Lines Matching defs:conn

150 static int auxprop_verify_password(sasl_conn_t *conn,
162 sasl_server_conn_t *sconn = (sasl_server_conn_t *)conn;
168 if (!conn || !userstr)
181 result = _sasl_canon_user(conn, userstr, 0,
183 &(conn->oparams));
263 int _sasl_auxprop_verify_apop(sasl_conn_t *conn,
278 sasl_server_conn_t *sconn = (sasl_server_conn_t *)conn;
282 if (!conn || !userstr || !challenge || !response)
283 PARAMERROR(conn)
291 _sasl_log(conn, SASL_LOG_ERR, "could not perform password lookup");
293 sasl_seterror(conn, 0, "could not perform password lookup");
302 sasl_seterror(conn, 0, gettext("could not find password"));
304 sasl_seterror(conn, 0, "could not find password");
330 if (ret == SASL_BADAUTH) sasl_seterror(conn, SASL_NOLOG,
333 if (ret == SASL_BADAUTH) sasl_seterror(conn, SASL_NOLOG,
407 static int pwcheck_verify_password(sasl_conn_t *conn,
435 sasl_seterror(conn,0,"cannot connect to pwcheck server");
460 sasl_seterror(conn,0,response);
497 static int saslauthd_verify_password(sasl_conn_t *conn,
517 if (_sasl_getcallback(conn, SASL_CB_GETOPT, &getopt, &context) == SASL_OK) {
545 sasl_seterror(conn, 0, "saslauthd request too large");
574 sasl_seterror(conn, 0, "cannot open door to saslauthd server: %m", errno);
590 sasl_seterror(conn, 0, "saslauthd sent an overly long response");
601 sasl_seterror(conn, 0, "cannot create socket for saslauthd: %m", errno);
612 sasl_seterror(conn, 0, "cannot connect to saslauthd server: %m", errno);
624 sasl_seterror(conn, 0, "write failed");
638 sasl_seterror(conn, 0, "size read failed");
645 sasl_seterror(conn, 0, "bad response from saslauthd");
652 sasl_seterror(conn, 0, "read failed");
665 sasl_seterror(conn, SASL_NOLOG, "authentication failed");
672 static int always_true(sasl_conn_t *conn,
678 _sasl_log(conn, SASL_LOG_WARN, "AlwaysTrue Password Verifier Verified: %s",