparams->utils->malloc(pos+1);
283 MEMERROR( sparams->utils);
291 result = sparams->utils->prop_request(sparams->propctx, password_request);
295 result = sparams->canon_user(sparams->utils->conn,
300 result = sparams->utils->prop_getnames(sparams->propctx,
308 sparams->utils->seterror(sparams->utils->conn,0,
311 sparams->utils->seterror(sparams->utils->conn,0,
322 sparams->utils->seterror(sparams->utils->conn,0,
325 sparams->utils->seterror(sparams->utils->conn,0,
332 sec = sparams->utils->malloc(sizeof(sasl_secret_t) + len);
344 sparams->utils->hmac_md5_precalc(&md5state, /* OUT */
353 sparams->utils->log(sparams->utils->conn, SASL_LOG_ERR,
356 sparams->utils->seterror(sparams->utils->conn, 0,
369 sparams->utils->hmac_md5_import(&tmphmac, (HMAC_MD5_STATE *) &md5state);
370 sparams->utils->MD5Update(&(tmphmac.ictx),
373 sparams->utils->hmac_md5_final((unsigned char *) &digest, &tmphmac);
376 digest_str = convert16((unsigned char *) digest, 16, sparams->utils);
383 sparams->utils->seterror(sparams->utils->conn, 0,
386 sparams->utils->seterror(sparams->utils->conn, 0,
406 if (userid) sparams->utils->free(userid);
407 if (sec) _plug_free_secret(sparams->utils, &sec);
409 if (digest_str) sparams->utils->free(digest_str);
416 sasl_server_params_t *sparams,
431 sparams->utils->log(sparams->utils->conn, SASL_LOG_ERR,
434 SETERROR(sparams->utils, "CRAM-MD5 input longer than 1024 bytes");
442 return crammd5_server_mech_step1(text, sparams,
448 return crammd5_server_mech_step2(text, sparams,
455 sparams->utils->log(sparams->utils->conn, SASL_LOG_ERR,
458 sparams->utils->log(NULL, SASL_LOG_ERR,