Lines Matching refs:oparams

2559 			    sasl_out_params_t * oparams __attribute__((unused)))
2842 sasl_out_params_t * oparams)
3162 username, 0, SASL_CU_AUTHID, oparams);
3175 username, 0, SASL_CU_AUTHZID, oparams);
3179 oparams);
3324 oparams->mech_ssf = cptr->ssf;
3334 oparams->mech_ssf = 2;
3339 oparams->encode=&digestmd5_privacy_encode;
3340 oparams->decode=&digestmd5_privacy_decode;
3343 oparams->encode = &digestmd5_integrity_encode;
3344 oparams->decode = &digestmd5_integrity_decode;
3345 oparams->mech_ssf = 1;
3347 oparams->encode = NULL;
3348 oparams->decode = NULL;
3349 oparams->mech_ssf = 0;
3410 * nothing more to do; authenticated set oparams information
3412 oparams->doneflag = 1;
3413 oparams->maxoutbuf = client_maxbuf - 4;
3414 if (oparams->mech_ssf > 1) {
3416 if (oparams->maxoutbuf <= 25) {
3422 oparams->maxoutbuf -= 25;
3423 } else if(oparams->mech_ssf == 1) {
3425 if (oparams->maxoutbuf <= 16) {
3431 oparams->maxoutbuf -= 16;
3434 oparams->param_version = 0;
3446 if (oparams->mech_ssf > 0) {
3589 sasl_out_params_t *oparams)
3626 oparams) == SASL_OK) {
3639 memset(oparams, 0, sizeof(sasl_out_params_t));
3646 serverout, serveroutlen, oparams);
3651 serverout, serveroutlen, oparams);
3944 sasl_out_params_t *oparams)
3960 oparams->encode = &digestmd5_privacy_encode;
3961 oparams->decode = &digestmd5_privacy_decode;
3962 oparams->mech_ssf = ctext->cipher->ssf;
3972 oparams->encode = &digestmd5_integrity_encode;
3973 oparams->decode = &digestmd5_integrity_decode;
3974 oparams->mech_ssf = 1;
3979 oparams->encode = NULL;
3980 oparams->decode = NULL;
3981 oparams->mech_ssf = 0;
4005 (unsigned char *) oparams->authid,
4007 (char *) oparams->authid,
4016 strcmp(oparams->user, oparams->authid) ?
4018 (unsigned char *) oparams->user : NULL,
4020 (char *) oparams->user : NULL,
4031 resplen = strlen(oparams->authid) + strlen("username") + 5;
4037 sprintf(text->out_buf, "username=\"%s\"", oparams->authid);
4046 if (strcmp(oparams->user, oparams->authid)) {
4050 "authzid", (unsigned char *) oparams->user,
4053 "authzid", (char *) oparams->user, TRUE) != SASL_OK) {
4142 /* set oparams */
4144 oparams->maxoutbuf = ctext->server_maxbuf - 4;
4146 oparams->maxoutbuf = ctext->server_maxbuf;
4148 if(oparams->mech_ssf > 1) {
4150 if (oparams->maxoutbuf <= 25)
4154 oparams->maxoutbuf -= 25;
4155 } else if(oparams->mech_ssf == 1) {
4157 if (oparams->maxoutbuf <= 16)
4161 oparams->maxoutbuf -= 16;
4175 if (oparams->mech_ssf > 0) {
4608 sasl_out_params_t *oparams)
4620 if (oparams->authid == NULL) {
4629 if (oparams->user == NULL) {
4738 if (oparams->authid == NULL) {
4742 oparams);
4746 authid, 0, SASL_CU_AUTHID, oparams);
4750 userid, 0, SASL_CU_AUTHZID, oparams);
4793 sasl_out_params_t *oparams)
4802 result = ask_user_info(ctext, params, NULL, 0, prompt_need, oparams);
4811 !strcmp(text->reauth->e[val].authid, oparams->authid)) {
4855 result = make_client_response(text, params, oparams);
4873 sasl_out_params_t *oparams)
4904 prompt_need, oparams);
4912 result = make_client_response(text, params, oparams);
4944 sasl_out_params_t *oparams)
4989 oparams->doneflag = 1;
4990 oparams->param_version = 0;
5011 _plug_strdup(params->utils, oparams->authid,
5052 sasl_out_params_t *oparams)
5082 oparams);
5100 oparams);
5129 oparams);