Lines Matching refs:result

520      * Returns SASL_OK on success, SASL_BUFOVER if result won't fit
1820 int result;
1893 result = _plug_buf_alloc(text->utils, &text->decode_once_buf,
1896 if (result != SASL_OK)
1897 return result;
1902 result=text->cipher_dec(text,text->buffer,text->size-6,digest,
1905 if (result!=SASL_OK)
1906 return result;
1933 result = _plug_buf_alloc(text->utils, &text->decode_tmp_buf,
1935 if(result != SASL_OK) return result;
2129 int result;
2131 result = create_MAC(text, buf, bufsize - 16, text->rec_seqnum, MAC);
2132 if (result != SASL_OK)
2133 return result;
2151 result = _plug_buf_alloc(text->utils, &text->decode_once_buf,
2154 if (result != SASL_OK)
2155 return result;
2175 int result;
2235 result = check_integrity(text, text->buffer, text->size,
2237 if (result != SASL_OK)
2238 return result;
2385 char *result;
2411 result = utils->malloc(HASHHEXLEN + 1);
2413 if (result == NULL)
2417 memcpy(result, Response, HASHHEXLEN);
2418 result[HASHHEXLEN] = 0;
2441 return result;
2562 int result;
2576 result = get_server_realm(sparams, &realm);
2577 if(result != SASL_OK) return result;
2650 result = _plug_buf_alloc(sparams->utils, &(text->out_buf),
2653 if(result != SASL_OK) {
2655 return result;
2658 if(result != SASL_OK) return result;
2847 int result;
2924 result = SASL_BADAUTH;
2936 result = SASL_FAIL;
2959 result = SASL_BADAUTH;
2979 result = SASL_BADAUTH;
2989 result = SASL_BADAUTH;
2999 result = SASL_BADAUTH;
3018 result = SASL_FAIL;
3055 result = SASL_BADAUTH;
3091 result = SASL_FAIL;
3109 result = SASL_BADAUTH;
3121 result = SASL_BADAUTH;
3132 result = SASL_BADAUTH;
3144 result = SASL_BADAUTH;
3148 result = sparams->utils->prop_request(sparams->propctx, password_request);
3149 if(result != SASL_OK) {
3161 result = sparams->canon_user(sparams->utils->conn,
3163 if (result != SASL_OK) {
3174 result = sparams->canon_user(sparams->utils->conn,
3177 result = sparams->canon_user(sparams->utils->conn,
3182 if (result != SASL_OK) {
3192 result = sparams->utils->prop_getnames(sparams->propctx, password_request,
3194 if (result < 0 ||
3205 result = SASL_NOUSER;
3219 result = SASL_FAIL;
3231 result = SASL_FAIL;
3285 result = SASL_FAIL;
3335 result = SASL_FAIL;
3358 result = SASL_FAIL;
3377 result = SASL_NOMEM;
3390 result = SASL_BADAUTH;
3404 result = SASL_BADAUTH;
3417 result = SASL_BADPARAM;
3426 result = SASL_BADPARAM;
3457 if ((result = text->cipher_init(text, enckey, deckey)) != SASL_OK) {
3492 result = _plug_buf_alloc(sparams->utils, &(text->out_buf),
3494 if(result != SASL_OK) {
3502 result = SASL_FAIL;
3510 result = SASL_OK;
3517 switch (result) {
3579 return result;
3862 char *result;
3903 result = utils->malloc(HASHHEXLEN + 1);
3905 if (result == NULL)
3908 memcpy(result, Response, HASHHEXLEN);
3909 result[HASHHEXLEN] = 0;
3938 return result;
3955 int result;
3988 result = SASL_NOMEM;
4026 result = SASL_NOMEM;
4032 result =_plug_buf_alloc(params->utils, &(text->out_buf),
4035 if (result != SASL_OK) goto FreeAllocatedMem;
4043 result = SASL_FAIL;
4055 result = SASL_FAIL;
4062 result = SASL_FAIL;
4068 result = SASL_FAIL;
4075 result = SASL_FAIL;
4081 result = SASL_FAIL;
4090 result = SASL_FAIL;
4117 result = SASL_FAIL;
4124 result = SASL_FAIL;
4132 result = SASL_FAIL;
4138 result = SASL_FAIL;
4187 if((result = text->cipher_init(text, enckey, deckey)) != SASL_OK) {
4199 result = SASL_OK;
4205 return result;
4214 int result = SASL_OK;
4258 result = SASL_FAIL;
4276 result = SASL_FAIL;
4290 result = SASL_NOMEM;
4323 result = SASL_BADAUTH;
4377 result = SASL_BADAUTH;
4388 result = SASL_BADAUTH;
4399 result = SASL_BADAUTH;
4413 result = SASL_BADAUTH;
4437 result = SASL_FAIL;
4451 result = SASL_FAIL;
4469 result = SASL_FAIL;
4482 result = SASL_FAIL;
4569 result = SASL_FAIL;
4580 result = SASL_TOOWEAK;
4591 if (result != SASL_OK && realms) {
4601 return result;
4611 int result = SASL_OK;
4693 result =
4733 if (result == SASL_OK) return SASL_INTERACT;
4735 return result;
4740 result = params->canon_user(params->utils->conn, authid, 0,
4745 result = params->canon_user(params->utils->conn,
4747 if (result != SASL_OK) return result;
4749 result = params->canon_user(params->utils->conn,
4752 if (result != SASL_OK) return result;
4760 return result;
4796 int result = SASL_FAIL;
4802 result = ask_user_info(ctext, params, NULL, 0, prompt_need, oparams);
4803 if (result != SASL_OK) return result;
4855 result = make_client_response(text, params, oparams);
4856 if (result != SASL_OK) return result;
4876 int result = SASL_FAIL;
4889 result = parse_server_challenge(ctext, params, serverin, serverinlen,
4891 if (result != SASL_OK) goto FreeAllocatedMem;
4903 result = ask_user_info(ctext, params, realms, nrealm,
4905 if (result != SASL_OK) goto FreeAllocatedMem;
4912 result = make_client_response(text, params, oparams);
4913 if (result != SASL_OK) goto FreeAllocatedMem;
4920 result = SASL_CONTINUE;
4933 return result;
4949 int result = SASL_FAIL;
4987 result = SASL_FAIL;
4992 result = SASL_OK;
5006 switch (result) {
5041 return result;